標題: Titlebook: Smart Intelligent Computing and Applications; Proceedings of the S Suresh Chandra Satapathy,Vikrant Bhateja,Swagatam Conference proceeding [打印本頁] 作者: 詭計 時間: 2025-3-21 16:34
書目名稱Smart Intelligent Computing and Applications影響因子(影響力)
書目名稱Smart Intelligent Computing and Applications影響因子(影響力)學科排名
書目名稱Smart Intelligent Computing and Applications網(wǎng)絡(luò)公開度
書目名稱Smart Intelligent Computing and Applications網(wǎng)絡(luò)公開度學科排名
書目名稱Smart Intelligent Computing and Applications被引頻次
書目名稱Smart Intelligent Computing and Applications被引頻次學科排名
書目名稱Smart Intelligent Computing and Applications年度引用
書目名稱Smart Intelligent Computing and Applications年度引用學科排名
書目名稱Smart Intelligent Computing and Applications讀者反饋
書目名稱Smart Intelligent Computing and Applications讀者反饋學科排名
作者: corpuscle 時間: 2025-3-21 23:38
https://doi.org/10.1007/978-981-13-1927-3SCI 2018; Data Analytics; Data Base Management; ICT for Education; Big Data; Optical Computing; Cloud Comp作者: Dna262 時間: 2025-3-22 03:13
978-981-13-4706-1Springer Nature Singapore Pte Ltd. 2019作者: intrude 時間: 2025-3-22 07:56 作者: 安裝 時間: 2025-3-22 08:51 作者: 一致性 時間: 2025-3-22 16:09
V. Rajinikanth,K. Palani Thanaraj,Suresh Chandra Satapathy,Steven Lawrence Fernandes,Nilanjan Deyment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: 宴會 時間: 2025-3-22 18:21
Debarpita Santra,Sounak Sadhukhan,S. K. Basu,Sayantika Das,Shreya Sinha,Subrata Goswamiment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: 高貴領(lǐng)導(dǎo) 時間: 2025-3-22 22:36 作者: 敬禮 時間: 2025-3-23 04:29
K. Shobha,S. Nickolasment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: Hearten 時間: 2025-3-23 05:35
N. Pothirasan,M. Pallikonda Rajasekaranment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: Synchronism 時間: 2025-3-23 12:26 作者: myriad 時間: 2025-3-23 17:47 作者: 排斥 時間: 2025-3-23 20:08
Vasavi Junapudi,Siba K. Udgatament, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: anaphylaxis 時間: 2025-3-24 02:08 作者: deficiency 時間: 2025-3-24 05:36
R. Arulmurugan,A. Chandramouliment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: fabricate 時間: 2025-3-24 09:27
R. Monisha,R. Mrinalini,M. Nithila Britto,R. Ramakrishnan,V. Rajinikanthment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: 終點 時間: 2025-3-24 10:55
Han He,Lei Wu,Hua Yan,Zhimin Gao,Yi Feng,George Townsendment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: EVICT 時間: 2025-3-24 17:29
D. N. V. S. L. S. Indira,R. Kiran Kumar,G. V. S. N. R. V. Prasad,R. Usha Raniment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: Meditate 時間: 2025-3-24 22:34
Karuna Arava,L. Sumalathament, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: 蝕刻術(shù) 時間: 2025-3-25 01:38 作者: 遺傳學 時間: 2025-3-25 03:25
Thomas Monothment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186 作者: macular-edema 時間: 2025-3-25 10:34 作者: 掙扎 時間: 2025-3-25 14:44 作者: Ptosis 時間: 2025-3-25 17:12
G. Jeya Shree,S. Padmavathilel paths are required to stabilize the system. Although with this approach a world-record SNR for a 1-bit noise-shaped signal has been achieved, it is still far away from the limits imposed by information theory. As such, in practice the SNR is only limited by the amount of available computational 作者: 狂熱語言 時間: 2025-3-25 19:58
Abhyudaya Pandey,Sandipan Mukherjee,Sandal Bajaj,Annapurna Jonnalagaddars. The operation of the full look-ahead algorithm, an algorithm that can be found in open literate and that performs an exhaustive search for the best solution within the look-ahead depth, is reviewed. With these insights the feasibility of an analog-to-digital converter with look-ahead is investig作者: V切開 時間: 2025-3-26 03:06 作者: 教唆 時間: 2025-3-26 05:50
Extended Lifetime and Reliable Data Transmission in Wireless Sensor Networks with Multiple Sinks,mulations show that with our trust model incorporated in the CASS algorithm can minimize the packet drop rate in the presence of a different number of unreliable nodes while trying to maximize the lifetime of the sensor network with the use of CASS-Reliable and multiple sinks. It is also observed th作者: Madrigal 時間: 2025-3-26 08:51 作者: 課程 時間: 2025-3-26 14:58 作者: 愛得痛了 時間: 2025-3-26 18:16
2190-3018 ntelligence and sustainability.Covers novel concepts of meme.The proceedings covers advanced and multi-disciplinary research on design of smart computing and informatics. The theme of the book broadly focuses on various innovation paradigms in system knowledge, intelligence and sustainability that m作者: 寬容 時間: 2025-3-26 21:39
Identification of Meme Genre and Its Social Impact,hidden patterns like a social incident, a soccer game, a war or speeches by a public figures. The paper aims to produce a multivariate graph with the source of memes as nodes which are connected to other sources sharing the same meme using edges. The graph is then analyzed to identify patterns and genre of popular memes.作者: Host142 時間: 2025-3-27 01:31 作者: 炸壞 時間: 2025-3-27 08:32
A Secure and Hybrid Approach for Key Escrow Problem and to Enhance Authentic Mobile Wallets, and the information transacted through the mobile device. In this paper, a hybrid technique is proposed to provide authentication and to solve the key escrow problem. This approach would pay a way to authorize the data and can provide a fair cryptography environment in the transaction.作者: 纖細 時間: 2025-3-27 09:49
Contrast-Enhanced Recursive Visual Cryptography Scheme Based on Additional Basis Matrices,emes. The proposed model provides improved contrast and reduces the noise in the recreated image without any additional computation. This scheme uses the new pixel patterns to enhance the contrast of the decrypted image. The contrast of the recursive visual cryptography scheme can be enhanced based on new pixel patterns for white pixels.作者: Calculus 時間: 2025-3-27 15:38
Scheme for Unstructured Knowledge Representation in Medical Expert System for Low Back Pain Managemting clinical records. The frames related to a patient collectively form a frame system, where one frame may point to other frames. The proposed representation scheme is complete, consistent, and free from redundancy.作者: 縮影 時間: 2025-3-27 19:19 作者: Delirium 時間: 2025-3-27 23:12 作者: covert 時間: 2025-3-28 03:57 作者: 散開 時間: 2025-3-28 08:34
Conference proceedings 2019ms in society, environment and industries. The volume publishes quality work pertaining to the scope of the conference which is extended towards deployment of emerging computational and knowledge transfer approaches, optimizing solutions in varied disciplines of science, technology and healthcare..作者: 重疊 時間: 2025-3-28 12:18
An Adaptive ARP Approach for Fog-Based RSU Utilization,nal cloud computing model. One best solution emerged, is the Fog Computing, which provides services and resources at the network’s edge. In this paper, we consider one of the IoT applications in smart cities, Vehicular Monitorization. Every vehicle in the smart cities communicates their information 作者: EVICT 時間: 2025-3-28 15:32
Identification of Meme Genre and Its Social Impact,ocial media. In this paper we analyze a dataset which consist of data related to meme sharing and corresponding phrases used in the process. Popularity of memes is tracked followed by timestamps to identify the most shared memes across the internet. Meme sharing or propagation is also based on some 作者: 無所不知 時間: 2025-3-28 20:11 作者: Texture 時間: 2025-3-29 02:21 作者: 花費 時間: 2025-3-29 03:42
An Unvarying Orthogonal Search with Small Triangle Pattern for Video Coding, the complexity in computing the motion estimation in block matching algorithm. This algorithm basically employs an orthogonal search pattern with uniform step size. A fast inner search is applied by choosing a small triangle pattern adjacent to the region with the minimum group sum distortion that 作者: insipid 時間: 2025-3-29 08:25
Imputation of Multivariate Attribute Values in Big Data,ause of human errors and equipment errors. Several missing data handling and treating techniques exist based on the type of missing values, using statistical or data mining approaches. Efficiency in imputation can be achieved through multiple imputation techniques. But, these imputation techniques h作者: 拍下盜公款 時間: 2025-3-29 12:38
,Retrofitting of Sensors in BLDC Motor Based e-Vehicle—A Step Towards Intelligent Transportation Sysy technologies are introduced to minimized vehicular accidents. We all know that India is developing country and there are many changes held in the path of development of our country such as change in road styles. Other than many countries India has a poor level of technologies improved. Government 作者: 狂亂 時間: 2025-3-29 19:07 作者: Insul島 時間: 2025-3-29 20:03 作者: 漂浮 時間: 2025-3-30 00:56 作者: 豪華 時間: 2025-3-30 04:23 作者: Repatriate 時間: 2025-3-30 11:40
Modeling of PV Powered Seven-Level Inverter for Power Quality Improvement,ed. SRF is utilized for reference input current extraction and to create pulses for the SHAPF. The principle point of the cascaded bridge is to dispense harmonics, enhance power factor, and reactive energy compensation of the single-phase distribution framework. The suggested control calculation has作者: 染色體 時間: 2025-3-30 15:50 作者: 性冷淡 時間: 2025-3-30 17:42 作者: considerable 時間: 2025-3-30 21:12
Detection and Classification of Trendy Topics for Recommendation Based on Twitter Data on Differentmedia. At the same time, this is continuously generating huge amounts of raw un-structured data which has proved to be a complex task for analysis. In this paper, a solution based on classification of selected features is proposed to address the problem. In the proposed work, we considered limited n作者: 招募 時間: 2025-3-31 04:22 作者: fibroblast 時間: 2025-3-31 09:02
An Unbiased Privacy Sustaining Approach Based on SGO for Distortion of Data Sets to Shield the Senstechnology in data mining has permitted to extract the unknown patterns from the repositories of enormous data. On the other hand, it raises problem of revealing the confidential patterns when the data is shared to the others. Privacy-preserving data mining is an emerging area for the research in th作者: Fsh238 時間: 2025-3-31 10:51
Contrast-Enhanced Recursive Visual Cryptography Scheme Based on Additional Basis Matrices,of the secret image and the secret image cannot be obtained if there are .-1 shares together. The security and reliability of the visual cryptography scheme can be greatly enhanced with recursion. The contrast of the reconstructed secret image is less compared to the existing visual cryptography sch作者: hemoglobin 時間: 2025-3-31 17:11
Authenticity and Integrity Enhanced Active Digital Image Forensics Based on Visual Cryptography,es. Digital image watermarking and digital signatures are presently used in active digital image forensics, but these methods provide only the authenticity and certain level of integrity and robustness. In this paper, we proposed a new method for active digital image forensics based on visual crypto作者: Ejaculate 時間: 2025-3-31 20:02
Conference proceedings 2019n various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solution to varied problems in society, environment and industries. The volume publishes quality work pertaining to the scope of the conference which is extended towards deplo作者: 胰島素 時間: 2025-3-31 22:45 作者: LAITY 時間: 2025-4-1 05:13 作者: 否決 時間: 2025-4-1 06:50
,Shannon’s Entropy and Watershed Algorithm Based Technique to Inspect Ischemic Stroke Wound,RG) and the Markov Random Field (MRF). The outcome of this study authenticates that, WS provides enhanced picture likeness indices, like Jaccard (90.34%), Dice (94.92%), FPR (7.77%) and FNR (2.65%) compared with SRG and MRF.作者: calamity 時間: 2025-4-1 12:02 作者: 不規(guī)則的跳動 時間: 2025-4-1 16:15
Statistical Analysis of EMG-Based Features for Different Hand Movements,ng fuzzy entropy measure. ANOVA on prominent features shows a linear relationship between features and different hand movements and therefore these prominent features can be used to activate the prosthetic hand.作者: calamity 時間: 2025-4-1 20:26 作者: Modicum 時間: 2025-4-2 01:26