派博傳思國際中心

標題: Titlebook: Smart Intelligent Computing and Applications; Proceedings of the S Suresh Chandra Satapathy,Vikrant Bhateja,Swagatam Conference proceeding [打印本頁]

作者: 詭計    時間: 2025-3-21 16:34
書目名稱Smart Intelligent Computing and Applications影響因子(影響力)




書目名稱Smart Intelligent Computing and Applications影響因子(影響力)學科排名




書目名稱Smart Intelligent Computing and Applications網(wǎng)絡(luò)公開度




書目名稱Smart Intelligent Computing and Applications網(wǎng)絡(luò)公開度學科排名




書目名稱Smart Intelligent Computing and Applications被引頻次




書目名稱Smart Intelligent Computing and Applications被引頻次學科排名




書目名稱Smart Intelligent Computing and Applications年度引用




書目名稱Smart Intelligent Computing and Applications年度引用學科排名




書目名稱Smart Intelligent Computing and Applications讀者反饋




書目名稱Smart Intelligent Computing and Applications讀者反饋學科排名





作者: corpuscle    時間: 2025-3-21 23:38
https://doi.org/10.1007/978-981-13-1927-3SCI 2018; Data Analytics; Data Base Management; ICT for Education; Big Data; Optical Computing; Cloud Comp
作者: Dna262    時間: 2025-3-22 03:13
978-981-13-4706-1Springer Nature Singapore Pte Ltd. 2019
作者: intrude    時間: 2025-3-22 07:56

作者: 安裝    時間: 2025-3-22 08:51

作者: 一致性    時間: 2025-3-22 16:09
V. Rajinikanth,K. Palani Thanaraj,Suresh Chandra Satapathy,Steven Lawrence Fernandes,Nilanjan Deyment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: 宴會    時間: 2025-3-22 18:21
Debarpita Santra,Sounak Sadhukhan,S. K. Basu,Sayantika Das,Shreya Sinha,Subrata Goswamiment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: 高貴領(lǐng)導(dǎo)    時間: 2025-3-22 22:36

作者: 敬禮    時間: 2025-3-23 04:29
K. Shobha,S. Nickolasment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: Hearten    時間: 2025-3-23 05:35
N. Pothirasan,M. Pallikonda Rajasekaranment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: Synchronism    時間: 2025-3-23 12:26

作者: myriad    時間: 2025-3-23 17:47

作者: 排斥    時間: 2025-3-23 20:08
Vasavi Junapudi,Siba K. Udgatament, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: anaphylaxis    時間: 2025-3-24 02:08

作者: deficiency    時間: 2025-3-24 05:36
R. Arulmurugan,A. Chandramouliment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: fabricate    時間: 2025-3-24 09:27
R. Monisha,R. Mrinalini,M. Nithila Britto,R. Ramakrishnan,V. Rajinikanthment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: 終點    時間: 2025-3-24 10:55
Han He,Lei Wu,Hua Yan,Zhimin Gao,Yi Feng,George Townsendment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: EVICT    時間: 2025-3-24 17:29
D. N. V. S. L. S. Indira,R. Kiran Kumar,G. V. S. N. R. V. Prasad,R. Usha Raniment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: Meditate    時間: 2025-3-24 22:34
Karuna Arava,L. Sumalathament, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: 蝕刻術(shù)    時間: 2025-3-25 01:38

作者: 遺傳學    時間: 2025-3-25 03:25
Thomas Monothment, statistical analysis, test security, and operations. The original papers contained in this book provide historical context for Paul Holland’s work alongside commentary on some of his major contributions by noteworthy statisticians working today..978-1-4419-9388-5978-1-4419-9389-2Series ISSN 0930-0325 Series E-ISSN 2197-7186
作者: macular-edema    時間: 2025-3-25 10:34

作者: 掙扎    時間: 2025-3-25 14:44

作者: Ptosis    時間: 2025-3-25 17:12
G. Jeya Shree,S. Padmavathilel paths are required to stabilize the system. Although with this approach a world-record SNR for a 1-bit noise-shaped signal has been achieved, it is still far away from the limits imposed by information theory. As such, in practice the SNR is only limited by the amount of available computational
作者: 狂熱語言    時間: 2025-3-25 19:58
Abhyudaya Pandey,Sandipan Mukherjee,Sandal Bajaj,Annapurna Jonnalagaddars. The operation of the full look-ahead algorithm, an algorithm that can be found in open literate and that performs an exhaustive search for the best solution within the look-ahead depth, is reviewed. With these insights the feasibility of an analog-to-digital converter with look-ahead is investig
作者: V切開    時間: 2025-3-26 03:06

作者: 教唆    時間: 2025-3-26 05:50
Extended Lifetime and Reliable Data Transmission in Wireless Sensor Networks with Multiple Sinks,mulations show that with our trust model incorporated in the CASS algorithm can minimize the packet drop rate in the presence of a different number of unreliable nodes while trying to maximize the lifetime of the sensor network with the use of CASS-Reliable and multiple sinks. It is also observed th
作者: Madrigal    時間: 2025-3-26 08:51

作者: 課程    時間: 2025-3-26 14:58

作者: 愛得痛了    時間: 2025-3-26 18:16
2190-3018 ntelligence and sustainability.Covers novel concepts of meme.The proceedings covers advanced and multi-disciplinary research on design of smart computing and informatics. The theme of the book broadly focuses on various innovation paradigms in system knowledge, intelligence and sustainability that m
作者: 寬容    時間: 2025-3-26 21:39
Identification of Meme Genre and Its Social Impact,hidden patterns like a social incident, a soccer game, a war or speeches by a public figures. The paper aims to produce a multivariate graph with the source of memes as nodes which are connected to other sources sharing the same meme using edges. The graph is then analyzed to identify patterns and genre of popular memes.
作者: Host142    時間: 2025-3-27 01:31

作者: 炸壞    時間: 2025-3-27 08:32
A Secure and Hybrid Approach for Key Escrow Problem and to Enhance Authentic Mobile Wallets, and the information transacted through the mobile device. In this paper, a hybrid technique is proposed to provide authentication and to solve the key escrow problem. This approach would pay a way to authorize the data and can provide a fair cryptography environment in the transaction.
作者: 纖細    時間: 2025-3-27 09:49
Contrast-Enhanced Recursive Visual Cryptography Scheme Based on Additional Basis Matrices,emes. The proposed model provides improved contrast and reduces the noise in the recreated image without any additional computation. This scheme uses the new pixel patterns to enhance the contrast of the decrypted image. The contrast of the recursive visual cryptography scheme can be enhanced based on new pixel patterns for white pixels.
作者: Calculus    時間: 2025-3-27 15:38
Scheme for Unstructured Knowledge Representation in Medical Expert System for Low Back Pain Managemting clinical records. The frames related to a patient collectively form a frame system, where one frame may point to other frames. The proposed representation scheme is complete, consistent, and free from redundancy.
作者: 縮影    時間: 2025-3-27 19:19

作者: Delirium    時間: 2025-3-27 23:12

作者: covert    時間: 2025-3-28 03:57

作者: 散開    時間: 2025-3-28 08:34
Conference proceedings 2019ms in society, environment and industries. The volume publishes quality work pertaining to the scope of the conference which is extended towards deployment of emerging computational and knowledge transfer approaches, optimizing solutions in varied disciplines of science, technology and healthcare..
作者: 重疊    時間: 2025-3-28 12:18
An Adaptive ARP Approach for Fog-Based RSU Utilization,nal cloud computing model. One best solution emerged, is the Fog Computing, which provides services and resources at the network’s edge. In this paper, we consider one of the IoT applications in smart cities, Vehicular Monitorization. Every vehicle in the smart cities communicates their information
作者: EVICT    時間: 2025-3-28 15:32
Identification of Meme Genre and Its Social Impact,ocial media. In this paper we analyze a dataset which consist of data related to meme sharing and corresponding phrases used in the process. Popularity of memes is tracked followed by timestamps to identify the most shared memes across the internet. Meme sharing or propagation is also based on some
作者: 無所不知    時間: 2025-3-28 20:11

作者: Texture    時間: 2025-3-29 02:21

作者: 花費    時間: 2025-3-29 03:42
An Unvarying Orthogonal Search with Small Triangle Pattern for Video Coding, the complexity in computing the motion estimation in block matching algorithm. This algorithm basically employs an orthogonal search pattern with uniform step size. A fast inner search is applied by choosing a small triangle pattern adjacent to the region with the minimum group sum distortion that
作者: insipid    時間: 2025-3-29 08:25
Imputation of Multivariate Attribute Values in Big Data,ause of human errors and equipment errors. Several missing data handling and treating techniques exist based on the type of missing values, using statistical or data mining approaches. Efficiency in imputation can be achieved through multiple imputation techniques. But, these imputation techniques h
作者: 拍下盜公款    時間: 2025-3-29 12:38
,Retrofitting of Sensors in BLDC Motor Based e-Vehicle—A Step Towards Intelligent Transportation Sysy technologies are introduced to minimized vehicular accidents. We all know that India is developing country and there are many changes held in the path of development of our country such as change in road styles. Other than many countries India has a poor level of technologies improved. Government
作者: 狂亂    時間: 2025-3-29 19:07

作者: Insul島    時間: 2025-3-29 20:03

作者: 漂浮    時間: 2025-3-30 00:56

作者: 豪華    時間: 2025-3-30 04:23

作者: Repatriate    時間: 2025-3-30 11:40
Modeling of PV Powered Seven-Level Inverter for Power Quality Improvement,ed. SRF is utilized for reference input current extraction and to create pulses for the SHAPF. The principle point of the cascaded bridge is to dispense harmonics, enhance power factor, and reactive energy compensation of the single-phase distribution framework. The suggested control calculation has
作者: 染色體    時間: 2025-3-30 15:50

作者: 性冷淡    時間: 2025-3-30 17:42

作者: considerable    時間: 2025-3-30 21:12
Detection and Classification of Trendy Topics for Recommendation Based on Twitter Data on Differentmedia. At the same time, this is continuously generating huge amounts of raw un-structured data which has proved to be a complex task for analysis. In this paper, a solution based on classification of selected features is proposed to address the problem. In the proposed work, we considered limited n
作者: 招募    時間: 2025-3-31 04:22

作者: fibroblast    時間: 2025-3-31 09:02
An Unbiased Privacy Sustaining Approach Based on SGO for Distortion of Data Sets to Shield the Senstechnology in data mining has permitted to extract the unknown patterns from the repositories of enormous data. On the other hand, it raises problem of revealing the confidential patterns when the data is shared to the others. Privacy-preserving data mining is an emerging area for the research in th
作者: Fsh238    時間: 2025-3-31 10:51
Contrast-Enhanced Recursive Visual Cryptography Scheme Based on Additional Basis Matrices,of the secret image and the secret image cannot be obtained if there are .-1 shares together. The security and reliability of the visual cryptography scheme can be greatly enhanced with recursion. The contrast of the reconstructed secret image is less compared to the existing visual cryptography sch
作者: hemoglobin    時間: 2025-3-31 17:11
Authenticity and Integrity Enhanced Active Digital Image Forensics Based on Visual Cryptography,es. Digital image watermarking and digital signatures are presently used in active digital image forensics, but these methods provide only the authenticity and certain level of integrity and robustness. In this paper, we proposed a new method for active digital image forensics based on visual crypto
作者: Ejaculate    時間: 2025-3-31 20:02
Conference proceedings 2019n various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solution to varied problems in society, environment and industries. The volume publishes quality work pertaining to the scope of the conference which is extended towards deplo
作者: 胰島素    時間: 2025-3-31 22:45

作者: LAITY    時間: 2025-4-1 05:13

作者: 否決    時間: 2025-4-1 06:50
,Shannon’s Entropy and Watershed Algorithm Based Technique to Inspect Ischemic Stroke Wound,RG) and the Markov Random Field (MRF). The outcome of this study authenticates that, WS provides enhanced picture likeness indices, like Jaccard (90.34%), Dice (94.92%), FPR (7.77%) and FNR (2.65%) compared with SRG and MRF.
作者: calamity    時間: 2025-4-1 12:02

作者: 不規(guī)則的跳動    時間: 2025-4-1 16:15
Statistical Analysis of EMG-Based Features for Different Hand Movements,ng fuzzy entropy measure. ANOVA on prominent features shows a linear relationship between features and different hand movements and therefore these prominent features can be used to activate the prosthetic hand.
作者: calamity    時間: 2025-4-1 20:26

作者: Modicum    時間: 2025-4-2 01:26





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
叶城县| 屏东县| 墨脱县| 任丘市| 马边| 枞阳县| 孟连| 灵武市| 扎赉特旗| 郸城县| 库车县| 临桂县| 渭源县| 洛浦县| 安吉县| 独山县| 临海市| 铁岭市| 蓬安县| 永吉县| 呈贡县| 苏州市| 赫章县| 甘洛县| 铁岭市| 南平市| 清镇市| 天峻县| 静乐县| 濮阳市| 大方县| 夏河县| 平顺县| 伊金霍洛旗| 阿坝| 鄯善县| 府谷县| 广灵县| 东丽区| 凤阳县| 绩溪县|