松驰 发表于 2025-3-26 21:09:13

A Survey of Computer Vision Based Corrosion Detection Approaches,dely being used for the corrosion detection in metallic surface. This non-destructive approach provides cost effective, fast and reasonably accurate results. Several algorithms have been developed by different researchers and research groups for detecting corrosion using digital image processing tec

身体萌芽 发表于 2025-3-27 04:56:38

Word Sense Ambiguity in Question Sentence Translation: A Review,machine translation, WSD plays a vital role in improving the accuracy of the translation. The automated translation of question papers from English to Hindi is one such key area which requires suitable WSD techniques to resolve ambiguity in a question word. When machine translates question sentences

urethritis 发表于 2025-3-27 05:36:23

Implementing a Hybrid Crypto-coding Algorithm for an Image on FPGA,are used as implementation platforms in image processing, as its structure exploits the temporal and spatial parallelism. The algorithm aims at implementing security and reliability in which encryption and encoding are performed in a single step using Bezier curve and Galois field GF (2.). The syste

COUCH 发表于 2025-3-27 11:54:52

Realization of FPGA Based PID Controller for Speed Control of DC Motor Using Xilinx SysGen,D Controllers are preferred because of their improved settling time and are small in size, consume power efficiently and provide high speed of operation compared to software based PID controllers or microprocessor/microcontroller based PID controllers. The effort has been taken to implement the digi

Hallmark 发表于 2025-3-27 15:59:28

E-Negotiation: Emerging Trends in ADR, childhood to adolescents from a chocolate to bike for getting good marks in the examination. But besides this we never realize that sometimes this acumen can help us becoming one of the successful negotiators in our professional life. Earlier in case of disputes the corporate houses prefer to have

长矛 发表于 2025-3-27 18:08:57

Enhancement of Security in AODV Routing Protocol Using Node Trust Path Trust Secure AODV (NTPTSAODVrequiring any fixed infrastructure or centralized administration. The nodes of MANETs are always susceptible to compromise. In such scenario, designing a secure routing protocol has been a major challenge for last many years. In this paper, we propose Node Trust Path Trust Secure AODV routing protoc

杀菌剂 发表于 2025-3-28 00:04:21

Natural Language Interface for Multilingual Database,Here, communication between different states requires common platform or language of interpretation. Language happens to be a barrier in handling many societal issues including security of a state. The inter-state border activities reduce the efficiency of security deployments as the common goal of

祖传 发表于 2025-3-28 03:34:41

http://reply.papertrans.cn/47/4659/465875/465875_38.png

Cupping 发表于 2025-3-28 09:37:12

http://reply.papertrans.cn/47/4659/465875/465875_39.png

提名 发表于 2025-3-28 11:35:53

Ontology Merging: A Practical Perspective,ion alone does not suffice, efficient retrievability of the information has to be ensured for providing web services including question-answering. However, building an ontology for a vast domain as a whole is not straightforward. We view creation of an ontology as an incremental process, where small
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 2; Suresh Chandra Satapathy,Amit Joshi Conference p