令人悲伤 发表于 2025-3-26 22:01:15

http://reply.papertrans.cn/48/4715/471402/471402_31.png

引导 发表于 2025-3-27 01:53:13

A Novel Access Control Mechanism Using Trustworthiness of Nodes in a Cross-Domain Cloud Environmentvery possible manner. When it comes to establishing access control mechanisms in a cross-domain virtual organization-based cloud environment, the situation becomes more cumbersome due to the lack of proper standardized solutions. In this paper, an approach is being defined which combines role-based

MAG 发表于 2025-3-27 08:07:50

OCR Based Number Plate Recognition Using LabVIEW,e the traffic violations. For tracking, identifying stolen vehicles and unauthorized use of vehicles, this number plate recognition technique is very helpful. A number plate detection system is used to develop a real-time application to monitor the violation of traffic rules. The first objective of

抑制 发表于 2025-3-27 12:17:15

Role of IoT in Healthcare: A Comprehensive Review,

洞穴 发表于 2025-3-27 14:02:12

Smart Attendance Monitoring System for Online Classes Using Facial Recognition,

Trypsin 发表于 2025-3-27 20:01:29

International Conference on Innovative Computing and CommunicationsProceedings of ICICC

Intentional 发表于 2025-3-27 23:18:39

Comparative Analysis of Image Segmentation Techniques for Real Field Crop Images,equired, accuracy, and similarity to the original image. Holistic image segmentation based on convolutional neural network, K means clustering, etc. algorithms applied to real field crop images. The grab cut algorithm proves very useful for real field crop image segmentation as it preserves original

六边形 发表于 2025-3-28 02:32:30

A Review on Virtual Machine Placement with ACO in Cloud Computing,y intake is to optimize the preliminary placement of digital machines. In the deployment method, many researchers use ant colony optimization (ACO) to save you immoderate electricity intake discounts. This is because of its effective comments mechanism and allotted retrieval method. This article inf

Precursor 发表于 2025-3-28 06:19:04

Locating Potholes with Internet of Things Technology Using Cloud Computing Analysis,verted into a suitable form. The Z-Thresh algorithm was used to accurately determine the location of the potholes as it considers the minimum value of the z-axis accelerometer as a threshold. The analysis is done over a cloud-based tool, which further informs the authorities about the locations of p

易怒 发表于 2025-3-28 10:43:49

,Distributed Consensus Mechanism with Novelty Classification Using Proof of Immune Algorithm, security. Proof of Immune Algorithm was proposed by leveraging the potential dendritic cell algorithm mimicking human immune system to provide consensus among peers involved in the lending process to enable trust.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: International Conference on Innovative Computing and Communications; Proceedings of ICICC Deepak Gupta,Ashish Khanna,Ajay Jaiswal Conferenc