reserve 发表于 2025-3-26 21:56:24

http://reply.papertrans.cn/88/8706/870542/870542_31.png

Crater 发表于 2025-3-27 03:20:20

http://reply.papertrans.cn/88/8706/870542/870542_32.png

失败主义者 发表于 2025-3-27 07:34:55

Novel Miniaturized Microstrip Patch Antenna for Body Centric Wireless Communication in ISM Band,ems and radio frequency-linked telemetry. In this paper, on-body performance and analysis of various wearable square-shaped spiral cut MSPAs are investigated by measuring reflection coefficient, radiation pattern and impact of human body equivalent model. This antenna basically covers the industrial

Musket 发表于 2025-3-27 10:25:41

Recognition of Noisy Numbers Using Neural Network,er recognition algorithms for recognition of handwriting, numbers, and alphabets using artificial neural network. These algorithms used multilayer perceptron neural network and large number of input neurons for the recognition. Here, we propose an efficient supervised single-layer perceptron learnin

设施 发表于 2025-3-27 14:31:12

Pollution Check Control Using License Plate Extraction via Image Processing, owner by using registration number. So initially, we extract the registration number from the license plate after that compare the registration number to the local database. If registration number is stored in the database, then we retrieve the detail of the vehicle owner. The first key step of thi

入会 发表于 2025-3-27 18:06:53

Watermarking Technology in QR Code with Various Attacks,solve this problem. This is built using a digital watermark_wavelet_turn invisible for a QR code from the image. Converted into the investment process, a binary image, Logo, watermark adequate water, then put them in sub-selected band. Experimental results show that in all cases, this resistance to

Arthritis 发表于 2025-3-27 23:05:16

Cognitive Networked Redemption Operational Conception and Devising (CNROCD),and network threats. Complex movements and new risks and threats systematically paved the way for the language has become a new field of land, air, sea, and space. It is quite clear that the cyber threat is likely to continue to intervene in theaters in the world of cyber year. But sometimes it is d

–DOX 发表于 2025-3-28 04:09:40

Secure Group Authentication Scheme for LTE-Advanced,n layer telephonic and video conferencing. In this scenario, security services are necessary to provide authenticity, integrity, and communication privacy. Even though one-to-one communication is well established with good standard and security, still the group communication remains unexplored, sinc

羞辱 发表于 2025-3-28 09:34:28

Modeling the Alterations in Calcium Homeostasis in the Presence of Protein and VGCC for Alzheimericuses of the Alzheimer’s are many, but the present piece of work focuses on the alterations taking place in the calcium homeostasis in the presence of protein, i.e., buffer and voltage gated calcium channel (VGCC). The fundamental nature of the buffer is to decrease the cytosolic calcium level, where

弹药 发表于 2025-3-28 12:59:31

Solution of Multi-objective Portfolio Optimization Problem Using Multi-objective Synergetic Differeains the maximum benefit out of it. In this paper, a bi-objective portfolio optimization model is considered, where the objectives are to maximize the return and minimize the risk, and is solved using multi-objective synergetic differential evolution (MO-SDE).
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Soft Computing: Theories and Applications; Proceedings of SoCTA Millie Pant,Kanad Ray,Anirban Bandyopadhyay Conference proceedings 2018 Spr