找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Soft Computing: Theories and Applications; Proceedings of SoCTA Millie Pant,Kanad Ray,Anirban Bandyopadhyay Conference proceedings 2018 Spr

[复制链接]
楼主: deduce
发表于 2025-3-25 06:20:51 | 显示全部楼层
Integration of GIS, Spatial Data Mining, and Fuzzy Logic for Agricultural Intelligence,mined pattern, Phalodi taluk of Jodhpur district contains the largest wasteland area and the area under the medium type of utilization is the largest. It could be suggested that wastelands having a substantial groundwater underneath can be irrigated for agriculture and/or producing fodder and firewood.
发表于 2025-3-25 08:23:03 | 显示全部楼层
发表于 2025-3-25 11:52:56 | 显示全部楼层
发表于 2025-3-25 17:36:10 | 显示全部楼层
发表于 2025-3-25 22:01:48 | 显示全部楼层
发表于 2025-3-26 01:21:44 | 显示全部楼层
Modified Critical Path and Top-Level Attributes (MCPTL)-Based Task Scheduling Algorithm in Parallelrmation of an application program into task graph where tasks of the graph are allocated to the available processors. In this paper, we have proposed a new task scheduling algorithm which is a modified version of Critical Path and Top-Level Attributes-based Scheduling (CPTL) algorithm. This new algo
发表于 2025-3-26 06:37:10 | 显示全部楼层
Critical Path Problem for Scheduling Using Genetic Algorithm,scheduling the critical activities. The problem reduces to the longest path problem, which is NP as against the shortest path problem. The longest path is an important NP-hard problem, which finds its applications in many other areas like graph drawing, sequence alignment algorithms, etc. The proble
发表于 2025-3-26 08:36:02 | 显示全部楼层
A Robust Digital Image Watermarking Algorithm Using DWT and SVD, work. In this method, first, the original image of size 256 × 256 is DWT decomposed into the third level using Haar wavelet providing the four sub-bands LL3, LH3, HL3, and HH3. After that, SVD is applied on these sub-bands to get the diagonal matrices of singular values. The watermark image is then
发表于 2025-3-26 13:36:13 | 显示全部楼层
A Novel and Secure Multiparty Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curding theory, pseudorandom bit generation, number theory algorithms, etc. Actually, elliptic curve cryptography (ECC) is an alternative technique for conventional asymmetric cryptography like RSA, DSA, and Diffie–Hellman key exchange scheme. Instead of larger key size, ECC uses smaller key size to pr
发表于 2025-3-26 18:09:39 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-15 09:27
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表