派博傳思國際中心

標題: Titlebook: Advances in Data and Information Sciences; Proceedings of ICDIS Mohan L. Kolhe,Shailesh Tiwari,Krishn K. Mishra Conference proceedings 2020 [打印本頁]

作者: clot-buster    時間: 2025-3-21 17:26
書目名稱Advances in Data and Information Sciences影響因子(影響力)




書目名稱Advances in Data and Information Sciences影響因子(影響力)學科排名




書目名稱Advances in Data and Information Sciences網(wǎng)絡公開度




書目名稱Advances in Data and Information Sciences網(wǎng)絡公開度學科排名




書目名稱Advances in Data and Information Sciences被引頻次




書目名稱Advances in Data and Information Sciences被引頻次學科排名




書目名稱Advances in Data and Information Sciences年度引用




書目名稱Advances in Data and Information Sciences年度引用學科排名




書目名稱Advances in Data and Information Sciences讀者反饋




書目名稱Advances in Data and Information Sciences讀者反饋學科排名





作者: forecast    時間: 2025-3-21 22:32

作者: Living-Will    時間: 2025-3-22 04:04
Causal Overdetermination and Contextualismacking continuous end-to-end connectivity, having low data rate and high propagation delay. Routing of bundles is an area of interest in DTN. Spray and Wait is a DTN routing protocol that outstrips other DTN routing protocols ProPHET, Epidemic in performance metric overhead ratio. The performance of
作者: 和藹    時間: 2025-3-22 07:34
Causal Pluralism in the Life Sciencesrecent developments and challenges of network-induced delays due to inclusion of data network in NCSs. Network delays deteriorate the control performance and stability of the NCSs. The time-varying delays can be measured in real time by calculating the time difference of sending and receiving contro
作者: probate    時間: 2025-3-22 10:13
Permissive and Instructive Causes,at of an image. So to confuse the attacker, this paper proposes a technique that encrypts the text into image using piecewise linear chaotic map (PWLCM). A text file can be taken as input and the proposed algorithm will convert it into a cipher image, which can then be converted back by the decrypti
作者: collateral    時間: 2025-3-22 14:58
https://doi.org/10.1007/978-3-642-95738-3T is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years. The pace at which new devices are being integrated into the system will profoundly impa
作者: 大雨    時間: 2025-3-22 20:26
https://doi.org/10.1007/978-3-642-95738-3hich is based on the peer-to-peer network method. As the blockchain is mainly developed for implementation in the virtual cryptocurrency such as bitcoin, so its main purpose is clear that is security. Even though the healthcare industry is leading in majority of fields whether it is technology, equi
作者: 虛度    時間: 2025-3-23 01:00
https://doi.org/10.1007/978-1-4020-8817-9tions, social media, images, audios, videos etc. are the major sources responsible for generating big data in huge capacity and diversity. This usually consists of large volumes of complex and growing data sets with numerous self-regulating sources that are difficult to process with the conventional
作者: negligence    時間: 2025-3-23 04:03
https://doi.org/10.1007/978-1-4020-8817-9 has two times DNA-encoding–decoding operations along with DNA-permutation and DNA-diffusion operations to get the cipher image. On comparison with other processes, the advantage of this algorithm is easy to compute but confuses a cryptanalyst a lot. Apart from that dual-layer DNA-encoding–decoding
作者: Urea508    時間: 2025-3-23 08:11
Epistemology of Causal Modelling,cryptographic researchers. In recent years, for securing digital images multiple encryption techniques have been proposed. Among them, one-dimensional (1D) chaotic map based image encryption techniques render better security in storage and transmission of images.?1D chaotic maps are simple in struct
作者: 植物群    時間: 2025-3-23 13:28
Epistemology of Causal Modelling,ough the internet. Cloud Computing and Wireless Sensor Networks (WSN) are integrated for efficient management in IoT. This integration is known as Sensor Cloud. This technology has a lot of applications due to the continuous development of information and communication technology. Although sensor cl
作者: 價值在貶值    時間: 2025-3-23 16:51
Epistemology of Causal Modelling,o the complexity owing to the associated factors like mobility, limited power, and weak wireless connectivity. This work presents a hybrid PSO-GA (Particle Swarm Optimization––Genetic Algorithm) based resource allocation strategy for reliable execution of jobs within a reasonable time for the comput
作者: GORGE    時間: 2025-3-23 19:51

作者: 隨意    時間: 2025-3-23 23:52

作者: sparse    時間: 2025-3-24 05:03

作者: gene-therapy    時間: 2025-3-24 09:14
https://doi.org/10.1007/978-1-4020-8817-9nt from a normal person’s brain waves. This paper exploits these underlying properties of EEG using Lyapunov exponent and approximate entropy and proposes a novel statistical feature namely Gini’s coefficient. In this paper, we propose an automated system for detecting seizure using statistical and
作者: 一再遛    時間: 2025-3-24 14:08
Developmental Laterality Research: Childhoodusers. The resources that the cloud users use will be in form of shared pool. If any resources are requested by the end-users, they are provided in a shared pool. Nowadays, the resources are requested only in dynamic basis. Upon the requisition by the user, the resources are provided to them. From t
作者: homocysteine    時間: 2025-3-24 17:15

作者: breadth    時間: 2025-3-24 20:23

作者: 淘氣    時間: 2025-3-25 02:22

作者: Ancillary    時間: 2025-3-25 06:09
Advances in Data and Information Sciences978-981-15-0694-9Series ISSN 2367-3370 Series E-ISSN 2367-3389
作者: 忘恩負義的人    時間: 2025-3-25 08:20

作者: athlete’s-foot    時間: 2025-3-25 11:56

作者: 黃瓜    時間: 2025-3-25 17:07

作者: 鄙視讀作    時間: 2025-3-25 22:50

作者: 腐敗    時間: 2025-3-26 00:27

作者: 重疊    時間: 2025-3-26 06:07

作者: Cholagogue    時間: 2025-3-26 12:13
https://doi.org/10.1007/978-1-4020-8817-9twork. We have implemented different tree topologies on OpenFlow controller using Mininet network emulator. We considered OpenFlow messages as a performance metric for evaluating the performance of the network with different tree topologies.
作者: 可互換    時間: 2025-3-26 13:28
Conference proceedings 2020iences (ICDIS 2019), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on March 29–30, 2019. In chapters written by leading researchers, developers, and practitioner from academia and industry, it covers virtually all aspects of computational sciences and information security, in
作者: exostosis    時間: 2025-3-26 18:30
Causal Pluralism in the Life Sciencesl packets. Various compensation techniques are reviewed to mitigate the effect of constant, time-varying, and stochastic delay. Lastly, some conclusions are drawn and the future research scope is directed.
作者: 運氣    時間: 2025-3-27 00:27
https://doi.org/10.1007/978-1-4020-8817-9machine learning algorithm. The data used was publicly available with five different classes (normal to seizure). Linear discriminant analysis (LDA) was used to classify the extracted features. The proposed method gives the best accuracy of 100% in detecting seizure from the EEG.
作者: 使增至最大    時間: 2025-3-27 04:53

作者: 失敗主義者    時間: 2025-3-27 07:46

作者: malign    時間: 2025-3-27 10:51

作者: ALE    時間: 2025-3-27 15:36
https://doi.org/10.1007/978-3-642-95738-3h care as they are very crucial and can be tempered by hackers which can lead to serious problems. Therefore, such critical data must need to be secured with blockchain as it makes it very difficult to tamper with data. This paper deals with the implementation of the blockchain to solve the above-mentioned problems.
作者: Gratulate    時間: 2025-3-27 18:14

作者: neolith    時間: 2025-3-28 00:29

作者: 接合    時間: 2025-3-28 02:08
Epistemology of Causal Modelling,traditional security architectures and techniques cannot be applied. Therefore, it requires a different set of specialized techniques and architecture to provide security to the IoT network. This paper focuses on the security requirements, current state of art as well as future directions in the field of IoT.
作者: CEDE    時間: 2025-3-28 06:41

作者: Pericarditis    時間: 2025-3-28 10:33
feedstock and food production.Aids with resource policy-makThis book addressed the pressing challenges of climate change, land scarcity, and food security, offering a comprehensive synthesis of research on using, managing, and reclaiming marginal lands in Africa. Unfavourable climatic conditions an
作者: disrupt    時間: 2025-3-28 15:13

作者: BRAND    時間: 2025-3-28 21:25
Security Threats, Attacks, and Possible Countermeasures in Internet of Thingsnovel products from marine microorganisms.Includes supplemen.This book describes the state-of-the-artconcerning the ‘marine microbiome’ and its uses in biotechnology. The firstpart discusses the diversity and ecology of marine microorganisms and viruses,including all three domains of life: Bacteria,
作者: Redundant    時間: 2025-3-29 02:30
A Review of Big Data Challenges and Preserving Privacy in Big Dataature?by?a?comparative, theoretically informed analysis of EU maritime foreign and?security policies across five cases: the EU’s Maritime Security Strategy and action plan;?the EU’s two naval missions, Atalanta and Sophia;?EU Arctic policies, and;?EU policies towards the Maritime Labour Convention.
作者: 歌曲    時間: 2025-3-29 05:41
Simple Permutation and Diffusion Operation Based Image Encryption Using Various One-Dimensional Chaol resources and cooperative products.Adds an economic and so.This book develops John Rawls’s theory of justice by adding reality-based analyses. This is accomplished by answering the question of who makes rules and how, and by providing new answers to three of today’s most practical and critical iss
作者: amenity    時間: 2025-3-29 08:46

作者: Malfunction    時間: 2025-3-29 12:53
An Extended Playfair Encryption Technique Based on Fibonacci Seriesres our understandings of adults’ expectations of children a.This book offers rich critical perspectives on the marketing of a variety of toys, brands, and product categories. Topics include marketing undertaken by specific children’s toy brands such as American Girl, Barbie, Disney, GoldieBlox, Fis
作者: 泥土謙卑    時間: 2025-3-29 18:18
An Automated System for Epileptic Seizure Detection Using EEGn the cut-throat world of marketing scholarship.Provides an .?Service-Dominant logic can be described as a mind-set for a unified understanding of the purpose and nature of organizations, markets and society. A concept that was first introduced by Vargo and Lusch in 2004, S-D logic has generated not
作者: infarct    時間: 2025-3-29 22:14
Addressing Security and Privacy Issues of Load Balancing Using Hybrid Algorithme the US entered World War II, the entire apparatus of the US government was mobilized to “market” the war to Americans who were incredulous and horrified about the attack at Pearl Harbor. Americans wanted immediate and detailed information from the US government and the nation’s media and entertain
作者: Budget    時間: 2025-3-30 02:45
Key Management Scheme for Secure Group Communicationties on marketing-finance topics such as marketing assets or marketing metrics, only few scholars have looked at the organizational interface between marketing and finance. We know surprisingly little about how marketing, sales, and finance units actually work together within organizations.In his Ph
作者: BILIO    時間: 2025-3-30 05:37
Two-Dimensional Hybrid Authentication for ATM Transactionspply of women and the effect of marriage on productivity at While this book contains numerous facts and empirical findings and touches on policy issues, its main contribution to the existing literature lies in the theoretical perspective it offers. The core of this book is a general equilibrium theo
作者: abnegate    時間: 2025-3-30 10:01

作者: 圣歌    時間: 2025-3-30 15:07
Security Threats, Attacks, and Possible Countermeasures in Internet of Things and couldrepresent a hidden treasure for human society. Accordingly, this book is also intendedto connect academics and industry, providing essential information for microbiologistsfrom both fields.?.978-3-319-81418-6978-3-319-33000-6
作者: PANT    時間: 2025-3-30 17:09

作者: 充滿裝飾    時間: 2025-3-30 22:47
An Automated System for Epileptic Seizure Detection Using EEG examining the revisions to its foundational premises and axioms and the introduction of new perspectives such as systems theory. It is the first book-length rhetorical analysis of a single strand of marketing 978-3-031-46512-3978-3-031-46510-9
作者: 憤怒事實    時間: 2025-3-31 04:00
Weighted Dissemination of Bundles in?Probabilistic Spray and Wait Routing Protocol how privilege manifests in higher education, and essentially taxes the efforts of those from marginalised backgrounds hoping to achieve equitable successes with their privileged peers. The book will be of interest to students and scholars in the fields of higher education administration and policy,
作者: 過于光澤    時間: 2025-3-31 05:05

作者: abysmal    時間: 2025-3-31 10:26

作者: 細胞    時間: 2025-3-31 17:08
An Extended Playfair Encryption Technique Based on Fibonacci Seriesertain toys are meant for and what various toys and brands can signify about their owners’ identities—have implications for our understandings of adults’ expectations of children and of broader societal norms into which children are being socialized..978-3-030-62883-3978-3-030-62881-9
作者: creditor    時間: 2025-3-31 18:01

作者: pericardium    時間: 2025-4-1 00:24
Key Management Scheme for Secure Group Communicationea of the marketing-sales-finance triangle and explores eight finance-related key interaction fields and decision areas: (1) Plans & Budgets, (2) Reports & Analyses, (3) Cost Optimization, (4) Calculations & Investment Management, (5) Financial Accounting, (6) Debtor Management, (7) Compliance & Ris
作者: PALSY    時間: 2025-4-1 05:23





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
惠州市| 奉化市| 泰兴市| 永济市| 门头沟区| 平湖市| 华安县| 五指山市| 金塔县| 涞水县| 马公市| 大名县| 弥勒县| 崇文区| 西贡区| 纳雍县| 上思县| 宁化县| 乡宁县| 子长县| 衡东县| 苏尼特左旗| 青铜峡市| 仁化县| 鄂托克旗| 花莲市| 白山市| 独山县| 濉溪县| 科技| 柘荣县| 蒙自县| 扎鲁特旗| 东台市| 贵州省| 凌源市| 新乐市| 五大连池市| 金堂县| 高陵县| 乌拉特后旗|