標題: Titlebook: Advances in Data and Information Sciences; Proceedings of ICDIS Mohan L. Kolhe,Shailesh Tiwari,Krishn K. Mishra Conference proceedings 2020 [打印本頁] 作者: clot-buster 時間: 2025-3-21 17:26
書目名稱Advances in Data and Information Sciences影響因子(影響力)
書目名稱Advances in Data and Information Sciences影響因子(影響力)學科排名
書目名稱Advances in Data and Information Sciences網(wǎng)絡公開度
書目名稱Advances in Data and Information Sciences網(wǎng)絡公開度學科排名
書目名稱Advances in Data and Information Sciences被引頻次
書目名稱Advances in Data and Information Sciences被引頻次學科排名
書目名稱Advances in Data and Information Sciences年度引用
書目名稱Advances in Data and Information Sciences年度引用學科排名
書目名稱Advances in Data and Information Sciences讀者反饋
書目名稱Advances in Data and Information Sciences讀者反饋學科排名
作者: forecast 時間: 2025-3-21 22:32 作者: Living-Will 時間: 2025-3-22 04:04
Causal Overdetermination and Contextualismacking continuous end-to-end connectivity, having low data rate and high propagation delay. Routing of bundles is an area of interest in DTN. Spray and Wait is a DTN routing protocol that outstrips other DTN routing protocols ProPHET, Epidemic in performance metric overhead ratio. The performance of作者: 和藹 時間: 2025-3-22 07:34
Causal Pluralism in the Life Sciencesrecent developments and challenges of network-induced delays due to inclusion of data network in NCSs. Network delays deteriorate the control performance and stability of the NCSs. The time-varying delays can be measured in real time by calculating the time difference of sending and receiving contro作者: probate 時間: 2025-3-22 10:13
Permissive and Instructive Causes,at of an image. So to confuse the attacker, this paper proposes a technique that encrypts the text into image using piecewise linear chaotic map (PWLCM). A text file can be taken as input and the proposed algorithm will convert it into a cipher image, which can then be converted back by the decrypti作者: collateral 時間: 2025-3-22 14:58
https://doi.org/10.1007/978-3-642-95738-3T is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years. The pace at which new devices are being integrated into the system will profoundly impa作者: 大雨 時間: 2025-3-22 20:26
https://doi.org/10.1007/978-3-642-95738-3hich is based on the peer-to-peer network method. As the blockchain is mainly developed for implementation in the virtual cryptocurrency such as bitcoin, so its main purpose is clear that is security. Even though the healthcare industry is leading in majority of fields whether it is technology, equi作者: 虛度 時間: 2025-3-23 01:00
https://doi.org/10.1007/978-1-4020-8817-9tions, social media, images, audios, videos etc. are the major sources responsible for generating big data in huge capacity and diversity. This usually consists of large volumes of complex and growing data sets with numerous self-regulating sources that are difficult to process with the conventional作者: negligence 時間: 2025-3-23 04:03
https://doi.org/10.1007/978-1-4020-8817-9 has two times DNA-encoding–decoding operations along with DNA-permutation and DNA-diffusion operations to get the cipher image. On comparison with other processes, the advantage of this algorithm is easy to compute but confuses a cryptanalyst a lot. Apart from that dual-layer DNA-encoding–decoding 作者: Urea508 時間: 2025-3-23 08:11
Epistemology of Causal Modelling,cryptographic researchers. In recent years, for securing digital images multiple encryption techniques have been proposed. Among them, one-dimensional (1D) chaotic map based image encryption techniques render better security in storage and transmission of images.?1D chaotic maps are simple in struct作者: 植物群 時間: 2025-3-23 13:28
Epistemology of Causal Modelling,ough the internet. Cloud Computing and Wireless Sensor Networks (WSN) are integrated for efficient management in IoT. This integration is known as Sensor Cloud. This technology has a lot of applications due to the continuous development of information and communication technology. Although sensor cl作者: 價值在貶值 時間: 2025-3-23 16:51
Epistemology of Causal Modelling,o the complexity owing to the associated factors like mobility, limited power, and weak wireless connectivity. This work presents a hybrid PSO-GA (Particle Swarm Optimization––Genetic Algorithm) based resource allocation strategy for reliable execution of jobs within a reasonable time for the comput作者: GORGE 時間: 2025-3-23 19:51 作者: 隨意 時間: 2025-3-23 23:52 作者: sparse 時間: 2025-3-24 05:03 作者: gene-therapy 時間: 2025-3-24 09:14
https://doi.org/10.1007/978-1-4020-8817-9nt from a normal person’s brain waves. This paper exploits these underlying properties of EEG using Lyapunov exponent and approximate entropy and proposes a novel statistical feature namely Gini’s coefficient. In this paper, we propose an automated system for detecting seizure using statistical and 作者: 一再遛 時間: 2025-3-24 14:08
Developmental Laterality Research: Childhoodusers. The resources that the cloud users use will be in form of shared pool. If any resources are requested by the end-users, they are provided in a shared pool. Nowadays, the resources are requested only in dynamic basis. Upon the requisition by the user, the resources are provided to them. From t作者: homocysteine 時間: 2025-3-24 17:15 作者: breadth 時間: 2025-3-24 20:23 作者: 淘氣 時間: 2025-3-25 02:22 作者: Ancillary 時間: 2025-3-25 06:09
Advances in Data and Information Sciences978-981-15-0694-9Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: 忘恩負義的人 時間: 2025-3-25 08:20 作者: athlete’s-foot 時間: 2025-3-25 11:56 作者: 黃瓜 時間: 2025-3-25 17:07 作者: 鄙視讀作 時間: 2025-3-25 22:50 作者: 腐敗 時間: 2025-3-26 00:27 作者: 重疊 時間: 2025-3-26 06:07 作者: Cholagogue 時間: 2025-3-26 12:13
https://doi.org/10.1007/978-1-4020-8817-9twork. We have implemented different tree topologies on OpenFlow controller using Mininet network emulator. We considered OpenFlow messages as a performance metric for evaluating the performance of the network with different tree topologies.作者: 可互換 時間: 2025-3-26 13:28
Conference proceedings 2020iences (ICDIS 2019), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on March 29–30, 2019. In chapters written by leading researchers, developers, and practitioner from academia and industry, it covers virtually all aspects of computational sciences and information security, in作者: exostosis 時間: 2025-3-26 18:30
Causal Pluralism in the Life Sciencesl packets. Various compensation techniques are reviewed to mitigate the effect of constant, time-varying, and stochastic delay. Lastly, some conclusions are drawn and the future research scope is directed.作者: 運氣 時間: 2025-3-27 00:27
https://doi.org/10.1007/978-1-4020-8817-9machine learning algorithm. The data used was publicly available with five different classes (normal to seizure). Linear discriminant analysis (LDA) was used to classify the extracted features. The proposed method gives the best accuracy of 100% in detecting seizure from the EEG.作者: 使增至最大 時間: 2025-3-27 04:53 作者: 失敗主義者 時間: 2025-3-27 07:46 作者: malign 時間: 2025-3-27 10:51 作者: ALE 時間: 2025-3-27 15:36
https://doi.org/10.1007/978-3-642-95738-3h care as they are very crucial and can be tempered by hackers which can lead to serious problems. Therefore, such critical data must need to be secured with blockchain as it makes it very difficult to tamper with data. This paper deals with the implementation of the blockchain to solve the above-mentioned problems.作者: Gratulate 時間: 2025-3-27 18:14 作者: neolith 時間: 2025-3-28 00:29 作者: 接合 時間: 2025-3-28 02:08
Epistemology of Causal Modelling,traditional security architectures and techniques cannot be applied. Therefore, it requires a different set of specialized techniques and architecture to provide security to the IoT network. This paper focuses on the security requirements, current state of art as well as future directions in the field of IoT.作者: CEDE 時間: 2025-3-28 06:41 作者: Pericarditis 時間: 2025-3-28 10:33
feedstock and food production.Aids with resource policy-makThis book addressed the pressing challenges of climate change, land scarcity, and food security, offering a comprehensive synthesis of research on using, managing, and reclaiming marginal lands in Africa. Unfavourable climatic conditions an作者: disrupt 時間: 2025-3-28 15:13 作者: BRAND 時間: 2025-3-28 21:25
Security Threats, Attacks, and Possible Countermeasures in Internet of Thingsnovel products from marine microorganisms.Includes supplemen.This book describes the state-of-the-artconcerning the ‘marine microbiome’ and its uses in biotechnology. The firstpart discusses the diversity and ecology of marine microorganisms and viruses,including all three domains of life: Bacteria,作者: Redundant 時間: 2025-3-29 02:30
A Review of Big Data Challenges and Preserving Privacy in Big Dataature?by?a?comparative, theoretically informed analysis of EU maritime foreign and?security policies across five cases: the EU’s Maritime Security Strategy and action plan;?the EU’s two naval missions, Atalanta and Sophia;?EU Arctic policies, and;?EU policies towards the Maritime Labour Convention. 作者: 歌曲 時間: 2025-3-29 05:41
Simple Permutation and Diffusion Operation Based Image Encryption Using Various One-Dimensional Chaol resources and cooperative products.Adds an economic and so.This book develops John Rawls’s theory of justice by adding reality-based analyses. This is accomplished by answering the question of who makes rules and how, and by providing new answers to three of today’s most practical and critical iss作者: amenity 時間: 2025-3-29 08:46 作者: Malfunction 時間: 2025-3-29 12:53
An Extended Playfair Encryption Technique Based on Fibonacci Seriesres our understandings of adults’ expectations of children a.This book offers rich critical perspectives on the marketing of a variety of toys, brands, and product categories. Topics include marketing undertaken by specific children’s toy brands such as American Girl, Barbie, Disney, GoldieBlox, Fis作者: 泥土謙卑 時間: 2025-3-29 18:18
An Automated System for Epileptic Seizure Detection Using EEGn the cut-throat world of marketing scholarship.Provides an .?Service-Dominant logic can be described as a mind-set for a unified understanding of the purpose and nature of organizations, markets and society. A concept that was first introduced by Vargo and Lusch in 2004, S-D logic has generated not作者: infarct 時間: 2025-3-29 22:14
Addressing Security and Privacy Issues of Load Balancing Using Hybrid Algorithme the US entered World War II, the entire apparatus of the US government was mobilized to “market” the war to Americans who were incredulous and horrified about the attack at Pearl Harbor. Americans wanted immediate and detailed information from the US government and the nation’s media and entertain作者: Budget 時間: 2025-3-30 02:45
Key Management Scheme for Secure Group Communicationties on marketing-finance topics such as marketing assets or marketing metrics, only few scholars have looked at the organizational interface between marketing and finance. We know surprisingly little about how marketing, sales, and finance units actually work together within organizations.In his Ph作者: BILIO 時間: 2025-3-30 05:37
Two-Dimensional Hybrid Authentication for ATM Transactionspply of women and the effect of marriage on productivity at While this book contains numerous facts and empirical findings and touches on policy issues, its main contribution to the existing literature lies in the theoretical perspective it offers. The core of this book is a general equilibrium theo作者: abnegate 時間: 2025-3-30 10:01 作者: 圣歌 時間: 2025-3-30 15:07
Security Threats, Attacks, and Possible Countermeasures in Internet of Things and couldrepresent a hidden treasure for human society. Accordingly, this book is also intendedto connect academics and industry, providing essential information for microbiologistsfrom both fields.?.978-3-319-81418-6978-3-319-33000-6作者: PANT 時間: 2025-3-30 17:09 作者: 充滿裝飾 時間: 2025-3-30 22:47
An Automated System for Epileptic Seizure Detection Using EEG examining the revisions to its foundational premises and axioms and the introduction of new perspectives such as systems theory. It is the first book-length rhetorical analysis of a single strand of marketing 978-3-031-46512-3978-3-031-46510-9作者: 憤怒事實 時間: 2025-3-31 04:00
Weighted Dissemination of Bundles in?Probabilistic Spray and Wait Routing Protocol how privilege manifests in higher education, and essentially taxes the efforts of those from marginalised backgrounds hoping to achieve equitable successes with their privileged peers. The book will be of interest to students and scholars in the fields of higher education administration and policy,作者: 過于光澤 時間: 2025-3-31 05:05 作者: abysmal 時間: 2025-3-31 10:26 作者: 細胞 時間: 2025-3-31 17:08
An Extended Playfair Encryption Technique Based on Fibonacci Seriesertain toys are meant for and what various toys and brands can signify about their owners’ identities—have implications for our understandings of adults’ expectations of children and of broader societal norms into which children are being socialized..978-3-030-62883-3978-3-030-62881-9作者: creditor 時間: 2025-3-31 18:01 作者: pericardium 時間: 2025-4-1 00:24
Key Management Scheme for Secure Group Communicationea of the marketing-sales-finance triangle and explores eight finance-related key interaction fields and decision areas: (1) Plans & Budgets, (2) Reports & Analyses, (3) Cost Optimization, (4) Calculations & Investment Management, (5) Financial Accounting, (6) Debtor Management, (7) Compliance & Ris作者: PALSY 時間: 2025-4-1 05:23