派博傳思國(guó)際中心

標(biāo)題: Titlebook: Advances in Information and Communication Technology and Systems; Mykhailo Ilchenko,Leonid Uryvsky,Larysa Globa Conference proceedings 202 [打印本頁]

作者: Systole    時(shí)間: 2025-3-21 19:18
書目名稱Advances in Information and Communication Technology and Systems影響因子(影響力)




書目名稱Advances in Information and Communication Technology and Systems影響因子(影響力)學(xué)科排名




書目名稱Advances in Information and Communication Technology and Systems網(wǎng)絡(luò)公開度




書目名稱Advances in Information and Communication Technology and Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Advances in Information and Communication Technology and Systems被引頻次




書目名稱Advances in Information and Communication Technology and Systems被引頻次學(xué)科排名




書目名稱Advances in Information and Communication Technology and Systems年度引用




書目名稱Advances in Information and Communication Technology and Systems年度引用學(xué)科排名




書目名稱Advances in Information and Communication Technology and Systems讀者反饋




書目名稱Advances in Information and Communication Technology and Systems讀者反饋學(xué)科排名





作者: 指耕作    時(shí)間: 2025-3-21 21:55
Mathematics and its Applicationsor, and increasing safety on the roads. For example, during the winter season, municipal employees will not have to wait at night to intervene in road freezing. Employees will instantly monitor which roads are at risk of icing through the data collected from the vehicles on the road and municipal wo
作者: tariff    時(shí)間: 2025-3-22 01:15

作者: Urgency    時(shí)間: 2025-3-22 07:32
SpringerBriefs in Computer Scienceaphic systems, which are designed to generate secure pseudorandom sequences that can be used as cryptographic keys, passwords etc., are investigated. A comparative analysis of various biometric cryptosystems with the determination of their advantages and disadvantages is carried out. The perspective
作者: 敏捷    時(shí)間: 2025-3-22 09:45

作者: Living-Will    時(shí)間: 2025-3-22 14:16

作者: hieroglyphic    時(shí)間: 2025-3-22 20:04
https://doi.org/10.1007/978-1-4842-6168-2 for relevant information are presented. The model of aggregate displaying portal thematic resources is given. Formation means in the use of scientific and educational portals on the base of the component architecture of WEB-semantics services are determined and it describes their mechanisms applica
作者: 鐵塔等    時(shí)間: 2025-3-22 23:57

作者: 窗簾等    時(shí)間: 2025-3-23 04:43
https://doi.org/10.1007/978-3-0348-7811-1d. The tasks stated were reduced to solving the optimization problems of integer and mixed integer linear programming with maximization of the number of paths and their bandwidth and minimization of their compromising probability in the presence of linear constraints since the routing variables are
作者: 問到了燒瓶    時(shí)間: 2025-3-23 06:43
Guerino Mazzola,Maria Mannone,Yan Pangn of networks of various technologies at the level of data flows. These tasks are solved at the control level, the main functional elements of which are the functional blocks CSCF, P-CSCF, I-CSCF, S-CSCF. When designing the IMS management level, it is necessary to determine the amount of traffic tha
作者: Ingredient    時(shí)間: 2025-3-23 09:59
Guerino Mazzola,Maria Mannone,Yan Pang user biometric data is the method of this work. The common methods of biometric authentication, existing methods for their protection and existing network steganography methods were analyzed. The method of remote biometric authentication using network steganography for various systems is presented.
作者: 偽造者    時(shí)間: 2025-3-23 16:34

作者: 上釉彩    時(shí)間: 2025-3-23 20:50
Cloud-Based Architecture Development to Share Vehicle and Traffic Information for Industry 4.0or, and increasing safety on the roads. For example, during the winter season, municipal employees will not have to wait at night to intervene in road freezing. Employees will instantly monitor which roads are at risk of icing through the data collected from the vehicles on the road and municipal wo
作者: ANIM    時(shí)間: 2025-3-23 22:36

作者: 疏遠(yuǎn)天際    時(shí)間: 2025-3-24 05:27
Biometric Cryptosystems: Overview, State-of-the-Art and Perspective Directionsaphic systems, which are designed to generate secure pseudorandom sequences that can be used as cryptographic keys, passwords etc., are investigated. A comparative analysis of various biometric cryptosystems with the determination of their advantages and disadvantages is carried out. The perspective
作者: 不能根除    時(shí)間: 2025-3-24 09:51
Biometric Authentication Using Convolutional Neural Networksks (spoofing attacks) is proposed. The method is based on the use of an artificial convolutional neural network which was trained using a Replay-Attack Database from Idiap Research Institute. The obtained results show high efficiency of the proposed method of detecting spoofing attacks: the probabil
作者: Oligarchy    時(shí)間: 2025-3-24 12:12

作者: Arbitrary    時(shí)間: 2025-3-24 17:12
Ontological Fundamentals of Scientific and Education Portals for relevant information are presented. The model of aggregate displaying portal thematic resources is given. Formation means in the use of scientific and educational portals on the base of the component architecture of WEB-semantics services are determined and it describes their mechanisms applica
作者: Iniquitous    時(shí)間: 2025-3-24 22:46

作者: Inkling    時(shí)間: 2025-3-25 00:09

作者: 縮短    時(shí)間: 2025-3-25 04:00

作者: outset    時(shí)間: 2025-3-25 09:55

作者: affinity    時(shí)間: 2025-3-25 12:10
Wireless Systems with New Cooperative Relaying Algorithm nodes. Therefore, the task of choosing the one for implementing cooperative transmission in practice becomes an important task. The paper presents a new method for selecting the best relay node, which takes into account a number of criteria, namely: node position, bit error rate, energy consumption
作者: MIRTH    時(shí)間: 2025-3-25 19:15
Advances in Information and Communication Technology and Systems
作者: 外星人    時(shí)間: 2025-3-25 22:29

作者: Functional    時(shí)間: 2025-3-26 02:03
2367-3370 nternational Scientific and Technical Conference of Modern C.This book highlights the most important research areas in Information and Communication Technologies as well as Radio Electronics, in particular contains publications on theory, applications, and design methods of Processing and Control in
作者: Nebulous    時(shí)間: 2025-3-26 07:49

作者: 去世    時(shí)間: 2025-3-26 11:21

作者: gait-cycle    時(shí)間: 2025-3-26 16:31
https://doi.org/10.1007/978-3-319-42937-3e results obtained can simultaneously improve the accuracy of the estimation of motion parameters, ensure the sustainability of the assessment process and the efficiency of managing the elements of the wireless sensor network FANET.
作者: OFF    時(shí)間: 2025-3-26 17:50
From Big Data to Smart Data: The Most Effective Approaches for Data Analyticsvelopment “Industry 4.0” processing of such data became considerably more complicated. However, so-called problem “Big Data” is hard to solve or resist nowadays. The paper discusses the Best Practises and Case Studies for Data Analytics aimed to overcoming of the Big Data problematics under a slogan: “From Big Data to Smart Data!”
作者: ingrate    時(shí)間: 2025-3-26 21:30

作者: Inflammation    時(shí)間: 2025-3-27 03:16
Estimation of the Motion Parameters of the UAVs FANET Using the Dynamic Filtering Methode results obtained can simultaneously improve the accuracy of the estimation of motion parameters, ensure the sustainability of the assessment process and the efficiency of managing the elements of the wireless sensor network FANET.
作者: 遺傳    時(shí)間: 2025-3-27 06:43

作者: Override    時(shí)間: 2025-3-27 09:26
The Support of a Convolution Operator,T into the development of Industry 4.0, and the integration of the global satellite Internet. The active desire of Ukraine in the structure of ITT to be at the level of world modern trends are emphasized.
作者: cacophony    時(shí)間: 2025-3-27 17:16
Architectures for Internet Connectivity, servicing streams process in network service providers tunnels. The methodology uses the allowable service node load calculation, overload prediction and live migration algorithms to seamlessly change the service node for the flow.
作者: 起波瀾    時(shí)間: 2025-3-27 20:17

作者: 抱狗不敢前    時(shí)間: 2025-3-27 22:32

作者: 領(lǐng)帶    時(shí)間: 2025-3-28 06:08
Conditionally Infinite Telecommunication Resource for Subscribers servicing streams process in network service providers tunnels. The methodology uses the allowable service node load calculation, overload prediction and live migration algorithms to seamlessly change the service node for the flow.
作者: Radiculopathy    時(shí)間: 2025-3-28 09:27
Different Extrapolation Methods in Problems of Forecastingn using wavelet- and spline-extrapolation. This will allow you to choose one or another extrapolation method to improve the accuracy of the forecast, while ensuring scalability and the ability to use it for various IoT applications to prevent network overloads.
作者: Adj異類的    時(shí)間: 2025-3-28 14:12
The Support of a Convolution Operator,elecommunication technologies (ITT) in the light of global trends are considered as a single technological complex. Key trends in the development of ITT have been identified, including, in the light of the new breakthrough achievements of 2019, which are associated with the further development of IT
作者: Diaphragm    時(shí)間: 2025-3-28 17:48
Rúben Sousa,Manuel Guerra,Semyon Yakubovichte large arrays of unmanaged, weakly structured, and non-configured data of various types, known as “Big Data”. With the acceleration of industrial development “Industry 4.0” processing of such data became considerably more complicated. However, so-called problem “Big Data” is hard to solve or resis
作者: 火花    時(shí)間: 2025-3-28 19:26
Mathematics and its Applicationsry 4.0, which is used to represent the current Industrial Revolution. This revolution encompasses many sectors from manufacturing to health care. With Industry 4.0, digital transformation can create value throughout the entire product lifecycle, support customer feedback, and provide advanced soluti
作者: SMART    時(shí)間: 2025-3-28 23:45

作者: Prostaglandins    時(shí)間: 2025-3-29 04:12
SpringerBriefs in Computer Science analysis methods, as well as increasing requirements for speed, security and reliability of used tools. In particular, it was announced an advent of universal quantum computers, which will be able to provide cryptanalysis with advanced calculation methods based on fundamentally new physical princip
作者: Melodrama    時(shí)間: 2025-3-29 09:57
https://doi.org/10.1007/978-981-19-8814-1es, but also on smartphones of ordinary users and in online applications. The problem of choosing one of the authentication methods remains urgent. This paper provides a comparative analysis of existing systems and concludes that one of the most common and persistent methods is facial authentication
作者: Antarctic    時(shí)間: 2025-3-29 13:21
CIFAR: 2D Neural Network with Blocks,yed in various network documents and represent a passive distributed system of knowledge in fact. This research considers transdisciplinary of such information resources as a metacategory that takes into account the hyperproperties of Big Data (Big Data), namely: a) reflection which implements the p
作者: originality    時(shí)間: 2025-3-29 18:36

作者: forecast    時(shí)間: 2025-3-29 20:11

作者: 上漲    時(shí)間: 2025-3-30 02:57

作者: 無所不知    時(shí)間: 2025-3-30 05:06
Architectures for Internet Connectivity,ces are combined into groups. A group of similar services with the same service process requirements is called a slice. Using software-defined networks (SDN) allows to deploy a management system slices and telecommunications resources that are allocated for their maintenance. This is possible only u
作者: 津貼    時(shí)間: 2025-3-30 08:25
Guerino Mazzola,Maria Mannone,Yan Pangg-term dependence is considered, which makes it difficult to forecast in practice. Using the different extrapolation method of spline-extrapolation based on linear, cubic and B-cubic spline function and wavelet-extrapolation based on Haar-wavelet, the results of forecasting of self-similar traffic a
作者: 打谷工具    時(shí)間: 2025-3-30 16:22

作者: Conquest    時(shí)間: 2025-3-30 17:48
Guerino Mazzola,Maria Mannone,Yan Pangfact that fingerprints, iris patterns, face geometry and other biometric data are unique and cannot be replaced. There are various methods for protecting biometric data, but the probability of compromise remains when this data is transmitted over the network. The article presents a method of remote
作者: Detain    時(shí)間: 2025-3-30 23:49

作者: landfill    時(shí)間: 2025-3-31 03:34
Guerino Mazzola,Maria Mannone,Yan Pangg the?survivability?of the formed radio channels are presented. The main increase in survivability is achieved through the use of adaptation over the frequency range using an additional reception channel for continuous analysis of interference conditions, using two or more data transmission channels
作者: 傲慢人    時(shí)間: 2025-3-31 07:24
https://doi.org/10.1007/978-3-319-42937-3estimate the motion parameters, the proposed stable dynamic filtering algorithm allows us to obtain estimates of coordinates and their derivatives. The results obtained can simultaneously improve the accuracy of the estimation of motion parameters, ensure the sustainability of the assessment process
作者: 終端    時(shí)間: 2025-3-31 11:32
Advances in Information and Communication Technology and Systems978-3-030-58359-0Series ISSN 2367-3370 Series E-ISSN 2367-3389




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
峡江县| 新龙县| 红原县| 漠河县| 阿图什市| 隆子县| 蕉岭县| 宜兰县| 邢台市| 武陟县| 广丰县| 康定县| 邵阳县| 上高县| 镇沅| 白水县| 宜兴市| 泗阳县| 保德县| 镇康县| 长垣县| 噶尔县| 荆州市| 定州市| 永兴县| 习水县| 扶余县| 布尔津县| 和龙市| 镇原县| 潜山县| 屏东县| 嘉兴市| 柳林县| 枣庄市| 龙山县| 岳西县| 井陉县| 香港 | 镇原县| 偃师市|