標(biāo)題: Titlebook: Advances in Networked-Based Information Systems; The 23rd Internation Leonard Barolli,Kin Fun Li,Makoto Takizawa Conference proceedings 202 [打印本頁] 作者: Stimulant 時(shí)間: 2025-3-21 18:10
書目名稱Advances in Networked-Based Information Systems影響因子(影響力)
書目名稱Advances in Networked-Based Information Systems影響因子(影響力)學(xué)科排名
書目名稱Advances in Networked-Based Information Systems網(wǎng)絡(luò)公開度
書目名稱Advances in Networked-Based Information Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances in Networked-Based Information Systems被引頻次
書目名稱Advances in Networked-Based Information Systems被引頻次學(xué)科排名
書目名稱Advances in Networked-Based Information Systems年度引用
書目名稱Advances in Networked-Based Information Systems年度引用學(xué)科排名
書目名稱Advances in Networked-Based Information Systems讀者反饋
書目名稱Advances in Networked-Based Information Systems讀者反饋學(xué)科排名
作者: 最有利 時(shí)間: 2025-3-22 00:14 作者: 帶來的感覺 時(shí)間: 2025-3-22 04:24
A Fuzzy-Based System for Assessment of Available Edge Computing Resources in a Cloud-Fog-Edge SDN-Vemerging technologies to the Internet. The contribution of this chapter is two-fold; the first fold characterizes and presents applications of IoT sensor networks into three application domains, namely consumer IoT, commercial IoT, and Industrial IoT (IIoT). Consumer IoT includes applications such a作者: 難理解 時(shí)間: 2025-3-22 06:02 作者: 棲息地 時(shí)間: 2025-3-22 11:50
Performance Evaluation of WMN-PSOSA-DGA Simulation System Considering Uniform and Chi-Square Clientpath through increased investment in “green” projects is socially desirable in the modern era, its implementation is not so easy. The policy-makers, however, would sit comfortably if the imperative choice of the new “green” financial products turns out to be, in fact, obvious. This study explores sp作者: affect 時(shí)間: 2025-3-22 15:58
Strategies for Alternate Group Trip Planning Queries in Location-Based Services,olves the final physical transfer of goods to the customer, is particularly problematic for many customers, as delivery times are often unpredictable and/or not convenient. An increasingly prevalent alternative to conventional delivery is the collection/delivery point (CDP), where parcels are delive作者: 正常 時(shí)間: 2025-3-22 18:43
A Cost Analysis of Routing Algorithms in Pedestrian-Based Delay Tolerant Networks,icing, finance, taxation, currency and industry, involving a collection of economic, legal and regulatory, and executive measures. The government has made unprecedented endeavors to promote energy conservation and emissions reductions. Major measures, such as the campaign to save energy at thousands作者: Ancillary 時(shí)間: 2025-3-22 21:55 作者: 不能平靜 時(shí)間: 2025-3-23 02:22 作者: 玩笑 時(shí)間: 2025-3-23 07:14 作者: 咆哮 時(shí)間: 2025-3-23 12:17
The Antikythera Framework: A Novel Design Approach for Accommodating a Large Number of Web Servicesdrive social and economic change. A second is supporting green development to promote sustainable economic growth. In pursuing sustainable development China, as one of the world’s largest economies, presents the possibility of reaching important global targets..Green marketing is the nexus where eco作者: Chromatic 時(shí)間: 2025-3-23 17:52 作者: 厚臉皮 時(shí)間: 2025-3-23 19:56 作者: badinage 時(shí)間: 2025-3-24 00:53
Comparison of OAuth/OpenID Connect Security in America and Japan,ing applications. The advantages on the use of these materials include the replacement of synthetic fibers for natural ones, taking advantage of biodegradable resources and contribute for environment issues. This work aims to evaluate four different fractions of natural fiber reinforcing epoxy matri作者: Accommodation 時(shí)間: 2025-3-24 04:08 作者: 閹割 時(shí)間: 2025-3-24 09:56 作者: 即席演說 時(shí)間: 2025-3-24 12:18 作者: Outspoken 時(shí)間: 2025-3-24 15:58
A Fuzzy-Based System for Assessment of Available Edge Computing Resources in a Cloud-Fog-Edge SDN-Vunication factories, and industries to achieve efficiency and sustainable energy management practices. It has been forecasted that by the year 2020, 20.4 billion IoT devices will be deployed across the world. As the IoT adoption grows rapidly, there is an increasing demand for heterogeneous devices 作者: diabetes 時(shí)間: 2025-3-24 21:13 作者: 搬運(yùn)工 時(shí)間: 2025-3-25 00:51
Performance Evaluation of WMN-PSOSA-DGA Simulation System Considering Uniform and Chi-Square Clientn-risk as well as the market risk. Even the probabilities of surviving crises are higher, and hence, hazard ratios are lower for the green portfolios. Thus, green is preferred to gray and more green is better than less green. Hence, following less-carbon investment path is the most rational and obvi作者: disparage 時(shí)間: 2025-3-25 03:27 作者: exostosis 時(shí)間: 2025-3-25 08:49 作者: Incommensurate 時(shí)間: 2025-3-25 12:07 作者: 卜聞 時(shí)間: 2025-3-25 18:38 作者: 使出神 時(shí)間: 2025-3-25 20:57
Consideration of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internsumer preferences is crucial in navigating potential counteractive responses and fostering a sustainable market environment. Vigilant monitoring of consumer behavior within green segments is necessary to ensure the efficacy of communication strategies and encourage a positive shift toward environmen作者: 啟發(fā) 時(shí)間: 2025-3-26 00:19 作者: Meander 時(shí)間: 2025-3-26 05:31
An Ensemble Deep Learning Technique to Detect COVID-19 Misleading Information,tion affects customer attitude and behavioural intention by examining the concept of “nudging”. The role of nudging is analysed to see how it is embedded in green marketing communication, how it influences perception, and how information is presented to guide consumers towards green products.作者: 高興一回 時(shí)間: 2025-3-26 09:03 作者: 泥沼 時(shí)間: 2025-3-26 15:18 作者: 都相信我的話 時(shí)間: 2025-3-26 18:55
Topic-Based Processing Protocol in a Mobile Fog Computing Model,Overview: 作者: Rinne-Test 時(shí)間: 2025-3-27 00:28 作者: 浪費(fèi)時(shí)間 時(shí)間: 2025-3-27 04:25
Secure Cognitive Protocols for Data Fusion in Transformative Computing,Overview: 作者: blight 時(shí)間: 2025-3-27 05:27 作者: MAG 時(shí)間: 2025-3-27 10:47
An Area-Efficient FPGA Implementation of a Real-Time Binary Object Detection System,Overview: 作者: 使困惑 時(shí)間: 2025-3-27 13:43
Address Usage Estimation Based on Bitcoin Traffic Behavior,Overview: 作者: figurine 時(shí)間: 2025-3-27 18:49
Yusi Yang,Yan Lai,Guanli Zhang,Lan Linrces and determines the processing capability for each neighbor. We evaluate the system by computer simulations. Potential neighbors which can help the vehicle process and complete the tasks are the ones that are predicted to be within the vehicle communication range for a while and have medium/larg作者: 小說 時(shí)間: 2025-3-28 01:00
émilie Masson,Christophe Gransartends a message including the output data. The publication topics of each message denote data in the message. In this paper, we propose an MTBDT (Modified Topic-based Data Transmission) protocol for mobile fog nodes to deliver messages to target nodes. In the evaluation, we show the number of message作者: 健談的人 時(shí)間: 2025-3-28 04:21
Communication Technologies for Vehiclescommunication on costs of message delivery. Our simulation results clarify the difference in routing protocols regarding network costs. We also discuss a trade-off between network cost and message delivery ratio according to the results.作者: 煩擾 時(shí)間: 2025-3-28 07:37 作者: microscopic 時(shí)間: 2025-3-28 11:58
Shahzad Nizamani,Amirita Kumariues. The experimental results are examined using fourteen performance measures (Accuracy, Error Rate, Loss, Precision, Recall, F1-Score, Area Under the Curve, Geometric-Mean, Specificity, Miss Rate, Fall-Out Rate, False-Discovery Rate, False-Omission Rate, and the Total Training Time). The obtained 作者: 主動(dòng) 時(shí)間: 2025-3-28 17:29
Leonard Barolli,Kin Fun Li,Makoto TakizawaCovers the latest advances in Networked-based Information Systems.Contains the Proceedings of the 23rd International Conference on Network-Based Information Systems (NBiS-2020), held on August 31st - 作者: flutter 時(shí)間: 2025-3-28 20:38 作者: Infelicity 時(shí)間: 2025-3-29 00:17
https://doi.org/10.1007/978-3-030-57811-4Communication Networks and Protocols; Databases and Data Mining; Cloud; Grid and P2P Computing; Semantic作者: 提名的名單 時(shí)間: 2025-3-29 04:15
978-3-030-57810-7Springer Nature Switzerland AG 2021作者: gregarious 時(shí)間: 2025-3-29 10:59 作者: FRAX-tool 時(shí)間: 2025-3-29 14:25
Yusi Yang,Yan Lai,Guanli Zhang,Lan Linworks (SDN-VANETs). The computational, networking and storage resources of vehicles comprise the Edge Computing resources in a layered Cloud-Fog-Edge architecture. A vehicle which needs additional resources to complete certain tasks and process various data is guided to perform these actions in edge作者: Confound 時(shí)間: 2025-3-29 16:43
Yingdong Yu,Yan Lai,Hui Wang,Lan Linthat require calculations for every object on a per-frame basis, might face a compute-intensive task that is difficult to scale. We study a real-world JavaScript simulation tool that visualizes urban areas and presents the movement of the whole area’s population. We focus on the performance bottlene作者: ascetic 時(shí)間: 2025-3-29 22:49 作者: BOOR 時(shí)間: 2025-3-30 00:39 作者: filicide 時(shí)間: 2025-3-30 05:41
Lei Zhang,Juan Moreno,César Briso,Ke GuanIn order to provide reliable and available application services, each object is replicated on multiple virtual machines in a system. On the other hand, a system consumes a large amount of electric energy since multiple replicas of each object are manipulated on multiple virtual machines in a system.作者: Reverie 時(shí)間: 2025-3-30 10:48
Lecture Notes in Computer Scienceof users’ start and destination locations, and a sequence of Categories of Interest for a trip they wish to travel together. The outcome is a trip through a sequence of Points of Interest that minimizes the travel distance for all. Previously proposed strategies for processing Sequenced Group Trip P作者: incarcerate 時(shí)間: 2025-3-30 12:48
Communication Technologies for Vehiclesorks?(DTNs), vehicular ad hoc networks?(VANETs), and so on. The efficiency of message delivery in opportunistic communication is correlated to the routing protocols and the movement model of mobile entities. In this paper, we focus on message delivery based on opportunistic communication by pedestri作者: 你不公正 時(shí)間: 2025-3-30 19:43
https://doi.org/10.1007/978-3-319-56880-5ds. It allows to acquire sensor signals and evaluate those using different AI technologies towards determining some analytics factors. Application of cognitive systems in such analysis can extend possibilities of semantic analysis and evaluation of signals towards performing semantic evaluation of t作者: Arresting 時(shí)間: 2025-3-30 20:55
https://doi.org/10.1007/978-3-030-92684-7 node and sends the output data to a fog node. In our previous studies, types of the TBFC (Tree-Based Fog Computing) models are proposed to reduce the electric energy consumption and execution time of fog nodes and servers and to be tolerant of node faults. Here, fog nodes are hierarchically structu作者: 改變立場(chǎng) 時(shí)間: 2025-3-31 04:18 作者: harrow 時(shí)間: 2025-3-31 08:03
Francisco Gallardo López,Antonio Pérez Yustetechnology continues to develop rapidly and Wireless Mesh Networks (WMNs) are attracting attention from many researchers in order to provide cost efficient broadband wireless connectivity. The main issue of WMNs is to improve network connectivity and stability in terms of user coverage. In our previ作者: Concrete 時(shí)間: 2025-3-31 11:54 作者: RAG 時(shí)間: 2025-3-31 15:17 作者: 條街道往前推 時(shí)間: 2025-3-31 19:09 作者: Saline 時(shí)間: 2025-3-31 22:52
Shahzad Nizamani,Amirita Kumarito COVID-19. This system depends on the shared COVID-19-related information from the official websites and Twitter accounts of the WHO, UNICEF, and UN, as well as the COVID-19 pre-checked facts from different fact-checking websites, as a source of reliable information to train the detection model. W作者: CANT 時(shí)間: 2025-4-1 05:36 作者: extemporaneous 時(shí)間: 2025-4-1 09:46
Communication Technology and Gender Violenceddresses, leading to abuse for illegitimate purposes, e.g., payments of illegal drugs, ransom, fraud, and money laundering. Although all the transactions are available in the bitcoin system, it is not trivial to determine the usage of addresses. This work aims to estimate typical usages of bitcoin t