標題: Titlebook: Communication, Networks and Computing; Second International Ranjeet Singh Tomar,Shekhar Verma,Vijay K. Bhargav Conference proceedings 2021 [打印本頁] 作者: 喜悅 時間: 2025-3-21 19:48
書目名稱Communication, Networks and Computing影響因子(影響力)
書目名稱Communication, Networks and Computing影響因子(影響力)學科排名
書目名稱Communication, Networks and Computing網(wǎng)絡公開度
書目名稱Communication, Networks and Computing網(wǎng)絡公開度學科排名
書目名稱Communication, Networks and Computing被引頻次
書目名稱Communication, Networks and Computing被引頻次學科排名
書目名稱Communication, Networks and Computing年度引用
書目名稱Communication, Networks and Computing年度引用學科排名
書目名稱Communication, Networks and Computing讀者反饋
書目名稱Communication, Networks and Computing讀者反饋學科排名
作者: panorama 時間: 2025-3-21 21:38
https://doi.org/10.1007/978-3-8274-2835-6etc. Bit error rate can be minimize by reducing the data rate, length of optical fiber. WDM communication network can provide zero minimum bit error rate up to certain length of optical fiber. This paper gives the optimum value of 4 channel and 8 channel WDN network parameter for zero bit error rate (BER) up to certain length of optical fiber.作者: RENAL 時間: 2025-3-22 03:38 作者: 厚臉皮 時間: 2025-3-22 05:26
Software-Architekturen für das E-Businessary process. In this review, we researched data mining, Clustering, Recommendation systems, Pattern Recognition, and described different types of recommendation systems as well as defined various methods of clustering & pattern recognition.作者: 樹木中 時間: 2025-3-22 12:12
Software-Architekturen im Unternehmenum physics to ensure secure key distribution. In this paper relevant quantum mechanics principles are briefly described before explaining popular QKD protocols followed by security hacks, available commercial QKD systems & future directions.作者: OVERT 時間: 2025-3-22 15:50 作者: OVERT 時間: 2025-3-22 20:54
WDM Communication Network with Zero Bit Error Rateetc. Bit error rate can be minimize by reducing the data rate, length of optical fiber. WDM communication network can provide zero minimum bit error rate up to certain length of optical fiber. This paper gives the optimum value of 4 channel and 8 channel WDN network parameter for zero bit error rate (BER) up to certain length of optical fiber.作者: 向外 時間: 2025-3-23 00:22 作者: 頭腦冷靜 時間: 2025-3-23 03:01
Study on Cluster-Based Pattern Recognition Using Recommendation Systemary process. In this review, we researched data mining, Clustering, Recommendation systems, Pattern Recognition, and described different types of recommendation systems as well as defined various methods of clustering & pattern recognition.作者: 性滿足 時間: 2025-3-23 07:18 作者: 地牢 時間: 2025-3-23 10:33 作者: Overthrow 時間: 2025-3-23 15:55
Software-Architekturen für Verteilte Systemen rural areas the connectivity with internet is a major issue. This system will definitely help in solving the problem. The post processing features of the development such as interfacing of gateway with cloud and as well as future integration and functionalities have also been suggested.作者: FECT 時間: 2025-3-23 18:54 作者: FACT 時間: 2025-3-24 00:22 作者: 浮雕寶石 時間: 2025-3-24 04:20
Design and Implementation of LoRa Based Automation Devicen rural areas the connectivity with internet is a major issue. This system will definitely help in solving the problem. The post processing features of the development such as interfacing of gateway with cloud and as well as future integration and functionalities have also been suggested.作者: 安慰 時間: 2025-3-24 10:16
Plagiarism Detection of Online Submissions Using High Level Fuzzy Petri Nets in Pandemic Timesce codes. The comparison is done by first properly encoding the obtained ASTs into strings and then comparing the strings by using a Global Sequence Alignment technique. A fuzzy decision maker then makes the final decision based on the output of the sequence alignment algorithm.作者: 性滿足 時間: 2025-3-24 12:42
Conference proceedings 2021 held in Gwalior, India, in December 2020.?.The 23 full papers and 7 short papers were thoroughly reviewed and selected from the 102 submissions. They are organized in topical sections on wired and wireless communication systems; high dimensional data representation and processing; networking and in作者: 擴大 時間: 2025-3-24 15:30 作者: 變形 時間: 2025-3-24 21:47
CIM-OSA: Unternehmensmodellierunges different kinds of attacks by which authentication schemes can be compromised. The objective of this paper is to propose a new user authentication scheme to reduce the risk of identity theft. This text-based password scheme prevents shoulder surfing and is easy to use. The scheme can be used to create more secure passwords that are memorable.作者: scrutiny 時間: 2025-3-25 02:28 作者: 無關(guān)緊要 時間: 2025-3-25 06:33
A Novel Shoulder Surfing Resistant Password Authentication Schemees different kinds of attacks by which authentication schemes can be compromised. The objective of this paper is to propose a new user authentication scheme to reduce the risk of identity theft. This text-based password scheme prevents shoulder surfing and is easy to use. The scheme can be used to create more secure passwords that are memorable.作者: Spangle 時間: 2025-3-25 08:16
Reinventing ICTM for Sustainability and Growth - An Interdisciplinary Approach, operations and ICT. Later hierarchical relationship among the interdisciplinary items has been established with the help of ISM technique. After this items are classified into various classes by using MICMAC analysis. This research identifies ICTM variables as a critical variable in the integration process because of their higher driving power.作者: Reclaim 時間: 2025-3-25 15:29
Crop Yield Quantity and Price Prediction: An Ensemble Approachmachine learning methods, this model focuses on predicting the right grain price depending on climatic conditions and crop productivity based on historical data. In addition, android application has been developed.作者: Additive 時間: 2025-3-25 18:58
1865-0929 ing and information security; computing Techniques for efficient networks design; vehicular technology and application; electronics circuit for communication system..978-981-16-8895-9978-981-16-8896-6Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 小歌劇 時間: 2025-3-25 22:34
Conference proceedings 2021 are organized in topical sections on wired and wireless communication systems; high dimensional data representation and processing; networking and information security; computing Techniques for efficient networks design; vehicular technology and application; electronics circuit for communication system..作者: ethereal 時間: 2025-3-26 00:36 作者: triptans 時間: 2025-3-26 06:56
A Detailed Survey on Classification of Localization Techniques in Wireless Sensor Networkscentral attraction today in the scientific community. It consists of plenty of tiny, low-cost devices known as sensors that are capable of collecting and forwarding the data and are being adopted in numerous applications that focus on finding the exact location like tracking of children or pets loca作者: OUTRE 時間: 2025-3-26 12:22
WDM Communication Network with Zero Bit Error Rateuffering etc. Wavelength division multiplexing (WDM) network obtaining more attention for the requirement of high data rate, bandwidth capacity and upgrading in the existing optical system. WDM technology can also use in bidirectional communication which gives green light to increasing the capacity 作者: 細查 時間: 2025-3-26 16:08
Theoretical Understanding of Circular Polarization: Case Study of Superstrate-Inspired Monopole Antea offers impedance bandwidth (IBW) of 117.9% (1.81–6.88?GHz) and 3-dB axial bandwidth (ARBW) of 32.22% (4.04–5.59?GHz). So, the outcome of proposed antenna is due to its geometrical occurrences. Initially, a linearly polarized (LP) circular-shaped monopole antenna with partial ground plane is design作者: 招募 時間: 2025-3-26 19:50
Design and Implementation of LoRa Based Automation Deviceare emerging. This research is based on automation particularly in Agricultural scenarios. The research is to provide a simpler communication model with less or no dependency on cellular or any other communication network. Here, LoRa? i.e. the long range communication model is used which is based on作者: 踉蹌 時間: 2025-3-27 00:50
Setting up Hadoop Environment and Running MapReduce Job for Teaching BDA in Universities – An Experile architecture that stores and processes big data on commodity hardware machines and allows distributed processing on clusters of nodes. The demand for trained data analytics professionals has resulted in the incorporation of big data analytics in University curriculum. As a result, there is a need作者: Delude 時間: 2025-3-27 02:34 作者: 錯誤 時間: 2025-3-27 07:27 作者: Overdose 時間: 2025-3-27 09:35 作者: chemical-peel 時間: 2025-3-27 17:40
Crop Yield Quantity and Price Prediction: An Ensemble Approach The only way to get out of this dilemma is to do everything possible to make agriculture a lucrative business and to encourage farmers to maintain crop production. As part of this endeavor, this model would use machine learning to assist farmers in making proper crop decisions. Using Random Forest 作者: Spina-Bifida 時間: 2025-3-27 21:02
Study on Cluster-Based Pattern Recognition Using Recommendation System on the Internet. To make suggestions based on similar interests between users or items, Recommender Systems uses collective filtering. Clusters shall classify population or data points so that data points in the same category are more comparable to other data points in the same category and differ 作者: 到婚嫁年齡 時間: 2025-3-28 00:15
A Novel Shoulder Surfing Resistant Password Authentication SchemeThis paper analyzes the traditional text-based password scheme and their challenges and provides the solution over their drawbacks. This paper discusses different kinds of attacks by which authentication schemes can be compromised. The objective of this paper is to propose a new user authentication 作者: Admire 時間: 2025-3-28 05:07
MITM Attack on Modification of Diffie-Hellman Key Exchange Algorithmity, mutual authentication between two parties, non-repudiation, and key exchange algorithm. Even if one of these features fail then it may breach security in real-world scenarios. The Diffie-Hellman Key Exchange (DHKE) algorithm allows securing one feature called key exchange in the cryptography fi作者: FAZE 時間: 2025-3-28 08:38
Reinventing ICTM for Sustainability and Growth - An Interdisciplinary Approachusiness. This research identifies three important constructs and their items or variables which belong to three different disciplines namely marketing, operations and ICT. Later hierarchical relationship among the interdisciplinary items has been established with the help of ISM technique. After thi作者: jaunty 時間: 2025-3-28 14:01 作者: Irrigate 時間: 2025-3-28 16:59
Video Summary Based on Visual and Mid-level Semantic Featuresvideos, a number of techniques have been proposed. To summarize video of the different domain, researchers have targeted visual information contained in frames. But visual features only are not enough to create a semantic summary. In this work, we proposed a methodology for generating semantic based作者: irradicable 時間: 2025-3-28 22:19
Wavelet Based Selective Image Encryption Scheme Using Tinkerbell Chaotic Mapen to network policies as well as security. The digital images contain a significant amount of information; therefore, an encryption module should be fast and processed in minimum time without facing any complexity in a shared network environment. This paper presents a novel symmetric image encrypti作者: Expurgate 時間: 2025-3-29 02:05
https://doi.org/10.1007/978-3-8274-2205-7central attraction today in the scientific community. It consists of plenty of tiny, low-cost devices known as sensors that are capable of collecting and forwarding the data and are being adopted in numerous applications that focus on finding the exact location like tracking of children or pets loca作者: 態(tài)學 時間: 2025-3-29 06:54
https://doi.org/10.1007/978-3-8274-2835-6uffering etc. Wavelength division multiplexing (WDM) network obtaining more attention for the requirement of high data rate, bandwidth capacity and upgrading in the existing optical system. WDM technology can also use in bidirectional communication which gives green light to increasing the capacity 作者: Painstaking 時間: 2025-3-29 10:17
https://doi.org/10.1007/978-3-8274-2835-6a offers impedance bandwidth (IBW) of 117.9% (1.81–6.88?GHz) and 3-dB axial bandwidth (ARBW) of 32.22% (4.04–5.59?GHz). So, the outcome of proposed antenna is due to its geometrical occurrences. Initially, a linearly polarized (LP) circular-shaped monopole antenna with partial ground plane is design作者: 先行 時間: 2025-3-29 12:29
Software-Architekturen für Verteilte Systemeare emerging. This research is based on automation particularly in Agricultural scenarios. The research is to provide a simpler communication model with less or no dependency on cellular or any other communication network. Here, LoRa? i.e. the long range communication model is used which is based on作者: Choreography 時間: 2025-3-29 17:36 作者: GRACE 時間: 2025-3-29 21:59 作者: Cardiac-Output 時間: 2025-3-30 01:56 作者: 橢圓 時間: 2025-3-30 07:49
Software-Architekturen für das E-Businessy color blindness tests while consulting an Eye Specialist to check if they are suffering from this deficiency. This test is conducted by showing different types of color blindness charts to the patient and then asking him/her to read those charts. In this paper, we make the machine learn the color 作者: 難聽的聲音 時間: 2025-3-30 10:24
https://doi.org/10.1007/3-540-31300-1 The only way to get out of this dilemma is to do everything possible to make agriculture a lucrative business and to encourage farmers to maintain crop production. As part of this endeavor, this model would use machine learning to assist farmers in making proper crop decisions. Using Random Forest 作者: 團結(jié) 時間: 2025-3-30 12:54 作者: 摸索 時間: 2025-3-30 20:14 作者: aristocracy 時間: 2025-3-31 00:03
Software-Architekturen im Unternehmenity, mutual authentication between two parties, non-repudiation, and key exchange algorithm. Even if one of these features fail then it may breach security in real-world scenarios. The Diffie-Hellman Key Exchange (DHKE) algorithm allows securing one feature called key exchange in the cryptography fi作者: cushion 時間: 2025-3-31 03:54
CIM-OSA: Unternehmensmodellierungusiness. This research identifies three important constructs and their items or variables which belong to three different disciplines namely marketing, operations and ICT. Later hierarchical relationship among the interdisciplinary items has been established with the help of ISM technique. After thi