標(biāo)題: Titlebook: Communication, Networks and Computing; First International Shekhar Verma,Ranjeet Singh Tomar,Jemal Abawajy Conference proceedings 2019 Spr [打印本頁(yè)] 作者: ED431 時(shí)間: 2025-3-21 18:11
書(shū)目名稱(chēng)Communication, Networks and Computing影響因子(影響力)
書(shū)目名稱(chēng)Communication, Networks and Computing影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Communication, Networks and Computing網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Communication, Networks and Computing網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Communication, Networks and Computing被引頻次
書(shū)目名稱(chēng)Communication, Networks and Computing被引頻次學(xué)科排名
書(shū)目名稱(chēng)Communication, Networks and Computing年度引用
書(shū)目名稱(chēng)Communication, Networks and Computing年度引用學(xué)科排名
書(shū)目名稱(chēng)Communication, Networks and Computing讀者反饋
書(shū)目名稱(chēng)Communication, Networks and Computing讀者反饋學(xué)科排名
作者: acclimate 時(shí)間: 2025-3-21 21:56 作者: enormous 時(shí)間: 2025-3-22 03:57 作者: Throttle 時(shí)間: 2025-3-22 05:22 作者: 取回 時(shí)間: 2025-3-22 09:51
Privacy Preserving Multi Keyword Ranked Search with Context Sensitive Synonyms over the Encrypted Clext sensitive Multi keyword Ranked Search (CSMRS) to this issue by analyzing the encrypted query click logs. The results achieved show that the synonyms selected with CSMRS are more appropriate and as per the context as intended by the user.作者: CODA 時(shí)間: 2025-3-22 13:04 作者: CODA 時(shí)間: 2025-3-22 18:01
https://doi.org/10.1007/978-3-642-77292-4smission energy (MTE) protocols for distributing facts to the BS. In our proposed work, we improve the network performance by forwarding the data to the nearby Cluster Head (CH). This get better the consumption of energy at each node if the distance of the node is larger to transmit it towards the B作者: AGGER 時(shí)間: 2025-3-22 21:47 作者: 敵意 時(shí)間: 2025-3-23 01:24 作者: 真實(shí)的人 時(shí)間: 2025-3-23 09:12
https://doi.org/10.1007/978-3-642-83999-3ext sensitive Multi keyword Ranked Search (CSMRS) to this issue by analyzing the encrypted query click logs. The results achieved show that the synonyms selected with CSMRS are more appropriate and as per the context as intended by the user.作者: 蝕刻 時(shí)間: 2025-3-23 12:50 作者: Esalate 時(shí)間: 2025-3-23 14:48 作者: 或者發(fā)神韻 時(shí)間: 2025-3-23 21:59
A Novel Solution for Cloud Enabled E-Governance Using Openstack: Opportunities and Challengeseir applications running on the web. The E-governance is an application of information and communication technology (ICT) that enable governments across the world to provide the information access and other service through web to their various stakeholders. Because of increasing internet literacy th作者: 柱廊 時(shí)間: 2025-3-24 01:45
Frequency of Meeting with Node and Visit to Physical Location Based on Mobility Patternand highly crowded areas. Sparse areas lack regular network and follow highly intermittent connectivity, whereas overcrowded areas contain overlapped bandwidth. Opportunistic network (Oppnet) has the solution to all the above problem. In oppnet to overcome the problem node does not have to depends o作者: neutral-posture 時(shí)間: 2025-3-24 05:00
A New Lightweight Approach for Multiuser Searchable Encryption in the Cloude cloud server very conveniently. Also concept of searchable encryption is gaining a lot of attention for the data transmission, which allows cloud to perform searching operations on encrypted data, whereas on the other hand the workload in the cloud server increases significantly. To overcome this 作者: 暫時(shí)過(guò)來(lái) 時(shí)間: 2025-3-24 10:00
Performance Evaluation of Multi-functional Defected Ground Structure Embedded with Microstrip Patch for various wireless applications. To validate the effects of DGS like antenna size reduction and higher order harmonics suppression, the ground plane defects distinctly at different positions beneath the substrate, and later the structure is optimized. Finally, different design parameters of DGS ar作者: 擦試不掉 時(shí)間: 2025-3-24 13:41
Evaluation of Character Recognition Algorithm Based on Feature Extractioncords. This paper presents point by point review in the field of Optical Character Recognition. Diverse methods are settled that have been proposed to comprehend the point of convergence of character affirmation in an optical character affirmation structure. Decision and feature extraction in light 作者: Mitigate 時(shí)間: 2025-3-24 17:05 作者: 磨碎 時(shí)間: 2025-3-24 21:43
Connectivity Analysis of Mobile Ad Hoc Network Using Fuzzy Logic Controllerless ad hoc network. Various network parameters provide measures to ensure ideal network performance leading towards better QoS. This research paper focuses on the development of easier approach towards level of node connectivity using fuzzy logic for betterment of the ad hoc network performance, an作者: 譏笑 時(shí)間: 2025-3-25 01:09 作者: oxidant 時(shí)間: 2025-3-25 05:22 作者: 先兆 時(shí)間: 2025-3-25 09:12
Mathematical Model for Sink Mobility (MMSM) in Wireless Sensor Networks to Improve Network Lifetimeonsibility between the sensor nodes. In this paper, we present a mathematical model that works with existing routing protocol. Sink mobility is decided on the basis of definite-stay-value (.), where . is defined as closeness of sink node and sink site. Closeness means surrounding density or an area 作者: PSA-velocity 時(shí)間: 2025-3-25 15:32
Detection of High Transmission Power Based Wormhole Attack Using Received Signal Strength Indicator erging technology has some remarkable applications for making human life better. WSN has some issues too such as power efficiency and security. Due to its open nature, it also attracts attackers toward itself which in result hampers the security of the network. Wormhole attack is one of the severe a作者: 死貓他燒焦 時(shí)間: 2025-3-25 18:27 作者: Intact 時(shí)間: 2025-3-25 21:09
Privacy Preserving Multi Keyword Ranked Search with Context Sensitive Synonyms over the Encrypted Cln cloud. Wherever the Cloud Service Provider (CSP) allows encryption of documents and metadata, keyword search becomes necessary for quick, easy and effective retrieval of outsourced encrypted cloud data. As the cloud users, over the period of time may tend to forget the exact keywords for issuing a作者: Immunotherapy 時(shí)間: 2025-3-26 00:50 作者: 一再遛 時(shí)間: 2025-3-26 07:30
An Efficient Data Aggregation Algorithm with Gossiping for Smart Transportation Systemart transportation systems are used to collect information about existing traffic on roads. Wireless sensor networks offer better performance and reduced cost when used in the smart transportation system. Data aggregation algorithms can be used to reduce sensor network congestion. This paper discuss作者: hermetic 時(shí)間: 2025-3-26 09:57 作者: AVOW 時(shí)間: 2025-3-26 14:59 作者: endarterectomy 時(shí)間: 2025-3-26 20:33
1865-0929 in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security,?computing techniques for efficient networks design, electronic circuits for communication system.978-981-13-2371-3978-981-13-2372-0Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 地牢 時(shí)間: 2025-3-26 23:03
Software-Diversit?t und ihre Modellierungttack at network layer. It has different modes of attack and one of them is high transmission power mode. This paper proposes a model for detection of wormhole attack using received signal strength indicator (RSSI) and with the help of this model malicious node having high transmission power is detected.作者: BOOR 時(shí)間: 2025-3-27 04:41
Computer Communications and Networkslike that of source and destination. We design small routing protocol based mobility pattern that helps in control the message generation, message deletion, aborting of the message and save the network with the overcrowded message. It also helps in quick transfer of the message. This is implemented over the One simulator.作者: Blatant 時(shí)間: 2025-3-27 08:45 作者: 無(wú)彈性 時(shí)間: 2025-3-27 12:12 作者: adhesive 時(shí)間: 2025-3-27 14:44
Software-Diversit?t und ihre Modellierunge different from the original Boxplots. The results are compared with the traditional technique of generating boxplots and it is demonstrated that cluster driven boxplot generation is more effective for data analysis in real life scenario.作者: Vo2-Max 時(shí)間: 2025-3-27 20:54
Software-Diversit?t und ihre Modellierunghelp of prior probability and continuous Bayes’ theorem. This mathematical model is verified by experiments and gives adequate accuracy for the improvement of network lifetime in independent environment.作者: 兒童 時(shí)間: 2025-3-28 01:24
Software-Diversit?t und ihre Modellierungdentiality of data. Here MCS (Modified Cuckoo Search), PSEC (Provably Secure Elliptic Curve) encryption and AES (Advanced Encryption Standard) is used for resource scheduling, user side encryption, and cloud side encryption respectively for attaining integrity, confidentiality and also efficient computation ability.作者: 爆米花 時(shí)間: 2025-3-28 03:09 作者: 體貼 時(shí)間: 2025-3-28 07:24
Frequency of Meeting with Node and Visit to Physical Location Based on Mobility Patternlike that of source and destination. We design small routing protocol based mobility pattern that helps in control the message generation, message deletion, aborting of the message and save the network with the overcrowded message. It also helps in quick transfer of the message. This is implemented over the One simulator.作者: PHAG 時(shí)間: 2025-3-28 11:02
Evaluation of Character Recognition Algorithm Based on Feature Extractionly not hard to control. In our proposed method, Select the any particular number and crop the selected image and then extract the feature. The text from the OCR process will be compared with the selected number from the loaded image. The overall accuracy of the proposed method is 92%.作者: Urologist 時(shí)間: 2025-3-28 15:08 作者: gait-cycle 時(shí)間: 2025-3-28 21:54
Utilizing Clustering Techniques for Improving the Boxplotse different from the original Boxplots. The results are compared with the traditional technique of generating boxplots and it is demonstrated that cluster driven boxplot generation is more effective for data analysis in real life scenario.作者: daredevil 時(shí)間: 2025-3-29 02:23 作者: 山羊 時(shí)間: 2025-3-29 06:15
Effective Data Storage Security with Efficient Computing in Clouddentiality of data. Here MCS (Modified Cuckoo Search), PSEC (Provably Secure Elliptic Curve) encryption and AES (Advanced Encryption Standard) is used for resource scheduling, user side encryption, and cloud side encryption respectively for attaining integrity, confidentiality and also efficient computation ability.作者: BLUSH 時(shí)間: 2025-3-29 08:17
An Efficient Data Aggregation Algorithm with Gossiping for Smart Transportation System used hybrid data aggregation algorithm with gossiping incorporating mobility of nodes. We evaluated the performance of proposed scheme with the existing hybrid aggregation algorithm. The result analysis shows that proposed scheme is efficient and scalable.作者: 造反,叛亂 時(shí)間: 2025-3-29 13:33
https://doi.org/10.1007/978-3-031-59401-4management while maintaining desired privacy. Proper security proofs and analysis is given for the proposed scheme. The results indicates the practicality of the proposed scheme, with reduced load in cloud server.作者: CANT 時(shí)間: 2025-3-29 19:14 作者: 精確 時(shí)間: 2025-3-29 20:45 作者: arterioles 時(shí)間: 2025-3-30 01:07 作者: dilute 時(shí)間: 2025-3-30 04:54 作者: nocturia 時(shí)間: 2025-3-30 11:07 作者: 淡紫色花 時(shí)間: 2025-3-30 16:11 作者: 征稅 時(shí)間: 2025-3-30 19:54
Lane Change in Roundabout for Reduced Trip Timeing sudden jerks since this method utilises Lane instead of cells utilised by researchers till now. The modular use of Lane with lane change in control strategy will greatly enhance the capacity utilisation of Roundabout as analysed by Simulation. A new Simulator ‘RoundSim’ was also developed Exclusively for simulation in Roundabout.作者: Generic-Drug 時(shí)間: 2025-3-30 23:23
Detection of High Transmission Power Based Wormhole Attack Using Received Signal Strength Indicator ttack at network layer. It has different modes of attack and one of them is high transmission power mode. This paper proposes a model for detection of wormhole attack using received signal strength indicator (RSSI) and with the help of this model malicious node having high transmission power is detected.作者: evanescent 時(shí)間: 2025-3-31 01:41
Conference proceedings 2019eld in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected from?182 submissions. The papers are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security,?comput作者: majestic 時(shí)間: 2025-3-31 08:59 作者: 出處 時(shí)間: 2025-3-31 10:10 作者: 系列 時(shí)間: 2025-3-31 16:17 作者: groggy 時(shí)間: 2025-3-31 18:22 作者: facilitate 時(shí)間: 2025-3-31 22:05 作者: 雪白 時(shí)間: 2025-4-1 01:51