標題: Titlebook: Computer Communication, Networking and Internet Security; Proceedings of IC3T Suresh Chandra Satapathy,Vikrant Bhateja,B. Janaki Conferenc [打印本頁] 作者: fasten 時間: 2025-3-21 16:37
書目名稱Computer Communication, Networking and Internet Security影響因子(影響力)
書目名稱Computer Communication, Networking and Internet Security影響因子(影響力)學科排名
書目名稱Computer Communication, Networking and Internet Security網(wǎng)絡公開度
書目名稱Computer Communication, Networking and Internet Security網(wǎng)絡公開度學科排名
書目名稱Computer Communication, Networking and Internet Security被引頻次
書目名稱Computer Communication, Networking and Internet Security被引頻次學科排名
書目名稱Computer Communication, Networking and Internet Security年度引用
書目名稱Computer Communication, Networking and Internet Security年度引用學科排名
書目名稱Computer Communication, Networking and Internet Security讀者反饋
書目名稱Computer Communication, Networking and Internet Security讀者反饋學科排名
作者: Disk199 時間: 2025-3-21 23:53
Data Privacy in Online Shopping,n based on quasi identifier value in the data set. In this paper, protecting sensitive information is an important problem. Detailed analysis of these both attacks are given and proposed a privacy definition called L-Diversity, which can be implemented and experimental evaluation is also shown.作者: 中和 時間: 2025-3-22 00:23
Computer Communication, Networking and Internet SecurityProceedings of IC3T 作者: Mitigate 時間: 2025-3-22 05:50
The Initial Chemistry of Taste,full adder and then extended for 8 bit ripple carry adder. The circuit was implemented using Cadence Virtuoso tools in 180?nm technology. For 1.8 V supply at 180?nm technology, the average delay of the circuit is (114.5?ps), having moderate power consumption (27.52?mW) is found to have extremely low作者: CRAFT 時間: 2025-3-22 09:56 作者: collateral 時間: 2025-3-22 14:06 作者: collateral 時間: 2025-3-22 19:03 作者: 推崇 時間: 2025-3-23 01:02 作者: MILK 時間: 2025-3-23 05:00 作者: 刪減 時間: 2025-3-23 05:41 作者: gentle 時間: 2025-3-23 12:39
Degeneration and Regeneration of Taste Buds,chine so as to reap better benefits from a linguistically knowledgeable machine is the aim of computational linguistics. However, the concept of linguistic distance has arisen in the spheres with the introduction of multiple languages to the e-world. This paper aims to study the problems of computat作者: 知識分子 時間: 2025-3-23 15:27
Harold Burton,Robert M. Benjaminireless devices such as low-cost laptops, palmtops, PDA, etc. Revolutionary development of these widespread wireless networks has resulted in a number of new applications such as vehicle-to-vehicle communication in remote areas. This paper attempts to comprehend the performance issue by evaluating o作者: 江湖騙子 時間: 2025-3-23 19:20 作者: Soliloquy 時間: 2025-3-24 00:58
Symmetry, Chirality and Topology in Taste, not feasible to recharge or to replace the batteries of these devices either due to the hostile environments where these devices are deployed or due to the cost associated with the batteries. Hence energy consumption is crucial problems in WSNs. Researchers have tried to address this issue through 作者: DNR215 時間: 2025-3-24 05:16
Taste Organ in the Bullhead (Teleostei)of low power applications such as optical computing, and CMOS VLSI design. An EXNOR gate is a digital logic gate that can be used as an equivalence gate and also in variety of applications. A new reversible SV gate is proposed in this paper that functions as an EXNOR gate and whose quantum cost is 1作者: 半圓鑿 時間: 2025-3-24 09:20
Taste Organ in the Bullhead (Teleostei)cation security, sensor data security, integrity of physical signals and actuating devices. The existing security techniques are not suitable for IoT applications as the involved devices at the ground level have limited resources, low complexity, energy constraints etc. This survey analyzes various 作者: Between 時間: 2025-3-24 11:46
Chemical Activation of Sensory TRP Channels, and data owner customize their applications through online. Due to storing vast amount of data on cloud, there may be many issues related to the security in cloud network. The major among them is the privacy preservation of the network that accesses the cloud network. So in order to address the pro作者: 巨碩 時間: 2025-3-24 17:32 作者: 青石板 時間: 2025-3-24 22:22 作者: QUAIL 時間: 2025-3-25 01:46
https://doi.org/10.1007/978-3-531-19457-8l nervous system disorders such as Alzheimer’s, Parkinson’s, seizures, epilepsy, etc. Ocular activity creates significant artifacts in EEG recordings. Analysis of the EEG and obtaining clinical information is difficult because of these noise sources. This paper proposes discrete wavelet transform (D作者: 下級 時間: 2025-3-25 04:45
https://doi.org/10.1007/978-0-8176-4577-9icular Adhoc Networks leads to frequent network fragmentation and route reconstruction which cause an increase in packet drop ratio and control overhead. Thus, it brings challenges to establish an optimized routing path with high reliability and low latency. This paper presents an improved geographi作者: Urea508 時間: 2025-3-25 11:05 作者: CUB 時間: 2025-3-25 11:48 作者: ONYM 時間: 2025-3-25 16:54 作者: 上漲 時間: 2025-3-25 20:06 作者: FICE 時間: 2025-3-26 03:10
978-981-10-9820-8Springer Nature Singapore Pte Ltd. 2017作者: 過于光澤 時間: 2025-3-26 07:17
Computer Communication, Networking and Internet Security978-981-10-3226-4Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: crutch 時間: 2025-3-26 11:46 作者: 賞錢 時間: 2025-3-26 14:12 作者: Magisterial 時間: 2025-3-26 18:46 作者: fastness 時間: 2025-3-26 23:36 作者: 描繪 時間: 2025-3-27 04:03 作者: Chameleon 時間: 2025-3-27 07:13
A New Approach for Data Security in Cryptography and Steganography,roposed based on matrix scrambling which uses arithmetic operations, random functions, circular shifting and exchanging operations to get the encrypted message. Further, security is enhanced by steganography method where the encrypted message is hidden in the image based on the gini index value. For作者: 形上升才刺激 時間: 2025-3-27 10:41
Improvement of Toward Offering More Useful Data Reliably to Mobile Cloud from Wireless Sensor Netwo any time and at any place. This provides various features like easy data storage, maintenance, availability, sharing etc. Sometimes the data which is requested by users may not be received on time as multiple users can access data from cloud at same time or may be lost during transmission. Therefor作者: 松緊帶 時間: 2025-3-27 17:08
,Computational?and Emotional Linguistic Distance?and Language Learning,chine so as to reap better benefits from a linguistically knowledgeable machine is the aim of computational linguistics. However, the concept of linguistic distance has arisen in the spheres with the introduction of multiple languages to the e-world. This paper aims to study the problems of computat作者: Clumsy 時間: 2025-3-27 20:47 作者: 死貓他燒焦 時間: 2025-3-27 23:07 作者: 幼兒 時間: 2025-3-28 03:12 作者: Pseudoephedrine 時間: 2025-3-28 07:23
A Novel Reversible EX-NOR SV Gate and Its Application,of low power applications such as optical computing, and CMOS VLSI design. An EXNOR gate is a digital logic gate that can be used as an equivalence gate and also in variety of applications. A new reversible SV gate is proposed in this paper that functions as an EXNOR gate and whose quantum cost is 1作者: sperse 時間: 2025-3-28 12:37 作者: 顯微鏡 時間: 2025-3-28 17:41
Privacy Preservation in Cloud Computing with Double Encryption Method, and data owner customize their applications through online. Due to storing vast amount of data on cloud, there may be many issues related to the security in cloud network. The major among them is the privacy preservation of the network that accesses the cloud network. So in order to address the pro作者: 入會 時間: 2025-3-28 20:58 作者: Choreography 時間: 2025-3-28 23:21 作者: 清晰 時間: 2025-3-29 05:00 作者: NORM 時間: 2025-3-29 09:19 作者: Corporeal 時間: 2025-3-29 14:58 作者: Optic-Disk 時間: 2025-3-29 17:55 作者: 陪審團 時間: 2025-3-29 20:49
Data Privacy in Online Shopping,nience manner according to customer shopping behavior and preferences. Extracting shopping patterns from increasing data is not a trivial task. This paper will help to understand the importance of data mining techniques i.e., Association rule mining is to get relationships between different items in作者: Hemoptysis 時間: 2025-3-30 01:05
2367-3370 n Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy c作者: 內(nèi)行 時間: 2025-3-30 04:06
Reference work 2024Latest edition requested by users may not be received on time as multiple users can access data from cloud at same time or may be lost during transmission. Therefore this results an unreliable and inefficient approach. In this paper, we proposed a protocol to increase reliability of cloud based WSN technology.作者: CLOWN 時間: 2025-3-30 10:47
Degeneration and Regeneration of Taste Buds,istic distance has arisen in the spheres with the introduction of multiple languages to the e-world. This paper aims to study the problems of computational linguistic distance and the methods to mitigate it.?The paper also delves into Computer Assisted Language Learning and its Emotional Connection and Aspects of Language Acquisition.作者: chandel 時間: 2025-3-30 16:22 作者: 功多汁水 時間: 2025-3-30 19:53 作者: EVICT 時間: 2025-3-30 21:12 作者: Colonoscopy 時間: 2025-3-31 02:56 作者: textile 時間: 2025-3-31 08:36 作者: 我們的面粉 時間: 2025-3-31 12:44
Optimal Sensing Time Allocation for Energy Efficient Data Transmission in Amplify-Forward Cognitiveious system parameters?like, false alarm probability, throughput and energy efficiency. Furthermore, such evaluation illustrates the existence of an optimal sensing time, which improves the energy efficiency of the system.作者: Awning 時間: 2025-3-31 13:47 作者: Atmosphere 時間: 2025-3-31 17:44 作者: pancreas 時間: 2025-4-1 00:45 作者: 死亡率 時間: 2025-4-1 02:31
Taste Organ in the Bullhead (Teleostei)ate has been validated by comparing its performance with some of the existing circuits in literature. The results prove to be more reliable, efficient and provide a basis for building more complex arithmetic systems using the concept of reversible logic that can be used in digital data transmission circuits.作者: DENT 時間: 2025-4-1 07:56 作者: 腐蝕 時間: 2025-4-1 10:50
https://doi.org/10.1007/978-0-8176-4577-9metrics have an impact on the performance of the routing protocol for Vehicular Ad hoc Networks (VANETs). Extensive simulations carried out based on the proposed solution have proved to outperform the existing GPSR approaches in terms of reliability, scalability and path latency.作者: 反應 時間: 2025-4-1 18:22 作者: NUL 時間: 2025-4-1 19:45