標(biāo)題: Titlebook: Computer Networks, Big Data and IoT; Proceedings of ICCBI A. Pasumpon Pandian,Xavier Fernando,Wang Haoxiang Conference proceedings 2022 The [打印本頁] 作者: 憑票入場 時間: 2025-3-21 19:06
書目名稱Computer Networks, Big Data and IoT影響因子(影響力)
書目名稱Computer Networks, Big Data and IoT影響因子(影響力)學(xué)科排名
書目名稱Computer Networks, Big Data and IoT網(wǎng)絡(luò)公開度
書目名稱Computer Networks, Big Data and IoT網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Networks, Big Data and IoT被引頻次
書目名稱Computer Networks, Big Data and IoT被引頻次學(xué)科排名
書目名稱Computer Networks, Big Data and IoT年度引用
書目名稱Computer Networks, Big Data and IoT年度引用學(xué)科排名
書目名稱Computer Networks, Big Data and IoT讀者反饋
書目名稱Computer Networks, Big Data and IoT讀者反饋學(xué)科排名
作者: Munificent 時間: 2025-3-21 23:18
Lecture Notes on Data Engineering and Communications Technologieshttp://image.papertrans.cn/c/image/233672.jpg作者: maintenance 時間: 2025-3-22 03:25
Disease Prevention and Surveillance,n in any city. Technological advancement can be made useful to make people aware of dangerous locations. In this work, we have built a model to visualize the crime-prone regions between the two locations provided by the user and plot the safe route between them. An algorithm to identify the crime ho作者: 難管 時間: 2025-3-22 05:43 作者: guzzle 時間: 2025-3-22 10:18
https://doi.org/10.1007/978-981-99-8846-4ject is involved. This paper presents an improved statistical–deterministic algorithm using information received from cellular base stations in a non-line-of-sight (NLOS) environment. This approach can also be utilized in an indoor positioning system. This novel algorithm is developed as a hybrid mo作者: Gerontology 時間: 2025-3-22 13:12
https://doi.org/10.1007/978-981-99-8846-4ue is offered for high-density applications. The feature enables cars to converse with someone in a side impact manner prior to data transfer. Through the body mechanism, the cars generate a logistic queue, and the queue might reach the stream once its length reaches a particular threshold. When the作者: Gerontology 時間: 2025-3-22 20:35 作者: 軟膏 時間: 2025-3-23 01:03
The Natural Resources: Introductionnt changes of network topology, FANET faces unique challenges compared with previous networks such as mobile and ad hoc networks. The major problem of FANET is selection of an effective route without duplicate relay nodes in a network. In this paper, we introduce an EBDPS—an edge-based disjoint path作者: MAL 時間: 2025-3-23 05:04
The Environment and Its Components,son or through any other devices. To overcome this communication barrier, they need an interpreter which converts the sign language into text. In some situations, these impaired people may be unknown with sign language. Thus, necessity of sign interpreter is unpreventable. Developing this kind of in作者: 土坯 時間: 2025-3-23 09:13
Biodiversity: Concepts and Valuesa prodigious increase in the engendering of digital content which includes images, audio, video, and documents such as pdf and text data. Information is free and more accessible than in any other era of humanity. Due to such a cognizance explosion, there is a vigorous need to make it more accessible作者: BURSA 時間: 2025-3-23 10:14
The Natural Resources: Introduction air pollutants, solid particles, smoke, and dust from these industries. Air pollutants can be smog, nitrogen oxides, carbon monoxide, carbon dioxide, ammonia, sulphur dioxide, and other pollutants. Outdoor as well as indoor AQ level is affected by these types of pollutants. Other case of indoor AQ 作者: Tractable 時間: 2025-3-23 17:31 作者: esthetician 時間: 2025-3-23 20:29 作者: foreign 時間: 2025-3-24 00:13
https://doi.org/10.1007/978-981-99-8846-4not be provided without the participation of private institutions. However, many private institutions are unable to provide sustainable education as they lack the knowledge of the current industrial requirements and the quality of the students being admitted. AI can be used to build a complete road 作者: Morbid 時間: 2025-3-24 06:10
Textbook of Environment and Ecologytials needs to be done before the job offer is made, and if any discrepancy is found at a later stage, the entire process of recruitment loses its credibility. This can result in a loss of money, time and other resources for the organizations. Graph-based analysis using NoSQL software has proved to 作者: Talkative 時間: 2025-3-24 09:24 作者: exigent 時間: 2025-3-24 10:48 作者: faultfinder 時間: 2025-3-24 18:46 作者: Genistein 時間: 2025-3-24 22:07 作者: 和藹 時間: 2025-3-25 01:29
https://doi.org/10.1007/1-4020-2252-2hilst data set sizes increase, so does algorithm execution time. Data and processing capacity may be distributed across a large number of computer nodes using cluster computing frameworks, allowing algorithms to run in a reasonable length of time even for very huge data sets. On the basis of MapRedu作者: LATE 時間: 2025-3-25 06:04
Problems at the Beginning of Life,l of concern is as yet needed in this area. To be sure, in larger part of cases, the medical information is deciphered by human master, whilst examination of medical information is very demanding and muddled errand. Regularly, discrete examination is performed by various human specialists which brin作者: Factorable 時間: 2025-3-25 10:29
https://doi.org/10.1007/978-981-19-0898-9Data Communication and Computer Networks; Internet of Things; Wireless Communication; Big Data; Cloud Co作者: 不愛防注射 時間: 2025-3-25 13:19 作者: Exclude 時間: 2025-3-25 19:43 作者: 鳥籠 時間: 2025-3-25 22:28 作者: 都相信我的話 時間: 2025-3-26 02:07
2367-4512 The book is a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers and industry practitioners in those important areas..978-981-19-0897-2978-981-19-0898-9Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: 模范 時間: 2025-3-26 05:31 作者: 桶去微染 時間: 2025-3-26 08:31
The Natural Resources: Introductionle robust link-disjoint paths during the process of route discovery. The selected disjoint paths effectively control the communication load and the energy efficiency during the data transmission phase.作者: 顧客 時間: 2025-3-26 15:35
The Environment and Its Components,ir quarantine from the rest of the society notably. Results from this literature review could help in development of an efficient sign interpreter which helps for the communication between non-signer and a signer.作者: circuit 時間: 2025-3-26 18:36
Biodiversity: Concepts and Valuesced distributed energy efficient clustering (EDEEC) and stable election protocol (SEP) are executed. The analysis is carried out in terms of number of nodes and probability of election for cluster head (CH). The observations and results obtained for these protocols are presented.作者: 陰險 時間: 2025-3-27 00:59
https://doi.org/10.1007/978-981-99-8846-4sed along with available tools for simulation in an opportunistic network. The main objective of this article is to deal with current challenges in routing and to provide a future direction for the same.作者: floaters 時間: 2025-3-27 03:13
Biodiversity: Concepts and Valueser than the standard .-means in lower dimensions. Furthermore, this article delves deeper into the effects of algorithm hyperparameters and dataset parameters on .-splits. Finally, it suggests using .-splits to uncover the exact position of centroids and then input them as initial points to the .-means algorithm to fine-tune the results.作者: ethereal 時間: 2025-3-27 05:57 作者: dermatomyositis 時間: 2025-3-27 12:02 作者: Demulcent 時間: 2025-3-27 13:53 作者: 感情脆弱 時間: 2025-3-27 21:08
Sign Language Interpreter,ir quarantine from the rest of the society notably. Results from this literature review could help in development of an efficient sign interpreter which helps for the communication between non-signer and a signer.作者: Entirety 時間: 2025-3-27 23:26
Performance Analysis and Assessment of Various Energy Efficient Clustering-Based Protocols in WSN,ced distributed energy efficient clustering (EDEEC) and stable election protocol (SEP) are executed. The analysis is carried out in terms of number of nodes and probability of election for cluster head (CH). The observations and results obtained for these protocols are presented.作者: 流利圓滑 時間: 2025-3-28 03:07 作者: OASIS 時間: 2025-3-28 09:07
K-Splits: Improved K-Means Clustering Algorithm to Automatically Detect the Number of Clusters,er than the standard .-means in lower dimensions. Furthermore, this article delves deeper into the effects of algorithm hyperparameters and dataset parameters on .-splits. Finally, it suggests using .-splits to uncover the exact position of centroids and then input them as initial points to the .-means algorithm to fine-tune the results.作者: BLAND 時間: 2025-3-28 10:53
Optimisation of the Execution Time Using Hadoop-Based Parallel Machine Learning on Computing Clusteity and speed are developed after comprehensive examinations. In order to improve clustering quality and speed up the localised clustering solution, the MapReduce-K-means-distributed (MR-K-means) document clustering approach is implemented in the Hadoop framework using an efficient similarity metric.作者: 導(dǎo)師 時間: 2025-3-28 15:13
Disease Prevention and Surveillance,ata collection of the crime of these cities, data analysis to delineate the crime hotspots in the region, and the safest route between places. Visualizing the outcomes using a heatmap makes people aware of risky locations and further helps in reducing the crime count of the city.作者: antiquated 時間: 2025-3-28 20:58
https://doi.org/10.1007/978-981-99-8846-4ile phone are used to estimate the coordinates of a pedestrian. Simulations were conducted in both 2D and 3D environments. Meanwhile, the algorithm was tested to understand the impact of the number of base stations in the cellular network, using the error probability of the coordinates triangulation.作者: 不吉祥的女人 時間: 2025-3-29 01:53
The Natural Resources: Introduction(AAFSs). The aim of this paper is to perform a comparative study analysis on the research that have cause of disease in humans. Hence, there is a need of indoor automatic air filtration systems in order to generate the lucrative AAPSs in last few years, thereby controlling the AQ level.作者: 性學(xué)院 時間: 2025-3-29 05:02
,Rakshak—Prototype Application to Depict Crime Hotspot and Safest Path Between Locations,ata collection of the crime of these cities, data analysis to delineate the crime hotspots in the region, and the safest route between places. Visualizing the outcomes using a heatmap makes people aware of risky locations and further helps in reducing the crime count of the city.作者: 友好 時間: 2025-3-29 10:20
Hybrid Statistical and Deterministic-Based Pedestrian Tracking Algorithm for Location-Based IoT Appile phone are used to estimate the coordinates of a pedestrian. Simulations were conducted in both 2D and 3D environments. Meanwhile, the algorithm was tested to understand the impact of the number of base stations in the cellular network, using the error probability of the coordinates triangulation.作者: 聾子 時間: 2025-3-29 11:54 作者: phase-2-enzyme 時間: 2025-3-29 16:41
Conference proceedings 2022ized by Vaigai College Engineering, Madurai, Tamil Nadu,?India, during December 9–10, 2021.?The book covers original papers on computer networks, network protocols and wireless networks, data communication technologies and network security. The book is a valuable resource and reference for researche作者: overweight 時間: 2025-3-29 22:15 作者: Halfhearted 時間: 2025-3-30 03:51 作者: FIN 時間: 2025-3-30 04:33
Blockchain Technology in Application Development and Associated Challenges,evelop various security-related applications. Blockchain technology is developed using various advance technique of cryptography and economic models. It is also a public ledger of all cryptographic transaction done online. Blockchain network also provides various types of implementations like permis作者: 可憎 時間: 2025-3-30 08:33 作者: Misnomer 時間: 2025-3-30 15:35 作者: CBC471 時間: 2025-3-30 19:28 作者: 同謀 時間: 2025-3-30 20:49
An Edge-Based Disjoint Path Selection Scheme for FANETs,nt changes of network topology, FANET faces unique challenges compared with previous networks such as mobile and ad hoc networks. The major problem of FANET is selection of an effective route without duplicate relay nodes in a network. In this paper, we introduce an EBDPS—an edge-based disjoint path作者: Phonophobia 時間: 2025-3-31 01:12
Sign Language Interpreter,son or through any other devices. To overcome this communication barrier, they need an interpreter which converts the sign language into text. In some situations, these impaired people may be unknown with sign language. Thus, necessity of sign interpreter is unpreventable. Developing this kind of in作者: 偽書 時間: 2025-3-31 06:08 作者: 變色龍 時間: 2025-3-31 10:22
A Comparative Study Analysis on Air Monitoring and Purification Systems, air pollutants, solid particles, smoke, and dust from these industries. Air pollutants can be smog, nitrogen oxides, carbon monoxide, carbon dioxide, ammonia, sulphur dioxide, and other pollutants. Outdoor as well as indoor AQ level is affected by these types of pollutants. Other case of indoor AQ 作者: impale 時間: 2025-3-31 14:11
Malicious Node Detection and Prevention for Secured Communication in WSN,uch types of infrastructure have been used in areas such as health care, defense, agricultural sectors, and emergency management, as communications systems and intrusion detection. Due to various growing use of wireless sensor networks, essential information is shared in an insecure channel among ne作者: micturition 時間: 2025-3-31 20:10
Performance Analysis and Assessment of Various Energy Efficient Clustering-Based Protocols in WSN, economy and life, starting from bio diversity mapping to industry automation, transportation, healthcare monitoring. These networks primarily aim to develop protocols to utilize the sensor node energy efficiently and thereby maximize the lifetime of the network. In this research paper, we compare t作者: 有斑點 時間: 2025-4-1 01:05 作者: modish 時間: 2025-4-1 05:42
Analysis of Factor Verification Affecting Recruitment Process Through Social Dynamics,tials needs to be done before the job offer is made, and if any discrepancy is found at a later stage, the entire process of recruitment loses its credibility. This can result in a loss of money, time and other resources for the organizations. Graph-based analysis using NoSQL software has proved to 作者: 呼吸 時間: 2025-4-1 07:05
Routing Protocols in an Opportunistic Network: A Survey,ng nodes are not more than 100?m. These mobile nodes are temporarily connected, and network topology in an opportunistic network is dynamic due to mobility of all nodes. In an opportunistic network, there is no end to end link exits between source and destination node, and message is transmitted fro作者: 團結(jié) 時間: 2025-4-1 11:11 作者: corn732 時間: 2025-4-1 18:23 作者: Surgeon 時間: 2025-4-1 18:53 作者: Amplify 時間: 2025-4-2 01:30