標(biāo)題: Titlebook: Computing Science, Communication and Security; 4th International Co Nirbhay Chaubey,Sabu M. Thampi,Kiran Amin Conference proceedings 2023 T [打印本頁] 作者: 調(diào)停 時間: 2025-3-21 17:49
書目名稱Computing Science, Communication and Security影響因子(影響力)
書目名稱Computing Science, Communication and Security影響因子(影響力)學(xué)科排名
書目名稱Computing Science, Communication and Security網(wǎng)絡(luò)公開度
書目名稱Computing Science, Communication and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computing Science, Communication and Security被引頻次
書目名稱Computing Science, Communication and Security被引頻次學(xué)科排名
書目名稱Computing Science, Communication and Security年度引用
書目名稱Computing Science, Communication and Security年度引用學(xué)科排名
書目名稱Computing Science, Communication and Security讀者反饋
書目名稱Computing Science, Communication and Security讀者反饋學(xué)科排名
作者: 軍火 時間: 2025-3-21 23:44 作者: Nebulous 時間: 2025-3-22 02:57 作者: 平靜生活 時間: 2025-3-22 08:06
Performance Analysis of Smart Antenna in Wireless Communication System,ated with a MATLAB simulator under multipath effects and multiple users. Comparing the results of the simulations with those of previous work suggests an improvement in the convergence rate, which leads to better efficiency of the system.作者: FEAS 時間: 2025-3-22 12:08
1865-0929 023, held in Gandhinagar, India, during February 6–7, 2023.?.The 20 full papers included in this book were carefully reviewed and selected from 190 submissions. They were organized in topical sections on?artificial intelligence and machine learning; networking and communications..978-3-031-40563-197作者: Functional 時間: 2025-3-22 14:09 作者: Functional 時間: 2025-3-22 18:02 作者: 重疊 時間: 2025-3-23 00:21 作者: 真實的人 時間: 2025-3-23 02:36
A Comparative Study of DWT and DCT Along with AES Techniques for Safety Transmission of Digital Banopyright protection to the cheque image. In this study, the discrete wavelet (DWT) and discrete cosine (DCT) transforms are integrated and implemented for watermarking using the AES technique with a maximum key length of ‘256 bits. In addition, the analysis is done for watermarking, for which AES is used for security against various attack types.作者: Deadpan 時間: 2025-3-23 08:38 作者: 旅行路線 時間: 2025-3-23 10:37 作者: VICT 時間: 2025-3-23 15:06
1865-0929 bmissions. They were organized in topical sections on?artificial intelligence and machine learning; networking and communications..978-3-031-40563-1978-3-031-40564-8Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 上腭 時間: 2025-3-23 21:43 作者: 固執(zhí)點好 時間: 2025-3-23 22:15 作者: Freeze 時間: 2025-3-24 06:26
https://doi.org/10.1007/978-3-031-40564-8artificial intelligence; communication channels (information theory); communication systems; computer h作者: 露天歷史劇 時間: 2025-3-24 06:40
978-3-031-40563-1The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: 種類 時間: 2025-3-24 12:05
https://doi.org/10.1007/978-3-540-30033-5due to co-channel interference (CCI) in time selective fading channel. To suppress CCI effects various signal detection techniques are investigated including diagonalized zero forcing detection (DZFD), successive interference cancellation (SIC), decision feedback detection (DFD), List-SIC, and maxim作者: 占卜者 時間: 2025-3-24 18:39 作者: dragon 時間: 2025-3-24 23:00 作者: Integrate 時間: 2025-3-25 02:20
https://doi.org/10.1007/978-3-540-30033-5 Cost-based, chaining, and clustering models are just a few of the many that inform the creation of routing protocols. It can be challenging to keep track of all of the nodes in Wireless Sensor Networks because there are so many of them. The optimal strategy is to form a cluster out of several nodes作者: CAB 時間: 2025-3-25 03:30
https://doi.org/10.1007/978-3-540-30033-5 target in WSN. Compared to other prediction methods, the efficiency of the TDNN is better. By considering target velocity and geometrical shapes, lost target recovery can be improved further in terms of energy efficiency. Performance of different methods based on circular and contour geometrical sh作者: Compass 時間: 2025-3-25 08:12 作者: CHIP 時間: 2025-3-25 14:38 作者: transient-pain 時間: 2025-3-25 17:28 作者: agitate 時間: 2025-3-25 23:23
https://doi.org/10.1007/b137708eased and network life can be prolonged via the process of clustering. To reduce the network’s power consumption and increase its lifespan, we used a new clustering technique in this work. Centralized cluster formation and decentralized cluster heads form the basis of this stage of clustering. Clust作者: 外來 時間: 2025-3-26 02:30
https://doi.org/10.1007/b137708omic advantages, particularly in catastrophic weather event scenarios and vital military operations. The utilization of Non-Orthogonal Multiple Access(NOMA) has been efficiently done to enhance channel utilization. Multiple users transmit information using similar frequency bands. This technique is 作者: Triglyceride 時間: 2025-3-26 04:31
https://doi.org/10.1007/b137708s are proposed for this task, and each of these models showcases non-uniform performance & complexity levels when applied to real-time scenarios. To overcome such issues, this text proposes the design of a deep-learning-based bioinspired model that assists in improving the feature extraction capabil作者: Tdd526 時間: 2025-3-26 10:35 作者: Hallmark 時間: 2025-3-26 13:14 作者: Inscrutable 時間: 2025-3-26 20:04 作者: 同步左右 時間: 2025-3-27 00:39
https://doi.org/10.1007/b137708nes, ecommerce sites and download the video or photos. Various web browsers are available in the market for this purpose but Google chrome, Mozilla Firefox and Brave are the well-known browser application. These web browsers might be use for normal internet access also use to committee the crime. In作者: 清澈 時間: 2025-3-27 04:52 作者: CRAB 時間: 2025-3-27 05:29 作者: Forehead-Lift 時間: 2025-3-27 11:47 作者: 偏狂癥 時間: 2025-3-27 13:36
https://doi.org/10.1007/b137708d solution. However, the electromagnetic spectrum is becoming increasingly congested, making this a more and more challenging task. In this paper, we present a standard LMS algorithm that can detect taps based on NLMS and active detection. The proposed scheme takes advantage of refining the converge作者: Overdose 時間: 2025-3-27 19:52
Communications in Computer and Information Sciencehttp://image.papertrans.cn/c/image/234751.jpg作者: Charitable 時間: 2025-3-27 23:39 作者: inflame 時間: 2025-3-28 05:13
https://doi.org/10.1007/978-3-540-30033-5ion is carried out for proposed OIDF method and various standard conventional signal detection methods based on complexity and bit error rate (BER). The results show that BER performance of OIDF method nearly approaches to ML method with substantial reduction in complexity.作者: ciliary-body 時間: 2025-3-28 07:58 作者: 血統(tǒng) 時間: 2025-3-28 14:19 作者: 材料等 時間: 2025-3-28 14:52
https://doi.org/10.1007/978-3-540-30033-5he cluster’s leader. It is the responsibility of the cluster head to collect data from each of the individual nodes and then transmit that data to the home station. The ACO-DEEC protocol chooses a leader for the cluster by putting a probability rule that is based on the parameters of the distance be作者: ANTI 時間: 2025-3-28 20:41 作者: 波動 時間: 2025-3-28 23:45 作者: 外表讀作 時間: 2025-3-29 04:42
https://doi.org/10.1007/b137708n problem, but also significantly lengthens the lifespan of the network. The results demonstrate the following ways in which the suggested method lessens the burden on network resources. It increases network lifetime by 301%, 131%, and 122%, decreases energy consumption by 20.53%, 6.14%, and 5%, and作者: 一罵死割除 時間: 2025-3-29 08:45 作者: Ancestor 時間: 2025-3-29 15:17
https://doi.org/10.1007/b137708ata-rate control, the model is capable of performing temporal learning for the identification of multiple disease progressions. These progressions are also evaluated via the 1D CNN model, which can be tuned for heterogeneous disease types. Due to the integration of these methods, the proposed model 作者: prosperity 時間: 2025-3-29 15:57
https://doi.org/10.1007/b137708s. Malwares that are polymorphic and metamorphic, both of which have efficient mutational features, are largely responsible for the exponential increase in the variability of malwares. The efficient categorization of the malware samples is a crucial and challenging task. This study mainly focuses on作者: Abduct 時間: 2025-3-29 23:29
https://doi.org/10.1007/b137708performs antenna without meta surface by 4%, 6.7 dBi for performance in gain and 29% decrease in the patch’s size while making utilization of a meta-surface. Applications for S-band Radar using this antenna include wide range of radar systems such as weather, surface ship and space borne type radar.作者: 圓桶 時間: 2025-3-30 03:31
https://doi.org/10.1007/b137708yzed. For simulation, open-source Network Simulator NS3 is used which takes lesser time to set up the network, provides a precise level of simulation for wireless networks, and minutely mimics real-world wireless networks scenarios. Simulations show that for a single antenna of 5?GHz band at 80?MHz 作者: affect 時間: 2025-3-30 06:29
https://doi.org/10.1007/b137708chniques cause a reduction in the probability of detection and involve a complex process to sense the spectrum. To overcome these drawbacks, the optimal signal is constructed from the original signal, and this, the spectrum is sensed. This process provides better results in terms of the probability 作者: Diverticulitis 時間: 2025-3-30 08:25
https://doi.org/10.1007/b137708 ns-3, aquasim-ng2, and obtained results among the three algorithms, reflect that the cross-layer approach in CARP enables less energy usage as compared to VBF and DBR.?Based on this finding, we proposes a new model of CARP protocol in which data packet transmission is initiated only when environmen作者: Dislocation 時間: 2025-3-30 12:53
,An Efficient Signal Detection Technique for?STBC-OFDM in?Fast Fading Channel,ion is carried out for proposed OIDF method and various standard conventional signal detection methods based on complexity and bit error rate (BER). The results show that BER performance of OIDF method nearly approaches to ML method with substantial reduction in complexity.作者: 侵略主義 時間: 2025-3-30 18:26 作者: 案發(fā)地點 時間: 2025-3-30 22:38
Relational Model and Improvised DSR Assisted Framework for Secure Wireless Communication, a proper security solution. The proposed work presents a novel idea of security towards resisting adversarial impact of selfish node and routing mis-behavior present in wireless communications environment. The 1.-framework introduces a retaliation model where a novel role of node called as an auxil作者: CHARM 時間: 2025-3-31 00:59
DEEC Protocol with ACO Based Cluster Head Selection in Wireless Sensor Network,he cluster’s leader. It is the responsibility of the cluster head to collect data from each of the individual nodes and then transmit that data to the home station. The ACO-DEEC protocol chooses a leader for the cluster by putting a probability rule that is based on the parameters of the distance be作者: 莊嚴(yán) 時間: 2025-3-31 08:00 作者: rheumatism 時間: 2025-3-31 12:21
Improvement of Network Protocol and Analysis of Security Using Aspect of Cryptography,curity. The origin of quantum cryptography explained in the Heisenberg uncertainty principle, which tells that the certain pairs of physical channels are related in a way that measuring one property restricts the third user from knowing the value of the other at the same time. In our current researc作者: agonist 時間: 2025-3-31 14:51 作者: Servile 時間: 2025-3-31 20:25
Physical Layer Security Optimisation for NOMA Based UAV Communication for Optimal Resource Allocati are accessing the same resources. To circumvent such issues much emphasis has been given to the physical layer. The popular matrices that are used for such a system are the probability of a link going down and the likelihood of a communication interception. This study examines the practicality of p作者: 使人煩燥 時間: 2025-4-1 00:21
DBFEH: Design of a Deep-Learning-Based Bioinspired Model to Improve Feature Extraction Capabilitiesata-rate control, the model is capable of performing temporal learning for the identification of multiple disease progressions. These progressions are also evaluated via the 1D CNN model, which can be tuned for heterogeneous disease types. Due to the integration of these methods, the proposed model 作者: endocardium 時間: 2025-4-1 05:31 作者: Breach 時間: 2025-4-1 08:59
Design and Analysis of Wide-Band Planar Antenna Using Meta-material for S-Band Applications,performs antenna without meta surface by 4%, 6.7 dBi for performance in gain and 29% decrease in the patch’s size while making utilization of a meta-surface. Applications for S-band Radar using this antenna include wide range of radar systems such as weather, surface ship and space borne type radar.作者: 抗體 時間: 2025-4-1 14:13