標(biāo)題: Titlebook: Data Communication and Networks; Proceedings of GUCON Lakhmi C. Jain,George A. Tsihrintzis,Dilip Kumar S Conference proceedings 2020 Spring [打印本頁] 作者: 對將來事件 時間: 2025-3-21 17:56
書目名稱Data Communication and Networks影響因子(影響力)
書目名稱Data Communication and Networks影響因子(影響力)學(xué)科排名
書目名稱Data Communication and Networks網(wǎng)絡(luò)公開度
書目名稱Data Communication and Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Communication and Networks被引頻次
書目名稱Data Communication and Networks被引頻次學(xué)科排名
書目名稱Data Communication and Networks年度引用
書目名稱Data Communication and Networks年度引用學(xué)科排名
書目名稱Data Communication and Networks讀者反饋
書目名稱Data Communication and Networks讀者反饋學(xué)科排名
作者: 無法破譯 時間: 2025-3-21 21:54
978-981-15-0131-9Springer Nature Singapore Pte Ltd. 2020作者: 刺耳 時間: 2025-3-22 01:24 作者: NUDGE 時間: 2025-3-22 06:03 作者: 動物 時間: 2025-3-22 12:19 作者: Recess 時間: 2025-3-22 14:10
Financing in the Time of Climate Emergencyafe and reliable data transfer. Using lightweight communication protocols such as the Message Queuing?Telemetry Transport (MQTT) protocol makes it much easier to establish communication between distributed devices?as it easily recovers from connectivity loss, component failures, and loss of packets.作者: Recess 時間: 2025-3-22 17:28
Climate Emergency in the Philippinesssions from which most of the features are?redundant genes and reducing the classifier accuracy. Finding a minimal subset of features from large gene expression is a challenging task where removing redundant feature but the important feature will not be missed. Many optimization techniques are intro作者: forecast 時間: 2025-3-23 00:08 作者: 約會 時間: 2025-3-23 04:06
https://doi.org/10.1007/978-3-030-79450-7 rates and bandwidth rates. Maximizing the network lifetime is a key aspect in traditional Wireless communication to maximize the data rate in typical environments. The clustering is an effective topology control approach to organize efficient communication in traditional sensor network models. Howe作者: 黃瓜 時間: 2025-3-23 08:56 作者: 凌辱 時間: 2025-3-23 10:59
https://doi.org/10.1007/978-3-030-79450-7to classify all types of faults, namely phase to ground, phase to phase, three-phase fault, and double line to ground faults that may occur at different fault locations and involve varying fault impedances in the power system using artificial neural networks (ANNs). Owing to the advantages of an art作者: 被詛咒的人 時間: 2025-3-23 17:48
Gezielte Eingriffe in das Klimasystem,the bulb, refrigerator, air conditioner, washing machine, wristwatches, mobile phones, etc. Gartner report reflects that growth in the number of IoT devices is massive. By 2025, the number of IoT devices may reach up to 50 Billion. This growth poses an enormous range of challenges. The challenges ar作者: Myocarditis 時間: 2025-3-23 20:56 作者: 招待 時間: 2025-3-24 01:49
SpringerBriefs in Environmental Scienceost commonly used term is Frequent Itemset Mining Algorithms which is one of the vital parts of Association Rule Mining. The evolutionary improvement in FIM is Weighted Frequent Itemset Mining, and these algorithms can be executed on Certain/Probabilistic Uncertain databases for calculating importan作者: 飛行員 時間: 2025-3-24 02:40
https://doi.org/10.1007/978-3-030-02475-8tion that takes the customer and the item details from the external source files and store the same in the Data Warehouse (DW) is required. It is an ETL system developed to create the mapping to load the target from the source files after applying criteria as required by the administrator and will a作者: infinite 時間: 2025-3-24 06:40 作者: 幼稚 時間: 2025-3-24 13:17
Trade Performance of CFGT in Asiahen ongoing transmission in the network is disrupted and discontinued. Mobile nodes can communicate with each other directly or multi-hop fashion. A mobile node uses battery power while working in various modes, i.e., transmitting, receiving, idle, and sleep. Routing protocols, MAC layer, and other 作者: Servile 時間: 2025-3-24 18:19
Timo Koivurova,Md. Waliul Hasanatke Disaster management, military applications, etc. But the mutual dependency among the nodes make the MANET vulnerable for many attacks. Researchers had proposed many solutions to make the routing in MANET secure, ITCA is one of the proposed examples which tries to identify malicious activity and i作者: 安慰 時間: 2025-3-24 21:41
The Climate Policy of the Arctic Councilis the Foresight Framework. In the very first steps of Foresight Framework, however, the environmental scanning is involved. This process is time-consumed since a very large amount of data must be explored. To alleviate the time in such a process, this study proposes a design and an implementation o作者: 歌劇等 時間: 2025-3-24 23:49 作者: 纖細 時間: 2025-3-25 06:34
Data Communication and Networks978-981-15-0132-6Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 怎樣才咆哮 時間: 2025-3-25 08:02 作者: assail 時間: 2025-3-25 13:37 作者: Petechiae 時間: 2025-3-25 16:10
Climate Change and Arctic FisheriesWe have employed a chosen set of machine learning models?to solve the 3-CNF-SAT problem. Through f1-scores, we obtain how these algorithms perform at solving the?problem as a classification task. The implication?of this endeavour is exciting given the property of the NP-complete class problems being polynomial-time reducible to each other.作者: 新字 時間: 2025-3-25 22:31 作者: 有抱負者 時間: 2025-3-26 01:29 作者: GRACE 時間: 2025-3-26 04:53 作者: Corral 時間: 2025-3-26 09:22
Trade Performance of CFGT in Asiation of individual node in the network. We have used AODV routing protocol for the analysis of individual node energy utilization in different mode of their operation. Finally, we observed that in receiving mode nodes average energy consumption is higher as compared to transmit mode operation.作者: archaeology 時間: 2025-3-26 16:15 作者: fastness 時間: 2025-3-26 18:02
,Fault Classification in a Transmission Line Using Levenberg–Marquardt Algorithm Based Artificial Ned under normal and faulty conditions for different fault locations and fault impedances. The learning of feed forward ANN-based fault classifier is carried out using Levenberg–Marquardt algorithm for training the data obtained for IEEE 14 bus system.作者: 減至最低 時間: 2025-3-27 00:46
Analysis of Energy Consumption in Dynamic Mobile Ad Hoc Networks,tion of individual node in the network. We have used AODV routing protocol for the analysis of individual node energy utilization in different mode of their operation. Finally, we observed that in receiving mode nodes average energy consumption is higher as compared to transmit mode operation.作者: nauseate 時間: 2025-3-27 03:31
Low Complexity Antenna Selection Scheme for Spatially Correlated Multiple Antenna Cognitive Radios,e theoretical results are verified with the simulations. The simulation results show that the proposed scheme outperforms conventional antenna selection schemes and detection probability approaches unity.作者: 鋼筆尖 時間: 2025-3-27 07:37
2194-5357 erence guide for researchers and practitioners in academia aThis book gathers selected high-quality papers presented at the International Conference on Computing, Power and Communication Technologies 2019 (GUCON 2019), organized by Galgotias University, India, in September 2019. The content is divid作者: HEAVY 時間: 2025-3-27 09:54 作者: scrape 時間: 2025-3-27 15:42
Financing in the Time of Climate EmergencyTT protocol. A complete analysis of the Quality of Service levels is performed to confirm that it behaves correctly as specified when used in communication between different components. Formal modeling has been done using PROMELA language and the model verification is done using a system verification tool called SPIN Model Checker.作者: Prophylaxis 時間: 2025-3-27 20:44
Gezielte Eingriffe in das Klimasystem, types of possible attacks on IoT and how the IoT botnet is gaining more attention and becoming a major attack. It highlights the key difference between traditional botnet and IoT botnet. Review of the existing techniques to deal with a botnet as well as the urge for a different technique to deal with IoT botnet is discussed.作者: 喪失 時間: 2025-3-28 01:10 作者: abreast 時間: 2025-3-28 02:09 作者: cringe 時間: 2025-3-28 09:50 作者: Enrage 時間: 2025-3-28 13:53 作者: 冰雹 時間: 2025-3-28 15:07
A Design and an Implementation of Forecast Sentence Extractor,f the forecast sentence extractor by using natural language processing and machine learning algorithm. The proposed algorithm digests a long article and then provides a short list of forecast sentences. Three feature selection approaches are tested. From the experimental studies, the accuracy of the proposed algorithm is up to 85.10%.作者: epicardium 時間: 2025-3-28 20:36 作者: CON 時間: 2025-3-29 01:56
Conference proceedings 2020communication technologies, and cloud computing and computer networks. In-depth discussions of various issues within these broad areas provide an intriguing and insightful reference guide for researchers, engineers and students alike.作者: APNEA 時間: 2025-3-29 03:04 作者: 首創(chuàng)精神 時間: 2025-3-29 09:00 作者: Encumber 時間: 2025-3-29 11:36
An ECC with Probable Secure and Efficient Approach on Noncommutative Cryptography,silient on these two cryptographic assumptions. The claims on the Noncommutative cryptographic scheme on monomials generated elements is considered be based on hidden subgroup or subfield problems that strengthen this manuscript, where original assumptions are hidden and its equivalents semiring tak作者: 利用 時間: 2025-3-29 19:27
Probability Prediction Using Improved Method in Delay-Tolerant Network, obtains the message accumulates it and advances its duplicate to another node it experiences. There are many parameters used to evaluate the Delivery Probability (DP) and storage of each node is also used because in DTN all the nodes should be capable of storing the message if the path is not avail作者: evince 時間: 2025-3-29 21:40
Taxonomy of Cyberbullying Detection and Prediction Techniques in Online Social Networks,ility of multiple users, which resultantly attract more criminals and hence increasing insecurity in OSN. Different types of crimes are committed for multiple reasons in cyber realm by taking assistance of cyber technology. This insecure environment of OSN needs attention to prevent the damage cause作者: Curmudgeon 時間: 2025-3-30 02:29 作者: 洞穴 時間: 2025-3-30 07:18 作者: 增強 時間: 2025-3-30 11:12 作者: Abnormal 時間: 2025-3-30 15:21 作者: 雜役 時間: 2025-3-30 19:04
A Novel Hybrid User Authentication Scheme Using Cognitive Ambiguous Illusion Images,fing and brute-force. On the other hand, graphical passwords are easy to remember and memorize. But they are still not commonly used as they have some issues like increased user login time, and small password space. In today’s scenario where number of data breaches is increasing, more secure authent作者: maroon 時間: 2025-3-30 23:26
,Fault Classification in a Transmission Line Using Levenberg–Marquardt Algorithm Based Artificial Neto classify all types of faults, namely phase to ground, phase to phase, three-phase fault, and double line to ground faults that may occur at different fault locations and involve varying fault impedances in the power system using artificial neural networks (ANNs). Owing to the advantages of an art作者: 咒語 時間: 2025-3-31 03:12 作者: commensurate 時間: 2025-3-31 08:55 作者: Antagonism 時間: 2025-3-31 10:56
Weighted Frequent Itemset Mining Using OWA on Uncertain Transactional Database,ost commonly used term is Frequent Itemset Mining Algorithms which is one of the vital parts of Association Rule Mining. The evolutionary improvement in FIM is Weighted Frequent Itemset Mining, and these algorithms can be executed on Certain/Probabilistic Uncertain databases for calculating importan作者: 炸壞 時間: 2025-3-31 17:21
Design of Customer Information Management System,tion that takes the customer and the item details from the external source files and store the same in the Data Warehouse (DW) is required. It is an ETL system developed to create the mapping to load the target from the source files after applying criteria as required by the administrator and will a作者: muscle-fibers 時間: 2025-3-31 18:36
Modeling Machine Learning Agent for Interaction Conversational System Using Max Entropy Approach inle of these services, there are several issues that occur. User wants an interface for complaint. This paper uses the sentence boundary detection, NER, document categorization, and sentiment extraction methodologies. The natural language processing generates the training model which is a statistical作者: 傳染 時間: 2025-4-1 01:08
Analysis of Energy Consumption in Dynamic Mobile Ad Hoc Networks,hen ongoing transmission in the network is disrupted and discontinued. Mobile nodes can communicate with each other directly or multi-hop fashion. A mobile node uses battery power while working in various modes, i.e., transmitting, receiving, idle, and sleep. Routing protocols, MAC layer, and other 作者: HUSH 時間: 2025-4-1 04:22
Improved ITCA Method to Mitigate Network-Layer Attack in MANET,ke Disaster management, military applications, etc. But the mutual dependency among the nodes make the MANET vulnerable for many attacks. Researchers had proposed many solutions to make the routing in MANET secure, ITCA is one of the proposed examples which tries to identify malicious activity and i作者: 是比賽 時間: 2025-4-1 08:28
A Design and an Implementation of Forecast Sentence Extractor,is the Foresight Framework. In the very first steps of Foresight Framework, however, the environmental scanning is involved. This process is time-consumed since a very large amount of data must be explored. To alleviate the time in such a process, this study proposes a design and an implementation o作者: FLUSH 時間: 2025-4-1 12:24
Low Complexity Antenna Selection Scheme for Spatially Correlated Multiple Antenna Cognitive Radios,. But because of multipath fading, the spatial correlation arises which depends on the antenna spacing and angle of arrival. This spatial correlation degrades the sensing performance significantly. In this paper, a low complexity antenna selection scheme has been proposed to reduce the effect of spa