派博傳思國際中心

標(biāo)題: Titlebook: Data Communication and Networks; Proceedings of GUCON Lakhmi C. Jain,George A. Tsihrintzis,Dilip Kumar S Conference proceedings 2020 Spring [打印本頁]

作者: 對將來事件    時間: 2025-3-21 17:56
書目名稱Data Communication and Networks影響因子(影響力)




書目名稱Data Communication and Networks影響因子(影響力)學(xué)科排名




書目名稱Data Communication and Networks網(wǎng)絡(luò)公開度




書目名稱Data Communication and Networks網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Data Communication and Networks被引頻次




書目名稱Data Communication and Networks被引頻次學(xué)科排名




書目名稱Data Communication and Networks年度引用




書目名稱Data Communication and Networks年度引用學(xué)科排名




書目名稱Data Communication and Networks讀者反饋




書目名稱Data Communication and Networks讀者反饋學(xué)科排名





作者: 無法破譯    時間: 2025-3-21 21:54
978-981-15-0131-9Springer Nature Singapore Pte Ltd. 2020
作者: 刺耳    時間: 2025-3-22 01:24

作者: NUDGE    時間: 2025-3-22 06:03

作者: 動物    時間: 2025-3-22 12:19

作者: Recess    時間: 2025-3-22 14:10
Financing in the Time of Climate Emergencyafe and reliable data transfer. Using lightweight communication protocols such as the Message Queuing?Telemetry Transport (MQTT) protocol makes it much easier to establish communication between distributed devices?as it easily recovers from connectivity loss, component failures, and loss of packets.
作者: Recess    時間: 2025-3-22 17:28
Climate Emergency in the Philippinesssions from which most of the features are?redundant genes and reducing the classifier accuracy. Finding a minimal subset of features from large gene expression is a challenging task where removing redundant feature but the important feature will not be missed. Many optimization techniques are intro
作者: forecast    時間: 2025-3-23 00:08

作者: 約會    時間: 2025-3-23 04:06
https://doi.org/10.1007/978-3-030-79450-7 rates and bandwidth rates. Maximizing the network lifetime is a key aspect in traditional Wireless communication to maximize the data rate in typical environments. The clustering is an effective topology control approach to organize efficient communication in traditional sensor network models. Howe
作者: 黃瓜    時間: 2025-3-23 08:56

作者: 凌辱    時間: 2025-3-23 10:59
https://doi.org/10.1007/978-3-030-79450-7to classify all types of faults, namely phase to ground, phase to phase, three-phase fault, and double line to ground faults that may occur at different fault locations and involve varying fault impedances in the power system using artificial neural networks (ANNs). Owing to the advantages of an art
作者: 被詛咒的人    時間: 2025-3-23 17:48
Gezielte Eingriffe in das Klimasystem,the bulb, refrigerator, air conditioner, washing machine, wristwatches, mobile phones, etc. Gartner report reflects that growth in the number of IoT devices is massive. By 2025, the number of IoT devices may reach up to 50 Billion. This growth poses an enormous range of challenges. The challenges ar
作者: Myocarditis    時間: 2025-3-23 20:56

作者: 招待    時間: 2025-3-24 01:49
SpringerBriefs in Environmental Scienceost commonly used term is Frequent Itemset Mining Algorithms which is one of the vital parts of Association Rule Mining. The evolutionary improvement in FIM is Weighted Frequent Itemset Mining, and these algorithms can be executed on Certain/Probabilistic Uncertain databases for calculating importan
作者: 飛行員    時間: 2025-3-24 02:40
https://doi.org/10.1007/978-3-030-02475-8tion that takes the customer and the item details from the external source files and store the same in the Data Warehouse (DW) is required. It is an ETL system developed to create the mapping to load the target from the source files after applying criteria as required by the administrator and will a
作者: infinite    時間: 2025-3-24 06:40

作者: 幼稚    時間: 2025-3-24 13:17
Trade Performance of CFGT in Asiahen ongoing transmission in the network is disrupted and discontinued. Mobile nodes can communicate with each other directly or multi-hop fashion. A mobile node uses battery power while working in various modes, i.e., transmitting, receiving, idle, and sleep. Routing protocols, MAC layer, and other
作者: Servile    時間: 2025-3-24 18:19
Timo Koivurova,Md. Waliul Hasanatke Disaster management, military applications, etc. But the mutual dependency among the nodes make the MANET vulnerable for many attacks. Researchers had proposed many solutions to make the routing in MANET secure, ITCA is one of the proposed examples which tries to identify malicious activity and i
作者: 安慰    時間: 2025-3-24 21:41
The Climate Policy of the Arctic Councilis the Foresight Framework. In the very first steps of Foresight Framework, however, the environmental scanning is involved. This process is time-consumed since a very large amount of data must be explored. To alleviate the time in such a process, this study proposes a design and an implementation o
作者: 歌劇等    時間: 2025-3-24 23:49

作者: 纖細    時間: 2025-3-25 06:34
Data Communication and Networks978-981-15-0132-6Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 怎樣才咆哮    時間: 2025-3-25 08:02

作者: assail    時間: 2025-3-25 13:37

作者: Petechiae    時間: 2025-3-25 16:10
Climate Change and Arctic FisheriesWe have employed a chosen set of machine learning models?to solve the 3-CNF-SAT problem. Through f1-scores, we obtain how these algorithms perform at solving the?problem as a classification task. The implication?of this endeavour is exciting given the property of the NP-complete class problems being polynomial-time reducible to each other.
作者: 新字    時間: 2025-3-25 22:31

作者: 有抱負者    時間: 2025-3-26 01:29

作者: GRACE    時間: 2025-3-26 04:53

作者: Corral    時間: 2025-3-26 09:22
Trade Performance of CFGT in Asiation of individual node in the network. We have used AODV routing protocol for the analysis of individual node energy utilization in different mode of their operation. Finally, we observed that in receiving mode nodes average energy consumption is higher as compared to transmit mode operation.
作者: archaeology    時間: 2025-3-26 16:15

作者: fastness    時間: 2025-3-26 18:02
,Fault Classification in a Transmission Line Using Levenberg–Marquardt Algorithm Based Artificial Ned under normal and faulty conditions for different fault locations and fault impedances. The learning of feed forward ANN-based fault classifier is carried out using Levenberg–Marquardt algorithm for training the data obtained for IEEE 14 bus system.
作者: 減至最低    時間: 2025-3-27 00:46
Analysis of Energy Consumption in Dynamic Mobile Ad Hoc Networks,tion of individual node in the network. We have used AODV routing protocol for the analysis of individual node energy utilization in different mode of their operation. Finally, we observed that in receiving mode nodes average energy consumption is higher as compared to transmit mode operation.
作者: nauseate    時間: 2025-3-27 03:31
Low Complexity Antenna Selection Scheme for Spatially Correlated Multiple Antenna Cognitive Radios,e theoretical results are verified with the simulations. The simulation results show that the proposed scheme outperforms conventional antenna selection schemes and detection probability approaches unity.
作者: 鋼筆尖    時間: 2025-3-27 07:37
2194-5357 erence guide for researchers and practitioners in academia aThis book gathers selected high-quality papers presented at the International Conference on Computing, Power and Communication Technologies 2019 (GUCON 2019), organized by Galgotias University, India, in September 2019. The content is divid
作者: HEAVY    時間: 2025-3-27 09:54

作者: scrape    時間: 2025-3-27 15:42
Financing in the Time of Climate EmergencyTT protocol. A complete analysis of the Quality of Service levels is performed to confirm that it behaves correctly as specified when used in communication between different components. Formal modeling has been done using PROMELA language and the model verification is done using a system verification tool called SPIN Model Checker.
作者: Prophylaxis    時間: 2025-3-27 20:44
Gezielte Eingriffe in das Klimasystem, types of possible attacks on IoT and how the IoT botnet is gaining more attention and becoming a major attack. It highlights the key difference between traditional botnet and IoT botnet. Review of the existing techniques to deal with a botnet as well as the urge for a different technique to deal with IoT botnet is discussed.
作者: 喪失    時間: 2025-3-28 01:10

作者: abreast    時間: 2025-3-28 02:09

作者: cringe    時間: 2025-3-28 09:50

作者: Enrage    時間: 2025-3-28 13:53

作者: 冰雹    時間: 2025-3-28 15:07
A Design and an Implementation of Forecast Sentence Extractor,f the forecast sentence extractor by using natural language processing and machine learning algorithm. The proposed algorithm digests a long article and then provides a short list of forecast sentences. Three feature selection approaches are tested. From the experimental studies, the accuracy of the proposed algorithm is up to 85.10%.
作者: epicardium    時間: 2025-3-28 20:36

作者: CON    時間: 2025-3-29 01:56
Conference proceedings 2020communication technologies, and cloud computing and computer networks. In-depth discussions of various issues within these broad areas provide an intriguing and insightful reference guide for researchers, engineers and students alike.
作者: APNEA    時間: 2025-3-29 03:04

作者: 首創(chuàng)精神    時間: 2025-3-29 09:00

作者: Encumber    時間: 2025-3-29 11:36
An ECC with Probable Secure and Efficient Approach on Noncommutative Cryptography,silient on these two cryptographic assumptions. The claims on the Noncommutative cryptographic scheme on monomials generated elements is considered be based on hidden subgroup or subfield problems that strengthen this manuscript, where original assumptions are hidden and its equivalents semiring tak
作者: 利用    時間: 2025-3-29 19:27
Probability Prediction Using Improved Method in Delay-Tolerant Network, obtains the message accumulates it and advances its duplicate to another node it experiences. There are many parameters used to evaluate the Delivery Probability (DP) and storage of each node is also used because in DTN all the nodes should be capable of storing the message if the path is not avail
作者: evince    時間: 2025-3-29 21:40
Taxonomy of Cyberbullying Detection and Prediction Techniques in Online Social Networks,ility of multiple users, which resultantly attract more criminals and hence increasing insecurity in OSN. Different types of crimes are committed for multiple reasons in cyber realm by taking assistance of cyber technology. This insecure environment of OSN needs attention to prevent the damage cause
作者: Curmudgeon    時間: 2025-3-30 02:29

作者: 洞穴    時間: 2025-3-30 07:18

作者: 增強    時間: 2025-3-30 11:12

作者: Abnormal    時間: 2025-3-30 15:21

作者: 雜役    時間: 2025-3-30 19:04
A Novel Hybrid User Authentication Scheme Using Cognitive Ambiguous Illusion Images,fing and brute-force. On the other hand, graphical passwords are easy to remember and memorize. But they are still not commonly used as they have some issues like increased user login time, and small password space. In today’s scenario where number of data breaches is increasing, more secure authent
作者: maroon    時間: 2025-3-30 23:26
,Fault Classification in a Transmission Line Using Levenberg–Marquardt Algorithm Based Artificial Neto classify all types of faults, namely phase to ground, phase to phase, three-phase fault, and double line to ground faults that may occur at different fault locations and involve varying fault impedances in the power system using artificial neural networks (ANNs). Owing to the advantages of an art
作者: 咒語    時間: 2025-3-31 03:12

作者: commensurate    時間: 2025-3-31 08:55

作者: Antagonism    時間: 2025-3-31 10:56
Weighted Frequent Itemset Mining Using OWA on Uncertain Transactional Database,ost commonly used term is Frequent Itemset Mining Algorithms which is one of the vital parts of Association Rule Mining. The evolutionary improvement in FIM is Weighted Frequent Itemset Mining, and these algorithms can be executed on Certain/Probabilistic Uncertain databases for calculating importan
作者: 炸壞    時間: 2025-3-31 17:21
Design of Customer Information Management System,tion that takes the customer and the item details from the external source files and store the same in the Data Warehouse (DW) is required. It is an ETL system developed to create the mapping to load the target from the source files after applying criteria as required by the administrator and will a
作者: muscle-fibers    時間: 2025-3-31 18:36
Modeling Machine Learning Agent for Interaction Conversational System Using Max Entropy Approach inle of these services, there are several issues that occur. User wants an interface for complaint. This paper uses the sentence boundary detection, NER, document categorization, and sentiment extraction methodologies. The natural language processing generates the training model which is a statistical
作者: 傳染    時間: 2025-4-1 01:08
Analysis of Energy Consumption in Dynamic Mobile Ad Hoc Networks,hen ongoing transmission in the network is disrupted and discontinued. Mobile nodes can communicate with each other directly or multi-hop fashion. A mobile node uses battery power while working in various modes, i.e., transmitting, receiving, idle, and sleep. Routing protocols, MAC layer, and other
作者: HUSH    時間: 2025-4-1 04:22
Improved ITCA Method to Mitigate Network-Layer Attack in MANET,ke Disaster management, military applications, etc. But the mutual dependency among the nodes make the MANET vulnerable for many attacks. Researchers had proposed many solutions to make the routing in MANET secure, ITCA is one of the proposed examples which tries to identify malicious activity and i
作者: 是比賽    時間: 2025-4-1 08:28
A Design and an Implementation of Forecast Sentence Extractor,is the Foresight Framework. In the very first steps of Foresight Framework, however, the environmental scanning is involved. This process is time-consumed since a very large amount of data must be explored. To alleviate the time in such a process, this study proposes a design and an implementation o
作者: FLUSH    時間: 2025-4-1 12:24
Low Complexity Antenna Selection Scheme for Spatially Correlated Multiple Antenna Cognitive Radios,. But because of multipath fading, the spatial correlation arises which depends on the antenna spacing and angle of arrival. This spatial correlation degrades the sensing performance significantly. In this paper, a low complexity antenna selection scheme has been proposed to reduce the effect of spa




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
大邑县| 都昌县| 瑞丽市| 东海县| 运城市| 昌宁县| 商洛市| 黑龙江省| 三门峡市| 鄄城县| 布拖县| 老河口市| 霍林郭勒市| 绥滨县| 中阳县| 视频| 华池县| 嘉祥县| 玉树县| 诸暨市| 甘孜县| 咸丰县| 民乐县| 武夷山市| 鲜城| 嵊泗县| 大渡口区| 三都| 卓资县| 建阳市| 雷波县| 永德县| 嫩江县| 鹤山市| 大埔县| 义马市| 阳信县| 兴和县| 淳化县| 乌恰县| 青神县|