派博傳思國際中心

標(biāo)題: Titlebook: Data and Communication Networks; Proceedings of GUCON Lakhmi C. Jain,Valentina E. Balas,Prashant Johri Conference proceedings 2019 Springer [打印本頁]

作者: Objective    時(shí)間: 2025-3-21 16:05
書目名稱Data and Communication Networks影響因子(影響力)




書目名稱Data and Communication Networks影響因子(影響力)學(xué)科排名




書目名稱Data and Communication Networks網(wǎng)絡(luò)公開度




書目名稱Data and Communication Networks網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Data and Communication Networks被引頻次




書目名稱Data and Communication Networks被引頻次學(xué)科排名




書目名稱Data and Communication Networks年度引用




書目名稱Data and Communication Networks年度引用學(xué)科排名




書目名稱Data and Communication Networks讀者反饋




書目名稱Data and Communication Networks讀者反饋學(xué)科排名





作者: exclusice    時(shí)間: 2025-3-21 22:37
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/d/image/263241.jpg
作者: 使出神    時(shí)間: 2025-3-22 00:36
Data and Communication Networks978-981-13-2254-9Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 交響樂    時(shí)間: 2025-3-22 05:35

作者: 等級(jí)的上升    時(shí)間: 2025-3-22 09:24
978-981-13-2253-2Springer Nature Singapore Pte Ltd. 2019
作者: 輕而薄    時(shí)間: 2025-3-22 15:08
Qifeng Zhuang,Zhiyong Yu,Kun Guowhich is well known as Beaulieu-Xie fading channel. This fading model consists of multiple no. of line-of-sight (LOS) components with some diffuse power. Specifically, the closed-form expressions are derived for the exact ABER of binary phase-shift keying (BPSK) and differential phase-shift keying (
作者: 輕而薄    時(shí)間: 2025-3-22 20:06
Bo Jiang,Xuejun Xu,Junchen Yang,Tian Wangith diffuse power (TWDP) fading. It is considered that the envelope of phase error is Gaussian distributed. The effect of phase synchronization on wireless system is studied for different values of TWDP fading parameters and phase error. The analytical results are evaluated to study the impact of ph
作者: 愛花花兒憤怒    時(shí)間: 2025-3-23 00:37
Yinzhang Guo,Xiaoyan Li,Xinyu Zhaod on resource utilization not only enables informed decisions about mapping of current request to available capacity, but also serves as a meaningful indicator for future resource requirements. Of paramount concern is the optimal utilization of data center server capacity, i.e., the CPU, I/O, and me
作者: 殺人    時(shí)間: 2025-3-23 01:35
Yiming Tang,Xiaopeng Han,Xi Wu,Li Zhangby the vehicle may lead to hazardous problems and may create various serious issues. Thus, they need to be handled very carefully. Here, we have used trust-based methodology to find location with the help of trustworthiness of the node. In our proposed trust-based scheme, firstly calculation of trus
作者: 拋射物    時(shí)間: 2025-3-23 08:56

作者: 使成波狀    時(shí)間: 2025-3-23 12:32

作者: 史前    時(shí)間: 2025-3-23 16:56
Shuai Liu,Zi-Jia Wang,Zong-Gan Chen networks (WSNs) deals with accumulation and processing of data and forward that to the remote locations, generally considered as cloud. Generally,? communication is done between the nodes which are placed at a far locations? in the field. Hence, the energy consumption required to communicate the no
作者: declamation    時(shí)間: 2025-3-23 20:13

作者: 討好美人    時(shí)間: 2025-3-23 23:47
Xuhui Luo,Jianguo Li,Zhanxuan Cheny. There are many attacks that affect the performance of MANETs. Flooding attack is a Denial of Service attack, also known as DoS attack that brings down the network by flooding with a huge amount of route request (RREQ) packets, routed to a destination that does not exist. This paper proposes a rob
作者: 勤勞    時(shí)間: 2025-3-24 04:18

作者: 斑駁    時(shí)間: 2025-3-24 07:33

作者: 旅行路線    時(shí)間: 2025-3-24 12:59

作者: Gratuitous    時(shí)間: 2025-3-24 15:43

作者: 滑動(dòng)    時(shí)間: 2025-3-24 20:33
Pedro Curto,Nuno Mamede,Jorge Baptistarowing data. Dealing with big data is one of the emerging areas of research which is expanding at a rapid rate in all domains of engineering and medical sciences. A major challenge imposes on the analysis of big data is originated from big data generation source, which generate data with very fast s
作者: 雀斑    時(shí)間: 2025-3-25 03:00

作者: 打火石    時(shí)間: 2025-3-25 06:04

作者: 惡心    時(shí)間: 2025-3-25 10:50
Fumiya Mori,Fatemeh Azadi Naghsh,Taro Tezuka relations among the different types of blockchains are established. Further, the extraction of capabilities of strengths of diverse blockchains catering to different kind of micro-services is a crucial step toward the realistic blockchain. This issue even became of utmost significance when specific
作者: jaunty    時(shí)間: 2025-3-25 14:53

作者: 牢騷    時(shí)間: 2025-3-25 16:22
Analysis of Binary PSK Modulations Over the Line-of-Sight Plus Scatter Fading Model,which is well known as Beaulieu-Xie fading channel. This fading model consists of multiple no. of line-of-sight (LOS) components with some diffuse power. Specifically, the closed-form expressions are derived for the exact ABER of binary phase-shift keying (BPSK) and differential phase-shift keying (
作者: inhibit    時(shí)間: 2025-3-25 23:05
Approximate Bit Error Rate of DPSK with Imperfect Phase Noise in TWDP Fading,ith diffuse power (TWDP) fading. It is considered that the envelope of phase error is Gaussian distributed. The effect of phase synchronization on wireless system is studied for different values of TWDP fading parameters and phase error. The analytical results are evaluated to study the impact of ph
作者: expire    時(shí)間: 2025-3-26 03:30
Analysis of Workloads for Cloud Infrastructure Capacity Planning,d on resource utilization not only enables informed decisions about mapping of current request to available capacity, but also serves as a meaningful indicator for future resource requirements. Of paramount concern is the optimal utilization of data center server capacity, i.e., the CPU, I/O, and me
作者: 節(jié)約    時(shí)間: 2025-3-26 07:00

作者: Injunction    時(shí)間: 2025-3-26 09:13

作者: mercenary    時(shí)間: 2025-3-26 13:50

作者: inscribe    時(shí)間: 2025-3-26 18:16

作者: NOMAD    時(shí)間: 2025-3-26 23:43

作者: 保存    時(shí)間: 2025-3-27 01:27
Detection of RREQ Flooding Attacks in MANETs,y. There are many attacks that affect the performance of MANETs. Flooding attack is a Denial of Service attack, also known as DoS attack that brings down the network by flooding with a huge amount of route request (RREQ) packets, routed to a destination that does not exist. This paper proposes a rob
作者: DOTE    時(shí)間: 2025-3-27 08:09

作者: LEVY    時(shí)間: 2025-3-27 12:43

作者: OUTRE    時(shí)間: 2025-3-27 15:36
An Empirical Analysis of Collaborative Filtering Algorithms for Building a Food Recommender System,orking sites. However, the use of recommendation engine has been very little in the food sector. Sometimes people become tired of having the same kind of meals everyday because of several reasons. Some people need to consume fixed food due to their illness; others consume same meals everyday to stay
作者: Nausea    時(shí)間: 2025-3-27 20:28

作者: 駭人    時(shí)間: 2025-3-28 00:01

作者: ornithology    時(shí)間: 2025-3-28 05:31

作者: 摻假    時(shí)間: 2025-3-28 07:49
Framework for Real-World Event Detection Through Online Social Networking Sites,he OSNs now resemble the real world very cohesively. The excess of continuously user-generated online textual data by OSNs that encapsulates almost all verticals of the real world has attracted many researchers who are working in the area of text mining, natural language processing (NLP), machine le
作者: CORE    時(shí)間: 2025-3-28 12:01

作者: 描述    時(shí)間: 2025-3-28 18:29
Homomorphism Between Fuzzy Set-Valued Information Systems,stent homomorphism is an important analytical tool to study communication among various IS. Fuzzy set-valued information systems (FSIS) are those IS that contain fuzzy set-values for some attribute. This paper aims to discuss important properties related to communication between FSIS. Fuzzy relation
作者: 墊子    時(shí)間: 2025-3-28 21:17

作者: 萬靈丹    時(shí)間: 2025-3-29 00:00
Conference proceedings 2019logies. The selected papers are organised into three sections - cloud computing and computer networks; data mining and big data analysis; and bioinformatics and machine learning. In-depth discussions on various issues under these topics provides an interesting compilation for researchers, engineers, and students..
作者: 混合,攙雜    時(shí)間: 2025-3-29 03:34

作者: 財(cái)政    時(shí)間: 2025-3-29 07:30

作者: CORD    時(shí)間: 2025-3-29 13:05
2194-5357 er networks; data mining and big data analysis; and bioinformatics and machine learning. In-depth discussions on various issues under these topics provides an interesting compilation for researchers, engineers, and students..978-981-13-2253-2978-981-13-2254-9Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 分離    時(shí)間: 2025-3-29 18:50
Wenju Chen,Kun Guo,Yuzhong ChenSK is done for the case scenario. Performance is analyzed for free space earth model and plane earth model. Results indicate that PSK is more reliable than FSK, whereas the data transmission rate for FSK is greater than PSK. Power required to transmit the data in FSK is less than less.
作者: 曲解    時(shí)間: 2025-3-29 21:09
Wenju Chen,Kun Guo,Yuzhong Chenrmance of the proposed schemes is evaluated and compared with the reported state-of-the-art algorithm in the presence of dynamic traffic. An improvement of 7–15% is achieved using blocking probability as a performance metric.
作者: 使成整體    時(shí)間: 2025-3-30 01:20

作者: Audiometry    時(shí)間: 2025-3-30 06:56

作者: Coterminous    時(shí)間: 2025-3-30 09:31

作者: ANT    時(shí)間: 2025-3-30 12:28

作者: 異教徒    時(shí)間: 2025-3-30 20:26
Dirk T. Tempelaar,Bart Rienties,Bas Giesbersesponses such as settling, rise, peak time, undershoot, and overshoot. Thus to optimized the parameters by minimizing integral square error (ISE) of the given system is improved by the proposed method.
作者: pacific    時(shí)間: 2025-3-30 21:13

作者: 芳香一點(diǎn)    時(shí)間: 2025-3-31 02:08
Protecting Multicast Sessions Against Single-Link Failure in Survivable WDM Mesh Networks,rmance of the proposed schemes is evaluated and compared with the reported state-of-the-art algorithm in the presence of dynamic traffic. An improvement of 7–15% is achieved using blocking probability as a performance metric.
作者: 鞭打    時(shí)間: 2025-3-31 06:37

作者: 傷心    時(shí)間: 2025-3-31 11:01
Selection of Software Development Model Using TOPSIS Methodology,es the defined options after evaluating them against confliction and multiple attributes. The research proposes a decision-making framework for the selection of software development model using one of the widely accepted multicriteria decision-making tools, i.e., TOPSIS.
作者: Offstage    時(shí)間: 2025-3-31 17:15
Situation-Aware Conditional Sensing in Disaster-Prone Areas Using Unmanned Aerial Vehicles in IoT Ed algorithm is based on the situation-aware conditional sensing for disaster-prone areas using?unmanned aerial vehicles. The technique presented in this paper focuses on the control of way points of the aerial vehicles based on the events detected in the Internet of Things environment.
作者: GOUGE    時(shí)間: 2025-3-31 19:44
Challenges in Mining Big Data Streams,ck exchange, etc. to realize the application and importance of big data mining. This paper explains about the use of parallel computing in data mining security issues and how to deal with them. Furthermore, this paper also discusses challenges associated with big streaming data with concept drifts.
作者: URN    時(shí)間: 2025-3-31 23:14

作者: Acetabulum    時(shí)間: 2025-4-1 02:24





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
盈江县| 渝中区| 镇赉县| 天峨县| 大安市| 肥东县| 社会| 德昌县| 盘山县| 汝州市| 梁平县| 乐亭县| 互助| 丹阳市| 宁南县| 荥经县| 吉首市| 杭州市| 藁城市| 宣威市| 永州市| 龙海市| 天水市| 开阳县| 和硕县| 商城县| 苏尼特右旗| 锡林郭勒盟| 台江县| 十堰市| 化州市| 大宁县| 五莲县| 合作市| 乌海市| 多伦县| 磐石市| 汾西县| 平陆县| 定州市| 泸定县|