標(biāo)題: Titlebook: Emerging Research in Computing, Information, Communication and Applications; ERCICA 2015, Volume N. R. Shetty,N Hamsavath Prasad,N. Nalini [打印本頁] 作者: 減輕 時(shí)間: 2025-3-21 17:51
書目名稱Emerging Research in Computing, Information, Communication and Applications影響因子(影響力)
書目名稱Emerging Research in Computing, Information, Communication and Applications影響因子(影響力)學(xué)科排名
書目名稱Emerging Research in Computing, Information, Communication and Applications網(wǎng)絡(luò)公開度
書目名稱Emerging Research in Computing, Information, Communication and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Emerging Research in Computing, Information, Communication and Applications被引頻次
書目名稱Emerging Research in Computing, Information, Communication and Applications被引頻次學(xué)科排名
書目名稱Emerging Research in Computing, Information, Communication and Applications年度引用
書目名稱Emerging Research in Computing, Information, Communication and Applications年度引用學(xué)科排名
書目名稱Emerging Research in Computing, Information, Communication and Applications讀者反饋
書目名稱Emerging Research in Computing, Information, Communication and Applications讀者反饋學(xué)科排名
作者: Stricture 時(shí)間: 2025-3-21 21:42
Dynamic Monitoring of Website Content and Alerting Defacement Using Trusted Platform Module, embarrassment, the complexity in current systems often exposes that loopholes exist. A good information protection policy addresses protection, detection of security breach, and immediate reaction to such cyberattack. This paper proposes a software system that utilizes operating systems’ kernel fea作者: interrogate 時(shí)間: 2025-3-22 02:30
A Hybrid Approach for Improving Web Document Clustering Based on Concept Mining,stem is called a concept-based analysis mechanism (CBAM). This system can provide accurate and robust document similarity calculation as well as concept identification that lead to improved results in Web document clustering.作者: 頭腦冷靜 時(shí)間: 2025-3-22 05:18 作者: Amorous 時(shí)間: 2025-3-22 08:45 作者: 貧窮地活 時(shí)間: 2025-3-22 14:58
Neue Pr?missen in Führung und HR-Management embarrassment, the complexity in current systems often exposes that loopholes exist. A good information protection policy addresses protection, detection of security breach, and immediate reaction to such cyberattack. This paper proposes a software system that utilizes operating systems’ kernel fea作者: 貧窮地活 時(shí)間: 2025-3-22 19:27
Betonkontrolle und ihre Apparaturstem is called a concept-based analysis mechanism (CBAM). This system can provide accurate and robust document similarity calculation as well as concept identification that lead to improved results in Web document clustering.作者: 正常 時(shí)間: 2025-3-22 23:34
Romantische Suche nach dem Paradiesthod “m-ACO” for test case prioritization. m-ACO is designed as the modified form of the ant colony optimization method, which reschedules the execution sequence of test cases of regression testing by altering the phenomenon exhibited by natural ants for selecting their food source.作者: alcoholism 時(shí)間: 2025-3-23 01:22 作者: osteoclasts 時(shí)間: 2025-3-23 08:03
Emerging Research in Computing, Information, Communication and Applications978-981-10-0287-8作者: LATER 時(shí)間: 2025-3-23 22:54 作者: Foam-Cells 時(shí)間: 2025-3-24 04:16 作者: AVID 時(shí)間: 2025-3-24 07:04 作者: Substance-Abuse 時(shí)間: 2025-3-24 11:08
Conference proceedings 2016scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applic作者: Peculate 時(shí)間: 2025-3-24 18:28 作者: gait-cycle 時(shí)間: 2025-3-24 21:03 作者: inclusive 時(shí)間: 2025-3-25 01:17
Karl-Heinz Erdmann,Johanna Frommbergerthe implementation steps for QSADSR (Quality of Service Aware DSR) for the JiST/SWANS simulator and also the results of it. The results show that QSADSR works best for end-to-end delay but is not fine for throughput. However, to increase the throughput in the same environment, new techniques are mentioned here.作者: 有機(jī)體 時(shí)間: 2025-3-25 05:21
Rechtsextremismus und Neue Rechte in Europa,parison. The computational complexities of 2D DCT and 3D DCT are presented. The quality metrics of the reconstructed images are also presented. It is shown that images that are transformed using 3D DCT have quality close to that of 2D DCT transformed images and it results in higher compression ratios.作者: BROTH 時(shí)間: 2025-3-25 07:55 作者: 受傷 時(shí)間: 2025-3-25 12:18
Adaptive Exponential Trust-Based Algorithm in Wireless Sensor Network to Detect Black Hole and Gray hole nodes, also reducing power consumption. Moreover, the adaptive threshold strategy caters the low false positive rate. The simulation results prove the betterment of proposed method adaptive exponential trust-based algorithm (AETBA) over the established exponential trust-based algorithm (ETBA).作者: 斑駁 時(shí)間: 2025-3-25 18:06 作者: antipsychotic 時(shí)間: 2025-3-25 21:58 作者: grenade 時(shí)間: 2025-3-26 00:43 作者: 游行 時(shí)間: 2025-3-26 04:36 作者: Instinctive 時(shí)間: 2025-3-26 09:37
Durchhangslinie des bewegten Riemens,nt parameters. The traffic conditions used in this paper are CBR and FTP which are based on TCP and UDP agents. The instantaneous delay, throughput, and normalized routing load are common measure parameters used to carry out the performance analysis of the AODV routing protocol with and without black hole attack.作者: ambivalence 時(shí)間: 2025-3-26 16:29 作者: 拒絕 時(shí)間: 2025-3-26 19:27 作者: 起草 時(shí)間: 2025-3-26 21:09 作者: 蠟燭 時(shí)間: 2025-3-27 02:34 作者: onlooker 時(shí)間: 2025-3-27 09:08 作者: lipids 時(shí)間: 2025-3-27 10:57 作者: labyrinth 時(shí)間: 2025-3-27 15:57 作者: 沒有貧窮 時(shí)間: 2025-3-27 21:29 作者: BANAL 時(shí)間: 2025-3-27 23:26
Exact Incremental Mining for Frequent Item Set on Large Evolving Database (Correlation of Attribute In this paper we are working on market basket data and finding important data such as “frequent itemsets”. For exploring the data we use different mining and classification algorithms. We also examine standard datasets.作者: amplitude 時(shí)間: 2025-3-28 04:15
Developing QoS Aware DSR for JiST/SWANS Simulator Using Cross-Layer Communication,the implementation steps for QSADSR (Quality of Service Aware DSR) for the JiST/SWANS simulator and also the results of it. The results show that QSADSR works best for end-to-end delay but is not fine for throughput. However, to increase the throughput in the same environment, new techniques are mentioned here.作者: Fracture 時(shí)間: 2025-3-28 09:52 作者: 熱情的我 時(shí)間: 2025-3-28 13:29 作者: 沒收 時(shí)間: 2025-3-28 18:14 作者: attenuate 時(shí)間: 2025-3-28 19:17
Jutta Rump,Stefanie Brehm,Silke Eilers hole nodes, also reducing power consumption. Moreover, the adaptive threshold strategy caters the low false positive rate. The simulation results prove the betterment of proposed method adaptive exponential trust-based algorithm (AETBA) over the established exponential trust-based algorithm (ETBA).作者: FIR 時(shí)間: 2025-3-29 00:19 作者: strain 時(shí)間: 2025-3-29 03:20
N. R. Shetty,N Hamsavath Prasad,N. NaliniCovers progress in emerging areas of communications and information technology.Includes contributions from eminent Scientists and distinguished Professors from the said emerging areas.Talks about new 作者: 獎(jiǎng)牌 時(shí)間: 2025-3-29 10:56 作者: fidelity 時(shí)間: 2025-3-29 11:23 作者: debunk 時(shí)間: 2025-3-29 18:09
,Design of Handwritten Signature Verification Using Java–Python Platform,riminate genuine signatures from forgeries. Feature study, algorithm development, challenges with training a neural network, and its design solutions are presented in the paper. The proposed model uses global, statistical, and local features of the input dataset. Experimental results suggest that it is able to deliver 95?% accuracy.作者: Keshan-disease 時(shí)間: 2025-3-29 23:22
Neue Musik als spekulative Theologied data integration becomes more critical. The data contain the exponential information which is to be used as predictive data for exploring more data. In this paper we are working on market basket data and finding important data such as “frequent itemsets”. For exploring the data we use different mi作者: 盡管 時(shí)間: 2025-3-30 03:56 作者: 機(jī)警 時(shí)間: 2025-3-30 06:10 作者: Boycott 時(shí)間: 2025-3-30 10:24
Grundlagen der Organisationsgestaltung maximizing their coverage. The networked mobile agents locally form a virtual multiple-input multiple-output (MIMO) communication system, and they cooperatively communicate among them by using a decode and forward cooperative communication technique. The outage probability is used as the measure of作者: 譏諷 時(shí)間: 2025-3-30 15:56
Personalgewinnung und -auswahl, from the behaviour of natural ants. The ant colony algorithm is a propelled optimisation method which is utilised to take care of combinatorial optimisation problems. The significant features of this algorithm are the utilisation of a mixture of preinformation and postinformation for organizing gre作者: 真繁榮 時(shí)間: 2025-3-30 17:06 作者: 我說不重要 時(shí)間: 2025-3-31 00:46
https://doi.org/10.1007/978-3-662-67172-6riminate genuine signatures from forgeries. Feature study, algorithm development, challenges with training a neural network, and its design solutions are presented in the paper. The proposed model uses global, statistical, and local features of the input dataset. Experimental results suggest that it作者: TAP 時(shí)間: 2025-3-31 02:34
Neue Plattformen – neue ?ffentlichkeitenosed system introduces an algorithm for ensuring an efficient and secure group key management in the area of wireless sensor networks. The system is called multitier key distribution that not only secures group communication, but also secures the data aggregation in wireless sensor networks. Support作者: burnish 時(shí)間: 2025-3-31 06:15
Eigentumsrechte und Ressourcennutzung,e overall computational time. The method described below proposes a near lossless technique that works on the spatial domain and utilizes a few properties of pixel values to reduce significantly the bit representation size of the pixel values. This algorithm utilizes a new difference concept by divi作者: 遺棄 時(shí)間: 2025-3-31 09:27
,Markteinführungsplan (Marketingplan),o write and read by sense the raised Braille dots by using their fingers. This paper describes a novel approach for the design of a Braille writer and a translator, which converts a Braille document into an English text document along with voice feedback. The Braille writer comprises a microcontroll作者: Hypomania 時(shí)間: 2025-3-31 17:08 作者: 硬化 時(shí)間: 2025-3-31 20:03
Betonkontrolle und ihre Apparaturch as access, organizing, and analyzing the required information expeditiously. Document clustering techniques mostly rely on the statistical analysis of a term. It can be hard to identify in situations when multiple terms have the same frequency value, but one term is more important in terms of mea作者: ITCH 時(shí)間: 2025-4-1 00:57 作者: 預(yù)兆好 時(shí)間: 2025-4-1 02:35
Durchhangslinie des bewegten Riemens,attacks are more effective attacks which result in degradation of routing protocol performance. These attacks occur in the communication network and degrade performance by delaying more packets and less throughput. In this paper, the black hole attack is introduced and the performance analysis of th作者: 吞噬 時(shí)間: 2025-4-1 07:36
https://doi.org/10.1007/978-3-662-28383-7 been done, whereas cryptography is also an art of hiding, but the only disadvantage being that anyone can guess about the encryption. Hence it attracts the attention of intruders who can try hard to decrypt it. Hence in our proposed methodology we have tried to combine the two and tried to make the作者: HARD 時(shí)間: 2025-4-1 13:07 作者: 合適 時(shí)間: 2025-4-1 15:14 作者: 召集 時(shí)間: 2025-4-1 21:09
,?Gestaltung des unmittelbar Greifbaren?, cloud has become one of the major significant concerns. This paper considers current paradigms used and implements a functional encryption scheme by using a fully homomorphic algorithm. A trusted third party is used in which a software component called a trusted system is installed. This system use作者: pericardium 時(shí)間: 2025-4-2 00:30
Romantische Suche nach dem Paradiese shortest amount of time by rigorously analyzing software code, whereas debugging aims to rectify the faults or bugs. Rectification of software faults requires modification in software code by the developers to produce a new version of code. This modified code for fixing the software faults may int作者: Dictation 時(shí)間: 2025-4-2 03:31
https://doi.org/10.1007/978-981-10-0287-8Applied Computing; Communications Engineering; ERCICA 2015; Image Processing and Analysis; Information S作者: 編輯才信任 時(shí)間: 2025-4-2 08:50 作者: 使厭惡 時(shí)間: 2025-4-2 14:09