派博傳思國際中心

標(biāo)題: Titlebook: Emerging Research in Computing, Information, Communication and Applications; ERCICA 2015, Volume N. R. Shetty,N.H. Prasad,N. Nalini Confer [打印本頁]

作者: choleric    時(shí)間: 2025-3-21 19:13
書目名稱Emerging Research in Computing, Information, Communication and Applications影響因子(影響力)




書目名稱Emerging Research in Computing, Information, Communication and Applications影響因子(影響力)學(xué)科排名




書目名稱Emerging Research in Computing, Information, Communication and Applications網(wǎng)絡(luò)公開度




書目名稱Emerging Research in Computing, Information, Communication and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Emerging Research in Computing, Information, Communication and Applications被引頻次




書目名稱Emerging Research in Computing, Information, Communication and Applications被引頻次學(xué)科排名




書目名稱Emerging Research in Computing, Information, Communication and Applications年度引用




書目名稱Emerging Research in Computing, Information, Communication and Applications年度引用學(xué)科排名




書目名稱Emerging Research in Computing, Information, Communication and Applications讀者反饋




書目名稱Emerging Research in Computing, Information, Communication and Applications讀者反饋學(xué)科排名





作者: 膽大    時(shí)間: 2025-3-21 21:53
Psychische Gesundheit und Stressmanagementsses a unique characteristics and it leads to consequential challenges to security design. Comparing to other wireless networks WSN has more security problem; this may be due to its nature of broadcasting messages, resources and their environment. One of the traditional and main attacks of WSNs is Black Hole Attack.
作者: Fibrin    時(shí)間: 2025-3-22 04:22
Design of Five Port Structure and Evaluation of Its Performance at 5.8 Ghz for SDR Application,sign termination considered as 50 ohm and the microstip based methodology is followed. The performance analysis of the design is carried out with s-parameter simulation and the corresponding return loss and mismatch loss are obtained. The results obtained are in greater coherence with the theoretical observations.
作者: ureter    時(shí)間: 2025-3-22 05:14
Analysis of Black Hole Attack in Ad Hoc Network Using AODV and AOMDV Protocols,sses a unique characteristics and it leads to consequential challenges to security design. Comparing to other wireless networks WSN has more security problem; this may be due to its nature of broadcasting messages, resources and their environment. One of the traditional and main attacks of WSNs is Black Hole Attack.
作者: VICT    時(shí)間: 2025-3-22 12:22
N. R. Shetty,N.H. Prasad,N. NaliniCovers progress in emerging areas of communications and information technology.Includes contributions from eminent Scientists and distinguished Professors from the said emerging areas.Talks about new
作者: ICLE    時(shí)間: 2025-3-22 16:21
http://image.papertrans.cn/e/image/308357.jpg
作者: ICLE    時(shí)間: 2025-3-22 18:52
https://doi.org/10.1007/978-81-322-2553-9Applied Computing; Communications Engineering; ERCICA 2015; Image Processing and Analysis; Information S
作者: antecedence    時(shí)間: 2025-3-22 23:53

作者: Collected    時(shí)間: 2025-3-23 05:07
https://doi.org/10.1007/978-3-0348-4135-1ers on the web through some security mechanisms. But now-a-days security is a big issue because of various types of database attacks. SQL injection is one type of such an attacks that inoculate a destructive SQL code to misuse database of an application. In this paper, we did experimental analysis o
作者: intuition    時(shí)間: 2025-3-23 07:17
https://doi.org/10.1007/978-3-0348-4133-7in the progress of industry. Social Media act as a source between the company and the customers. People being at their work place can get to know the current status, discussions done by people on any trends and even he/she can express their opinions and views as per their interests through blogs, fo
作者: GEAR    時(shí)間: 2025-3-23 13:02

作者: 我吃花盤旋    時(shí)間: 2025-3-23 16:32

作者: abstemious    時(shí)間: 2025-3-23 21:11
Dilemmata und Herausforderungention is to teach socio-scientific issues (SSI), topics that inure students towards social conscience and critical thinking. This work uses multiple markers and virtual buttons that interact with each other, creating a life-like visual spectacle. Learning about issues such as global warming by using
作者: Madrigal    時(shí)間: 2025-3-23 22:23

作者: 縫紉    時(shí)間: 2025-3-24 04:13

作者: 有權(quán)    時(shí)間: 2025-3-24 08:39
Psychische Gesundheit und Stressmanagementsses a unique characteristics and it leads to consequential challenges to security design. Comparing to other wireless networks WSN has more security problem; this may be due to its nature of broadcasting messages, resources and their environment. One of the traditional and main attacks of WSNs is B
作者: insular    時(shí)間: 2025-3-24 11:34

作者: 失敗主義者    時(shí)間: 2025-3-24 16:03
Christina Vaih-Baur,Dominik Pietzckersessment and forecasting of data. For illustration, this paper is focused alight on four machine learning techniques that are Weka, Tanagra, R software and MATLAB for showing different views to analyze and forecast the data. Weka is the most effective machine learning technique for regression and cl
作者: 領(lǐng)袖氣質(zhì)    時(shí)間: 2025-3-24 20:55
Wie Sie neue Key Accounts gewinnen,utinized for achieving a highly proficient system for satellite communication covering a distance of 10,000?km. This work further investigates the performance of IS-OWC link using a combination of loop control and Erbium doped fibre amplifiers. Besides this, an improved system for high data rate and
作者: Intervention    時(shí)間: 2025-3-25 00:48
H. E. M??mer,M. Schedlbauer,W. A. Günthnerions of VOIP users and increase QoS (Quality of Service) VOIP installations employs large number of SIP Proxy servers to route calls. To achieve high throughput and minimum response times usually a load balancer is used to dispatch calls to SIP proxy servers. Overload control in SIP is a well known
作者: CROW    時(shí)間: 2025-3-25 04:32
H. Korb,A. Borowski,E. R. de Vivieing. One of the major drawbacks of traditional algorithms is that they work only for items with single frequency per transaction. Proposed algorithm works with multiple frequency of an item per transaction. Proposed algorithm scans base database only once. The proposed algorithm took lesser time to
作者: LOPE    時(shí)間: 2025-3-25 08:13

作者: 錢財(cái)    時(shí)間: 2025-3-25 13:47

作者: FLIT    時(shí)間: 2025-3-25 16:15

作者: 混亂生活    時(shí)間: 2025-3-26 00:03

作者: Guileless    時(shí)間: 2025-3-26 01:20

作者: 大包裹    時(shí)間: 2025-3-26 06:21
Discovery of Multi-frequent Patterns Using Directed Graph,find candidate itemsets. It uses directed graph for candidate itemsets generation. We conducted experiments on two datasets, Mushroom and Chess. Experimental results showed that proposed algorithm can quickly discover maximal frequent itemsets and effectively mine potential association rules.
作者: abnegate    時(shí)間: 2025-3-26 10:36

作者: 誘惑    時(shí)間: 2025-3-26 15:29
Conference proceedings 2016 scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Appli
作者: 騷擾    時(shí)間: 2025-3-26 18:40
Prevention Guidelines of SQL Injection Database Attacks: An Experimental Analysis, one type of such an attacks that inoculate a destructive SQL code to misuse database of an application. In this paper, we did experimental analysis on web-database applications as well as purely database applications and presented prevention guidelines of SQL injection attacks.
作者: 思考而得    時(shí)間: 2025-3-26 23:42
Simulative Analysis of DWDM Systems Using Loop Control in Inter Satellite Optical Wireless Communicformance of IS-OWC link using a combination of loop control and Erbium doped fibre amplifiers. Besides this, an improved system for high data rate and long distance transmission using the Optisystem Software has also been modelled and analyzed.
作者: 配置    時(shí)間: 2025-3-27 02:49
Efficient Identification of Users and User Sessions from Web Log Repository Using Dimensionality Reo as Web Usage Mining. Web Usage Mining consists of three phases—Web Log Preprocessing, Knowledge Discovery and Pattern Analysis. In this paper, an efficient implementation for Web Log Pre-processing using Dimensionality Reduction Techniques and Combined Methodologies is presented.
作者: Antarctic    時(shí)間: 2025-3-27 09:12

作者: Lobotomy    時(shí)間: 2025-3-27 11:35

作者: 兇兆    時(shí)間: 2025-3-27 16:41
Neue Wege der Wissenschaftsphilosophies of air. The model designed can be used as Refractive Index based sensor. In this simulation velocity is kept constant throughout the microfluidic channel. The pressure at the inlet is higher compared to the outlet.
作者: ARENA    時(shí)間: 2025-3-27 17:50
H. Korb,A. Borowski,E. R. de Viviefind candidate itemsets. It uses directed graph for candidate itemsets generation. We conducted experiments on two datasets, Mushroom and Chess. Experimental results showed that proposed algorithm can quickly discover maximal frequent itemsets and effectively mine potential association rules.
作者: 消瘦    時(shí)間: 2025-3-27 23:48
hed Professors from the said emerging areas.Talks about new .This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and tech
作者: 沙漠    時(shí)間: 2025-3-28 03:06

作者: sparse    時(shí)間: 2025-3-28 09:10
Wie Sie neue Key Accounts gewinnen,formance of IS-OWC link using a combination of loop control and Erbium doped fibre amplifiers. Besides this, an improved system for high data rate and long distance transmission using the Optisystem Software has also been modelled and analyzed.
作者: vector    時(shí)間: 2025-3-28 11:49
Neue Wege in der Integrationstheorieo as Web Usage Mining. Web Usage Mining consists of three phases—Web Log Preprocessing, Knowledge Discovery and Pattern Analysis. In this paper, an efficient implementation for Web Log Pre-processing using Dimensionality Reduction Techniques and Combined Methodologies is presented.
作者: Lice692    時(shí)間: 2025-3-28 14:36

作者: Coma704    時(shí)間: 2025-3-28 20:01

作者: 四溢    時(shí)間: 2025-3-29 01:44
Horst-Udo Niedenhoff,Peter Orthfe cycle?of?a new software enterprise?where the?entrepreneur?moves from the planning stage to secured financial stage, laying down the basic?business structure, and initiates the operations ensuring the increment in confidence level of the player.
作者: photopsia    時(shí)間: 2025-3-29 04:15

作者: ARBOR    時(shí)間: 2025-3-29 08:02
An Approach to Overcome Startup Issues Using Serious Game,fe cycle?of?a new software enterprise?where the?entrepreneur?moves from the planning stage to secured financial stage, laying down the basic?business structure, and initiates the operations ensuring the increment in confidence level of the player.
作者: abreast    時(shí)間: 2025-3-29 11:37
https://doi.org/10.1007/978-3-662-25270-3 geo coordinates provided by Microsoft Bing. Then, clustering of this normalized data set is done according to job title, company names and geographic locations using Greedy, Hierarchical and K-Means clustering algorithms and clusters are visualized to have a better insight into them.
作者: 有毒    時(shí)間: 2025-3-29 16:09
Neue Wege der Energieversorgunge for early convergence of the result. The simulation results show that the MSSGA has improved spectral efficiency and reduced code blocking probability to result in high efficiency of code usage and to increase the capacity of the system.
作者: 演繹    時(shí)間: 2025-3-29 23:37

作者: 貪婪地吃    時(shí)間: 2025-3-30 03:24

作者: 配置    時(shí)間: 2025-3-30 05:21

作者: 腐蝕    時(shí)間: 2025-3-30 10:46
Optimization of Code Blocking in W-CDMA Based on Modified Solid State Genetic Algorithm (MSSGA),e for early convergence of the result. The simulation results show that the MSSGA has improved spectral efficiency and reduced code blocking probability to result in high efficiency of code usage and to increase the capacity of the system.
作者: Orchiectomy    時(shí)間: 2025-3-30 15:02
Game Based Learning to Reduce Carbon Foot Print, game the player needs to reduce their carbon footprint in an office building. Unlike in a traditional classroom where the student is only a receiver of knowledge, in this serious game the student has a more direct experience of the subject, eliciting good decision making and improving subject comprehension.
作者: cardiopulmonary    時(shí)間: 2025-3-30 18:26

作者: Heretical    時(shí)間: 2025-3-30 21:45

作者: 羊欄    時(shí)間: 2025-3-31 02:31

作者: flex336    時(shí)間: 2025-3-31 05:32
,Automated Data Analytics in Measuring Brand Sentiment Using Ml Technique from Online Conversations—in the progress of industry. Social Media act as a source between the company and the customers. People being at their work place can get to know the current status, discussions done by people on any trends and even he/she can express their opinions and views as per their interests through blogs, fo
作者: staging    時(shí)間: 2025-3-31 11:59

作者: 緩解    時(shí)間: 2025-3-31 16:33

作者: eardrum    時(shí)間: 2025-3-31 18:55

作者: Scintillations    時(shí)間: 2025-3-31 22:51

作者: 抗體    時(shí)間: 2025-4-1 05:40

作者: champaign    時(shí)間: 2025-4-1 08:07
Analysis of Black Hole Attack in Ad Hoc Network Using AODV and AOMDV Protocols,sses a unique characteristics and it leads to consequential challenges to security design. Comparing to other wireless networks WSN has more security problem; this may be due to its nature of broadcasting messages, resources and their environment. One of the traditional and main attacks of WSNs is B




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
涿鹿县| 平和县| 孝义市| 休宁县| 陆河县| 永修县| 乌拉特中旗| 包头市| 林周县| 绵阳市| 青岛市| 察哈| 卓尼县| 九江市| 特克斯县| 明光市| 光山县| 湖口县| 南昌市| 南溪县| 彝良县| 安塞县| 吉林市| 西乌珠穆沁旗| 浮梁县| 通州市| 芜湖市| 霍林郭勒市| 林州市| 宁乡县| 建阳市| 临夏县| 日土县| 万载县| 台州市| 和平区| 武宣县| 盐城市| 正定县| 荥经县| 满洲里市|