標(biāo)題: Titlebook: Emerging Technologies in Computing; First International Mahdi H. Miraz,Peter Excell,Maaruf Ali Conference proceedings 2018 ICST Institute [打印本頁(yè)] 作者: fallacy 時(shí)間: 2025-3-21 19:24
書目名稱Emerging Technologies in Computing影響因子(影響力)
書目名稱Emerging Technologies in Computing影響因子(影響力)學(xué)科排名
書目名稱Emerging Technologies in Computing網(wǎng)絡(luò)公開度
書目名稱Emerging Technologies in Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Emerging Technologies in Computing被引頻次
書目名稱Emerging Technologies in Computing被引頻次學(xué)科排名
書目名稱Emerging Technologies in Computing年度引用
書目名稱Emerging Technologies in Computing年度引用學(xué)科排名
書目名稱Emerging Technologies in Computing讀者反饋
書目名稱Emerging Technologies in Computing讀者反饋學(xué)科排名
作者: NAV 時(shí)間: 2025-3-21 23:30
Risks in Adopting Cloud Computing: A Proposed Conceptual Frameworkere are risks associated with it which hamper its adoption. Therefore, it is important in this research identify the risks which negatively affect cloud computing adoption decision in order to accelerate its adoption. The research has reviewed relevant literature and accordingly selected fifty resea作者: dainty 時(shí)間: 2025-3-22 00:53 作者: inferno 時(shí)間: 2025-3-22 05:33
Challenges of Internet of Things and Big Data Integrationnt to restrain the physical world. Big Data convergence has put multifarious new opportunities ahead of business ventures to get into a new market or enhance their operations in the current market. considering the existing techniques and technologies, it is probably safe to say that the best solutio作者: GOUGE 時(shí)間: 2025-3-22 12:39 作者: 青春期 時(shí)間: 2025-3-22 15:32
An Analysis of a Methodology that Transforms the Entity-Relationship Model into a Conceptual Model fta whose natural structure is a graph. However, nowadays there do not exist conceptual models widely accepted to represent a GDB. This fact implies that the analysts are guided considering their experience and best practices. There have been proposed different conceptual models for GDB; in this pape作者: 青春期 時(shí)間: 2025-3-22 18:26 作者: RAFF 時(shí)間: 2025-3-23 01:01
Automatic and Secure Wi-Fi Connection Mechanisms for IoT End-Devices and GatewaysHow to automatically and securely connect the tremendous number of IoT end devices to Internet is one of critical problems to be addressed. This paper proposes secure and automatic Wi-Fi (Wireless Fidelity) connection mechanisms for connecting IoT end devices and IoT gateways. Our design has the fol作者: Glycogen 時(shí)間: 2025-3-23 01:43 作者: HACK 時(shí)間: 2025-3-23 06:17 作者: Anthropoid 時(shí)間: 2025-3-23 10:07 作者: CYN 時(shí)間: 2025-3-23 16:16 作者: Germinate 時(shí)間: 2025-3-23 21:41
On the Equivalence Between Eigen and Channel Inversion Based Precodersecoding methods using closed form solutions is investigated. The first one is the regularized zero forcing (RZF) algorithm and the second one is signal to leakage and noise ratio (SLNR). Three studies are presented: (1) comparison between the regularized and non-regularized versions; (2) finding a g作者: 規(guī)范就好 時(shí)間: 2025-3-23 23:38 作者: A精確的 時(shí)間: 2025-3-24 03:18 作者: Coma704 時(shí)間: 2025-3-24 07:30 作者: Comedienne 時(shí)間: 2025-3-24 11:24
Conference proceedings 2018ld in London, UK, in August 2018. The 26 revised full papers were reviewed and selected from more than 59 submissions and are organized in topical sections covering Cloud, IoT and distributed computing, software engineering, communications engineering and vehicular technology, AI, expert systems and作者: Clumsy 時(shí)間: 2025-3-24 16:15 作者: 虛弱的神經(jīng) 時(shí)間: 2025-3-24 22:41
The Concept and Technicalities of NFTs,r, we analyze a methodology that generates a conceptual model for a GDB from the entity-relationship (E-R) model. We explore several limitations of this methodology and offer some ideas for solving them.作者: decode 時(shí)間: 2025-3-25 01:11 作者: 試驗(yàn) 時(shí)間: 2025-3-25 04:01 作者: 珠寶 時(shí)間: 2025-3-25 11:15
https://doi.org/10.1007/978-981-16-3694-3itioning Systems (GPS) satellites. The paper also suggest the use of adaptive software-based receiver model or modified hardware receivers to mitigate the effects of amplitude and phase fluctuations due to irregular ionosphere.作者: 移動(dòng) 時(shí)間: 2025-3-25 12:55 作者: FOLLY 時(shí)間: 2025-3-25 18:46 作者: Hearten 時(shí)間: 2025-3-25 23:58 作者: 猛烈責(zé)罵 時(shí)間: 2025-3-26 03:33
Model-Based Metrics to Estimate Maintainabilitymeasures to identify critical transitions. The experimental study shows that the metrics is highly effective in spotting transitions that can cause severe propagation of a change when they are being changed, as well as transitions that are highly sensitive to changes applied to an EFSM model.作者: pellagra 時(shí)間: 2025-3-26 04:40
The Effects of Ionospheric Irregularities on the Navigational Receivers and Its Mitigationitioning Systems (GPS) satellites. The paper also suggest the use of adaptive software-based receiver model or modified hardware receivers to mitigate the effects of amplitude and phase fluctuations due to irregular ionosphere.作者: 單獨(dú) 時(shí)間: 2025-3-26 10:09 作者: Little 時(shí)間: 2025-3-26 13:05 作者: GULLY 時(shí)間: 2025-3-26 16:51
Survey on Fuzzy Logic Enabled Cognitive Radiose domain of spectrum sensing, power control, resource management for cognitive radio applications. The survey presents the key applications as well as the benefits offered by this technology in comparison to the hard decision making logic i.e.1 and 0 for future wireless communications.作者: 下船 時(shí)間: 2025-3-26 21:01
An Analysis of a Methodology that Transforms the Entity-Relationship Model into a Conceptual Model fr, we analyze a methodology that generates a conceptual model for a GDB from the entity-relationship (E-R) model. We explore several limitations of this methodology and offer some ideas for solving them.作者: FUME 時(shí)間: 2025-3-27 02:08 作者: 小教堂 時(shí)間: 2025-3-27 06:01
1867-8211 ystems and big data analytics, Web information systems and applications, security, database system, economics and business engineering, mLearning and eLearning..?.978-3-319-95449-3978-3-319-95450-9Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: Heresy 時(shí)間: 2025-3-27 12:38 作者: 抑制 時(shí)間: 2025-3-27 17:00
The Dark Side of Strategic Alliances,t factors and the ranking criteria for each factor has been considered to rank them using entropy analysis of Shannon Furthermore, a framework has been proposed to rank them based on the weights attained by the requirements and the ranking criteria.作者: Cougar 時(shí)間: 2025-3-27 21:21
https://doi.org/10.1007/978-1-349-85982-5ems, proof-of-location and healthcare. Recent research articles and projects/applications were surveyed to assess the implementation of the BC for IoT Security and identify associated challenges and propose solutions for BC enabled enhanced security for the IoT ecosystem.作者: Temporal-Lobe 時(shí)間: 2025-3-27 22:54 作者: Overstate 時(shí)間: 2025-3-28 03:22
Ravi Agarwal,Snezhana Hristova,Donal O’Reganuffer from flaws such as the tendency for nanoparticle agglomerations to form due to strong covalent bonds, and other uncertainties in nanoparticle behaviour. This experimental study demonstrates that microwave processing of CNT composites can reduce the power consumption and the temperature generated during the manufacturing process.作者: COLIC 時(shí)間: 2025-3-28 06:47 作者: intrigue 時(shí)間: 2025-3-28 12:39 作者: SMART 時(shí)間: 2025-3-28 17:26
Analysis of Illumination Lamp’s Performance by Retrofit at University Buildingt considerable quantities of energy will be saved by using an energy efficient illumination system as well as cost and to some extent reduces emission. The evaluation result illustrates that with present technology, FL’s and LED lamp are used for utility as well as for university building.作者: conifer 時(shí)間: 2025-3-28 22:24 作者: 防御 時(shí)間: 2025-3-29 02:21
978-3-319-95449-3ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018作者: 藥物 時(shí)間: 2025-3-29 04:22
Emerging Technologies in Computing978-3-319-95450-9Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 語(yǔ)源學(xué) 時(shí)間: 2025-3-29 08:34
The Dark Side of Strategic Alliances,is stimulating at a more prominent pace in the recent years. Various studies have been conducted in the field to meet the client’s requirements and raise the quality of services offered. Based on the client’s requests and integrating it with load balancing as one of the challenges of cloud computing作者: 和平 時(shí)間: 2025-3-29 13:32
ere are risks associated with it which hamper its adoption. Therefore, it is important in this research identify the risks which negatively affect cloud computing adoption decision in order to accelerate its adoption. The research has reviewed relevant literature and accordingly selected fifty resea作者: Coordinate 時(shí)間: 2025-3-29 18:19
https://doi.org/10.1007/978-1-349-85982-5e Internet of Things (IoT) ecosystem. Fervent research is currently being focused in both academia and industry in this domain. Proof-of-Work (PoW), a cryptographic puzzle, plays a vital r?le in ensuring BC security by maintaining a digital ledger of transactions, which are considered to be incorrup作者: 伙伴 時(shí)間: 2025-3-29 21:28 作者: anatomical 時(shí)間: 2025-3-30 01:19
Relativistic Boltzmann Equationanging technologies and user requirements. In this paper we provide model-based metrics to estimate the maintainability of state-based systems. The purpose of the metrics is to provide a tool that can be used by the system maintenance team to identify critical artifacts of the underlying system and 作者: Eructation 時(shí)間: 2025-3-30 05:44
The Concept and Technicalities of NFTs,ta whose natural structure is a graph. However, nowadays there do not exist conceptual models widely accepted to represent a GDB. This fact implies that the analysts are guided considering their experience and best practices. There have been proposed different conceptual models for GDB; in this pape作者: 嫻熟 時(shí)間: 2025-3-30 11:40
https://doi.org/10.1007/978-981-16-3694-3n-density fluctuations in the ionosphere which can cause amplitude and phase perturbations at the receiver resulting in loss of phase lock at the carrier tracking loop due to cycle slip and hence unavailability of the navigation services. This paper studies the effects of amplitude and phase fluctua作者: Juvenile 時(shí)間: 2025-3-30 16:17 作者: phase-2-enzyme 時(shí)間: 2025-3-30 19:05
https://doi.org/10.1007/978-981-97-5469-4ecurity key generation algorithm that often mixed mode WPA- WPA2 or WPA2 are utilized - as they are considered a more secure way to obtain wireless security generated keys to date. This paper reports on a practical investigation to test the weaknesses of wireless network security keys, recommend mor作者: arthrodesis 時(shí)間: 2025-3-30 23:38
NGOs: The Emerging Third Sector?,tness, reliability and easy operation. They are inserted in the most diverse processes as the main electromotive force. Measuring speed directly on the motor shaft is no trivial task, because it requires time and additional cost due to adaptations of speed transducers to the axis, which causes costl作者: Mystic 時(shí)間: 2025-3-31 01:28