標題: Titlebook: Expert Clouds and Applications; Proceedings of ICOEC I. Jeena Jacob,Selvanayaki Kolandapalayam Shanmuga Conference proceedings 2023 The Edi [打印本頁] 作者: DEIFY 時間: 2025-3-21 20:00
書目名稱Expert Clouds and Applications影響因子(影響力)
書目名稱Expert Clouds and Applications影響因子(影響力)學科排名
書目名稱Expert Clouds and Applications網(wǎng)絡公開度
書目名稱Expert Clouds and Applications網(wǎng)絡公開度學科排名
書目名稱Expert Clouds and Applications被引頻次
書目名稱Expert Clouds and Applications被引頻次學科排名
書目名稱Expert Clouds and Applications年度引用
書目名稱Expert Clouds and Applications年度引用學科排名
書目名稱Expert Clouds and Applications讀者反饋
書目名稱Expert Clouds and Applications讀者反饋學科排名
作者: 溫順 時間: 2025-3-21 23:39
U. K. Sinha,K. Tirumalesh,Hemant V. Mohokarhe destructive attacks that can potentially impair . data transfer. Therefore, a comprehensive resolution to this problem is required. To safeguard against . attacks against a network of clients and a network of providers, a special security technique is suggested.作者: 使成核 時間: 2025-3-22 04:24
Structural Damage Detection Methods,that may be used to identify who, where, and how an attack was conducted. The fields of data science and cybersecurity are combined in this study. Detecting attacks on big data and ensuring and mitigating data security using cybersecurity and digital forensics techniques are the key goals of this study.作者: 不溶解 時間: 2025-3-22 08:05
Management of Groundwater Resources,e information (CSI). At base station (BS), zero-forcing method is used to reduce interference between various clusters. All of these schemes‘ theoretical analyses and simulation performances have been confirmed using simulation data.作者: outset 時間: 2025-3-22 10:31
https://doi.org/10.1007/978-981-13-9953-4 before executing tasks on Hadoop, depending on the dataset file size, the cluster will dynamically shrink or expand. This will improve the overall performance of the system by allocating an appropriate number of slave nodes based on the size of the input file and then will proceed with MapReduce processing.作者: 王得到 時間: 2025-3-22 14:43 作者: 王得到 時間: 2025-3-22 20:39 作者: 搜尋 時間: 2025-3-22 21:30
,Big Data Security: Attack’s Detection Methods Using Digital Forensics,that may be used to identify who, where, and how an attack was conducted. The fields of data science and cybersecurity are combined in this study. Detecting attacks on big data and ensuring and mitigating data security using cybersecurity and digital forensics techniques are the key goals of this study.作者: 閑聊 時間: 2025-3-23 05:09 作者: Organization 時間: 2025-3-23 06:30 作者: cartilage 時間: 2025-3-23 13:29 作者: 友好關(guān)系 時間: 2025-3-23 15:03 作者: MAG 時間: 2025-3-23 18:10
Conference proceedings 2023wcase different research chapters dealing with the design, development, implementation, testing and analysis of intelligent systems, and expert clouds, and also to provide empirical and practical guidelines for the development of such systems..作者: notification 時間: 2025-3-24 00:35 作者: 占線 時間: 2025-3-24 05:24
https://doi.org/10.1007/978-3-031-49092-7uced by computing the hash value of the image content. The ciphertext used to verify the duplicate image copy will be produced by identical image copies in the same way. This system has undergone security analysis to ensure its safety.作者: Volatile-Oils 時間: 2025-3-24 09:20 作者: 亂砍 時間: 2025-3-24 11:45 作者: Myofibrils 時間: 2025-3-24 17:51 作者: Bravura 時間: 2025-3-24 23:02 作者: Diskectomy 時間: 2025-3-25 02:14
Sustainable Cloud Computing in the Supply Chains,raditional data centers. The paper aims to bridge the gap between supply chain practitioners and academic researchers by seeking to understand how sustainable cloud computing will help to address key supply chain opportunities and challenges.作者: 思想上升 時間: 2025-3-25 05:29
Task Scheduling in Fog Assisted Cloud Environment Using Hybrid Metaheuristic Algorithm,his paper suggested a hybrid meta-heuristic algorithm grey wolf optimization (GWO) algorithm combined with particle swarm optimization (PSO) termed hybrid PSO and GWO (HPSO_GWO) to schedule the tasks to the VMs to optimize the QoS.作者: 流動才波動 時間: 2025-3-25 09:28
https://doi.org/10.1007/978-981-99-1745-7Clouding Computing; Evolutionary Computing; Cognitive Intelligence; Cognitive Communication Networks; Ar作者: Binge-Drinking 時間: 2025-3-25 13:58
I. Jeena Jacob,Selvanayaki Kolandapalayam ShanmugaPresents recent research in the field of cloud computing.Discusses the outcomes of ICOECA 2023, held in Bangalore, India.Serves as a reference guide for researchers and practitioners in academia and i作者: Cosmopolitan 時間: 2025-3-25 18:45 作者: Irremediable 時間: 2025-3-25 21:11 作者: 撕裂皮肉 時間: 2025-3-26 03:34 作者: Enervate 時間: 2025-3-26 05:06
Processing of Vibration Records,cious activity. IDSs can use machine learning algorithms like ANNs or SVMs analyze data and identify potential threats. These systems have the ability to improve network security by alerting administrators to potential threats in real time. However, IDSs also have limitations, such as being affected作者: 即席 時間: 2025-3-26 09:38 作者: 剛開始 時間: 2025-3-26 13:34
https://doi.org/10.1007/978-3-031-49092-7ation. Clients would want to utilize end-to-end data encryption to protect data security; however, effective encryption nullifies the value of all established storage-optimization methods like data deduplication. To save cost and storage space, image deduplication in cloud computing is proposed. To 作者: GULP 時間: 2025-3-26 19:32
U. K. Sinha,K. Tirumalesh,Hemant V. Mohokare accessed from anywhere. Even though . and . have been developed independently, combining these two technologies results in a renaissance in the construction of smart environments and future networks. . is the name of the latest evolution. The major concern with . is security. Researchers from arou作者: synovial-joint 時間: 2025-3-26 23:23 作者: 礦石 時間: 2025-3-27 05:00
https://doi.org/10.1007/978-981-287-101-5 before they were allowed to become call operators. But this procedure is quite tedious and time-consuming. A person typically calls such an operator to get some kind of immediate assistance when they find themselves in an emergency. However, based on the caller’s emergency information, the operator作者: 厭煩 時間: 2025-3-27 07:34
Structural Damage Detection Methods, data and analytical processes against malicious activity. Cybercriminals are increasingly using fraudulent calls, texts, and other techniques to steal users‘ private information. Nowadays, these attacks are increasingly frequent online. In this paper, we addressed various security technologies and 作者: 弄皺 時間: 2025-3-27 10:51 作者: 大廳 時間: 2025-3-27 16:42 作者: Institution 時間: 2025-3-27 18:04 作者: DAFT 時間: 2025-3-27 22:50 作者: 性上癮 時間: 2025-3-28 05:28
Management of Groundwater Resources,se it can achieve great spectrum efficiency (SE) and energy efficiency (EE), non-orthogonal multiple access (NOMA) is envisioned as a desirable multiple access approach for 5G. This study addresses a number of resource allocation challenges in NOMA-based communication systems and enhances network pe作者: aesthetician 時間: 2025-3-28 10:11
The Main Types of Groundwater Base-Level, resource request handling can resolve the problem of increased waiting time as well as load imbalance rate during the course of running the VM resources. Load balancing techniques only helps to reschedule the VMs in the appropriate PMs based on the dynamic changes in the load. To make use of the re作者: TEM 時間: 2025-3-28 11:32 作者: floaters 時間: 2025-3-28 15:08 作者: CHAR 時間: 2025-3-28 20:28 作者: CIS 時間: 2025-3-28 23:15 作者: braggadocio 時間: 2025-3-29 06:42 作者: APO 時間: 2025-3-29 09:15
https://doi.org/10.1007/978-4-431-53959-9aditional SHA-256 algorithm, this results in a better and more efficient 256-bit hashing programming algorithm for 64-bit architectures. Furthermore, we address the security concerns associated with the Narrowband Internet of Things (NB-IoT) in food supply chain management by juxtaposing blockchain 作者: BULLY 時間: 2025-3-29 12:48
A Detailed Survey on Network Intrusion Detection in Cloud Using Different Techniques,cious activity. IDSs can use machine learning algorithms like ANNs or SVMs analyze data and identify potential threats. These systems have the ability to improve network security by alerting administrators to potential threats in real time. However, IDSs also have limitations, such as being affected作者: 使閉塞 時間: 2025-3-29 16:40
Adoption of Network Function Virtualization Technology in Education,ities like a firewall or encryption from a dedicated source or hardware and moving to virtual servers. The network function virtualization has seen keen attention and grasping from both industries and academic institutions as a transformation in telecommunications. This technology allows compactible作者: 新星 時間: 2025-3-29 23:45
An Efficient Secure Cloud Image Deduplication with Weighted Min-Hash Algorithm,ation. Clients would want to utilize end-to-end data encryption to protect data security; however, effective encryption nullifies the value of all established storage-optimization methods like data deduplication. To save cost and storage space, image deduplication in cloud computing is proposed. To 作者: 輕浮思想 時間: 2025-3-30 00:59
An Intelligence Security Architecture for Mitigating DDOS Attack in CloudIoT Environment,e accessed from anywhere. Even though . and . have been developed independently, combining these two technologies results in a renaissance in the construction of smart environments and future networks. . is the name of the latest evolution. The major concern with . is security. Researchers from arou作者: Noctambulant 時間: 2025-3-30 06:48
Automated Activity Scheduling Using Heuristic Approach,ture time, and many other factors. This paper suggests a heuristic timetable optimization method to increase lesson planning productivity. This work aims to find an optimal solution to the timetabling problem, which is one of the highly constrained N-P hard problems. The need for this sort of timeta作者: 恃強凌弱 時間: 2025-3-30 09:58
Automated Helpline Service Using a Two-Tier Ensemble Framework, before they were allowed to become call operators. But this procedure is quite tedious and time-consuming. A person typically calls such an operator to get some kind of immediate assistance when they find themselves in an emergency. However, based on the caller’s emergency information, the operator作者: abject 時間: 2025-3-30 14:52 作者: LVAD360 時間: 2025-3-30 18:14
Decentralized Expert System for Donation Tracking and Transparency,were going to the correct places or whether they were going in another direction, like funding shady campaigns or terrorist efforts. Donors thus lose confidence in these groups, which ends communication with philanthropic organizations. Because of this, it is more challenging for organizations to ge作者: 黑豹 時間: 2025-3-31 00:27
Design of Wireless Cloud-Based Transmission Intelligent Robot for Industrial Pipeline Inspection ann be maintained properly and should be inspected for leakage, cracks, and proper welding after the installation. It is hard for humans to manually inspect the pipeline for the larger distances and to work in hazardous situations which makes it a cumbersome task and especially pipelines with varying 作者: Deference 時間: 2025-3-31 03:55 作者: 易怒 時間: 2025-3-31 05:43
Leasing in IaaS Cloud Using Queuing Model,rt (BE). Resources must be provided for immediate leasing either immediately or not at all. The scheduler executes these leases in the event that resources are available, otherwise, not. Resources are assigned to the lease under the BE policy as soon as they become available. The ability to allocate作者: 夾克怕包裹 時間: 2025-3-31 10:42 作者: tinnitus 時間: 2025-3-31 16:01
Resource Request Handling Mechanisms for Effective VM Placements in Cloud Environment, resource request handling can resolve the problem of increased waiting time as well as load imbalance rate during the course of running the VM resources. Load balancing techniques only helps to reschedule the VMs in the appropriate PMs based on the dynamic changes in the load. To make use of the re作者: Brittle 時間: 2025-3-31 19:09 作者: prosperity 時間: 2025-3-31 22:12
Sustainable Cloud Computing in the Supply Chains,y, agility, and speed. The Supply chain industry is prime for cloud computing because of the large number of internal and external stakeholders, including suppliers and partners collaborate to facilitate the seamless delivery of products and services to consumers. The profitability and survival of a作者: CARE 時間: 2025-4-1 03:12 作者: Panther 時間: 2025-4-1 08:34 作者: Galactogogue 時間: 2025-4-1 13:40 作者: PACT 時間: 2025-4-1 18:20
Blockchain Security Through SHA-512 Algorithm Implementation Using Python with NB-IoT Deployment inaditional SHA-256 algorithm, this results in a better and more efficient 256-bit hashing programming algorithm for 64-bit architectures. Furthermore, we address the security concerns associated with the Narrowband Internet of Things (NB-IoT) in food supply chain management by juxtaposing blockchain