標(biāo)題: Titlebook: Information Technology - New Generations; 14th International C Shahram Latifi Conference proceedings 2018 Springer International Publishing [打印本頁] 作者: Exacting 時間: 2025-3-21 17:54
書目名稱Information Technology - New Generations影響因子(影響力)
書目名稱Information Technology - New Generations影響因子(影響力)學(xué)科排名
書目名稱Information Technology - New Generations網(wǎng)絡(luò)公開度
書目名稱Information Technology - New Generations網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Technology - New Generations被引頻次
書目名稱Information Technology - New Generations被引頻次學(xué)科排名
書目名稱Information Technology - New Generations年度引用
書目名稱Information Technology - New Generations年度引用學(xué)科排名
書目名稱Information Technology - New Generations讀者反饋
書目名稱Information Technology - New Generations讀者反饋學(xué)科排名
作者: 激怒 時間: 2025-3-21 21:06 作者: Flinch 時間: 2025-3-22 04:00
ICI Mitigation for High-Speed OFDM Communications in High-Mobility Vehicular Channelsffer from Inter-Carrier Interference (ICI) created by high Doppler shifts. In current communication systems, high Doppler shifts can happen because of the high speed of the vehicles such as fixed wings unmanned aircraft vehicles (UAVs) and high speed trains (HST). In next generation wireless systems作者: Euphonious 時間: 2025-3-22 06:21 作者: Neonatal 時間: 2025-3-22 09:17
Event-Based Anomalies in Big Datae data. Analytics require the insight behavior of the data stream. The government and business giants want to catch the exceptions to reveal the anomalies and take immediate action. To catch up the exceptions, the analysts need to identify the patterns in a single view of data stream trends, excepti作者: bile648 時間: 2025-3-22 16:40 作者: coltish 時間: 2025-3-22 18:08
Golden Linear Group Key Agreement Protocole computing, ad-hoc networks, and wireless sensor networks, researchers are considering high group dynamics in communication security. Group key agreement protocol is for providing enough security for the group communication. Group key agreement protocol is a way to establish a shared cryptographic 作者: 凹處 時間: 2025-3-22 22:27
Implementing an In-Home Sensor Agent in Conjunction with an Elderly Monitoring NetworkResearch and development of the regional/solitary elderly life support system using multi-fusion sensors” project. At Akita Prefectural University, the bed and pillow sensors and corresponding monitoring system have been developed to watch elderly individuals at bedtime, in particular those who live作者: 動機 時間: 2025-3-23 01:46
How Risk Tolerance Constrains Perceived Risk on Smartphone Users’ Risk Behaviorance, perceived, and risk awareness, the models also include several demographic and behavioral variables as controlled factors including tenure of using smartphone, average online time per day, average online time using smartphone per day, gender, age, education level, and monthly expenditure. The 作者: ENACT 時間: 2025-3-23 07:25 作者: flaunt 時間: 2025-3-23 10:18
Wireless Body Sensor Network for Monitoring and Evaluating Physical Activitytimulated the creation of actions to promote regular physical activity practices. The Brazilian Ministry of Health established a physical activity program, where people perform physical activities under the supervision of health professionals. In order to real-time monitoring individuals during thei作者: Climate 時間: 2025-3-23 17:12 作者: magnate 時間: 2025-3-23 19:39 作者: 進步 時間: 2025-3-23 23:14
Performance Analysis of Transport Protocols for Multimedia Traffic Over Mobile Wi-Max Network Under can be best adjusted to multimedia traffic over the Internet. The operations of multimedia networks require fast and high processing communication systems, because sometimes prompt delivery of information is critical. The behavior of different transport protocol can affect the quality of service. T作者: aerobic 時間: 2025-3-24 06:12 作者: 領(lǐng)先 時間: 2025-3-24 07:34
Router Security Penetration Testing in a Virtual Environmentlization provides a safe and self-contained environment for network simulation and security testing. This paper uses a virtual penetration testing environment to simulate and analyze the two phases of a typical Advanced Persistent Threat (APT): (1) . by way of reconnaissance (passive information gat作者: annexation 時間: 2025-3-24 11:50 作者: BOOST 時間: 2025-3-24 15:47
Shahram LatifiFeatures the most recent advances in information technology;.Presents early work and novel results from research laboratories around the world;.Facilitates managers making business decisions, academic作者: 為寵愛 時間: 2025-3-24 21:18
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/465649.jpg作者: 債務(wù) 時間: 2025-3-25 01:30 作者: arthroplasty 時間: 2025-3-25 03:39
Information Technology - New Generations978-3-319-54978-1Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: Lobotomy 時間: 2025-3-25 08:52
https://doi.org/10.1007/978-3-319-54978-1ITNG 2017 proceedings; ICT; Data Mining; Big Data; Network Communications; Computer Security; Computer Pri作者: obligation 時間: 2025-3-25 12:31 作者: 的’ 時間: 2025-3-25 18:54
Tehreem Qasim,Qurrat ul Ain Minhas,Alam Mujahid,Naeem Ali Bhatti,Mubashar Mushtaq,Khalid Saleem,Hasa作者: 完整 時間: 2025-3-25 23:27 作者: armistice 時間: 2025-3-26 03:07 作者: Dri727 時間: 2025-3-26 06:26
Fazlullah Khan,Faisal Rahman,Shahzad Khan,Syed Asif Kamal作者: Gorilla 時間: 2025-3-26 10:23
Performance Enhancement of OMP Algorithm for Compressed Sensing Based Sparse Channel Estimation in Otion using the same number of pilot subcarrier. The added computational complexity is studied and several methods are suggested to keep it minimal while still achieving the performance gain provided by the LMMSE-OMP including using compressive sampling matching pursuit (CoSaMP) CS algorithm for the 作者: maculated 時間: 2025-3-26 15:12
ICI Mitigation for High-Speed OFDM Communications in High-Mobility Vehicular Channelsnce in the time domain is transmitted, and both channel amplitudes and Doppler shifts are estimated in time domain. Then, the complete frequency domain channel matrix is constructed from the estimated parameters and used for ICI mitigation. In contrast to conventional methods that only estimate diag作者: 信徒 時間: 2025-3-26 17:24
Mobile Payment Protocol 3D (MPP 3D) by Using Cloud Messaginga of logarithms instead of algebra of exponents, achieves proper privacy protection for payer by involving mobile network operators and generating temporary identities, avoids repudiation attacks by utilizing digital signatures, avoids replay attacks by using random time-stamp generated numbers, and作者: 嚴(yán)重傷害 時間: 2025-3-27 00:57 作者: 賭博 時間: 2025-3-27 02:47 作者: 空氣 時間: 2025-3-27 05:32
Performance Analysis of Transport Protocols for Multimedia Traffic Over Mobile Wi-Max Network Under effect of channel fading on these protocols. Six existing protocols and their performances under Nagagami-. channel are the theme of this paper with respect to suitability for multimedia applications, and the performances of these protocols have been evaluated. This paper concludes that extra effort作者: 遭遇 時間: 2025-3-27 11:45 作者: 驚呼 時間: 2025-3-27 16:41 作者: callous 時間: 2025-3-27 20:19
Event-Based Anomalies in Big Dataons and catch up anomalies before the system collapses. In this paper, we present a system that detects the variations in the area of interest of data stream. The current research includes the classification of the data stream, detect the event type, commonly used detection methods, and interpret the detected events.作者: Mettle 時間: 2025-3-28 01:41 作者: 賞錢 時間: 2025-3-28 03:16
2194-5357 ld;.Facilitates managers making business decisions, academic.This volume presents a collection of peer-reviewed, scientific articles from the .14.th .International Conference on Information Technology – New Generations., held at the University. .of Nevada at Las Vegas on April 10–12, at Tuscany Suit作者: 男學(xué)院 時間: 2025-3-28 08:12
CyberSecurity Education and Training in a Corporate Environment in South Africa Using Gamified Treasamified treasure hunts to encourage participants to follow digital clues in order to find a physical treasure box of chocolates. By following the digital clues, participants in the treasure hunts will learn about such important security tools as Cryptography, GnuPG, SSL, HTTPS, Jasypt, Bouncy Castle, Wireshark, and common attack techniques.作者: 扔掉掐死你 時間: 2025-3-28 12:25
Router Security Penetration Testing in a Virtual Environmentironment to simulate and analyze the two phases of a typical Advanced Persistent Threat (APT): (1) . by way of reconnaissance (passive information gathering), and (2) . by initial compromise to exploit vulnerabilities found in routers linking a corporate network with the untrusted zone of the inherently unsecure World Wide Web.作者: hermetic 時間: 2025-3-28 15:54 作者: 小樣他閑聊 時間: 2025-3-28 21:36 作者: 仔細(xì)閱讀 時間: 2025-3-29 01:35 作者: paltry 時間: 2025-3-29 06:27
When Asteroids Attack the Moon: Design and Implementation of an STK-Based Satellite Communication Sih broadcasts alert to physical entities on the moon surface about the incoming of an asteroid. This paper describes the design of the communication federate, the federation object model, lessons learned and recommendations for future federate development.作者: 無底 時間: 2025-3-29 10:07
Techniques for Secure Data Transfers of secure data transfer differ, they both share the same objective namely to protect the integrity of the data. This paper provides an explanation of Steganography and AES algorithm and how they can be used together to enhance the security of data. The experiments that this paper demonstrates used the AES-256 algorithm.作者: 羊齒 時間: 2025-3-29 14:53 作者: 傳染 時間: 2025-3-29 18:16 作者: CRUDE 時間: 2025-3-29 22:45
James E. Sawyer‘ve been talking with Mark Plotnik and Bill Gale about asking you to conduct a basic course on using the lisp machine. Mark, for instance, would really like to cover basics like the flavor system, etc. , so he could start doing his own programming without a lot of trial and error, and Bill and I wou作者: Frequency-Range 時間: 2025-3-30 01:39 作者: Infusion 時間: 2025-3-30 06:41
Full Hybrid ,-Calculus, Its Bisimulation Invariance and Application to Argumentation,s can also capture some of the semantics, the general issue of finding minimal modal logics that are able to describe certain argumentation semantics has not received a lot of attention in the literature so far. In this paper we show that full hybrid .-calculus cannot describe the preferred semantic作者: Postmenopause 時間: 2025-3-30 08:23
Healthcare-Associated Gastrointestinal Infectionss, underlying illnesses, or tube feeding. Yet the acute onset of diarrhea in a hospitalized child may indicate a newly acquired gastrointestinal infection. ., norovirus, and rotavirus can cause sporadic or epidemic disease in pediatric inpatient settings. Early recognition of these enteric infection作者: 我還要背著他 時間: 2025-3-30 13:12
Comprehensive Risk Assessment dying from this disease is related to the burden of risk factors. However, ASCVD is remarkably preventable through healthy lifestyle behaviors and drug therapies if indicated. This chapter describes guideline-recommended ASCVD risk assessment, the benefits and limitations of quantitative risk scori作者: DEAF 時間: 2025-3-30 17:02
The Continuing Enigmas of Social Policynot fit unyieldingly variegated outcomes across sectors and countries. Moreover, like many other approaches, it tends to derive its analytical framing from the Keynesian period as opposed to forging an understanding of neoliberalism and the increasing role of financialization as a direct and indirec作者: 心痛 時間: 2025-3-31 00:46 作者: Facilities 時間: 2025-3-31 01:26 作者: PAGAN 時間: 2025-3-31 08:14 作者: 聯(lián)想記憶 時間: 2025-3-31 09:51
Romain Loiseau,Mathieu Aubry,Lo?c Landrieus judged by the crowd) POIs. Our method is based on intelligently combining indices for spatial data (a spatial grid) and for relevance data (a graph) during query processing. An experimental evaluation using real and synthetic data establishes that our approach efficiently solves the .-RNN problem 作者: Cabinet 時間: 2025-3-31 14:07 作者: Innocence 時間: 2025-3-31 21:08
Spatial Opinion Structures in Social Systems, them into a rather “mechanical” description [206]. From the perspective of physics, on the other hand, it is claimed that the description of social processes “evidently lies outside of the realm of physics” (to quote an unknown referee).作者: NEXUS 時間: 2025-3-31 23:34
Fostering Students’ Resilience. Analyses Towards Factors of Individual Resilience in the Computer and Information Literacy Domainws that students’ self-efficacy toward the use of . (ICT), their use of ICT for information-related activities itself and the use of ICT for basic and advanced purposes have been identified as significantly related to student resilience.作者: 緩解 時間: 2025-4-1 03:38 作者: palette 時間: 2025-4-1 07:43 作者: 土產(chǎn) 時間: 2025-4-1 13:24