派博傳思國際中心

標(biāo)題: Titlebook: Information Technology - New Generations; 14th International C Shahram Latifi Conference proceedings 2018 Springer International Publishing [打印本頁]

作者: Exacting    時間: 2025-3-21 17:54
書目名稱Information Technology - New Generations影響因子(影響力)




書目名稱Information Technology - New Generations影響因子(影響力)學(xué)科排名




書目名稱Information Technology - New Generations網(wǎng)絡(luò)公開度




書目名稱Information Technology - New Generations網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Technology - New Generations被引頻次




書目名稱Information Technology - New Generations被引頻次學(xué)科排名




書目名稱Information Technology - New Generations年度引用




書目名稱Information Technology - New Generations年度引用學(xué)科排名




書目名稱Information Technology - New Generations讀者反饋




書目名稱Information Technology - New Generations讀者反饋學(xué)科排名





作者: 激怒    時間: 2025-3-21 21:06

作者: Flinch    時間: 2025-3-22 04:00
ICI Mitigation for High-Speed OFDM Communications in High-Mobility Vehicular Channelsffer from Inter-Carrier Interference (ICI) created by high Doppler shifts. In current communication systems, high Doppler shifts can happen because of the high speed of the vehicles such as fixed wings unmanned aircraft vehicles (UAVs) and high speed trains (HST). In next generation wireless systems
作者: Euphonious    時間: 2025-3-22 06:21

作者: Neonatal    時間: 2025-3-22 09:17
Event-Based Anomalies in Big Datae data. Analytics require the insight behavior of the data stream. The government and business giants want to catch the exceptions to reveal the anomalies and take immediate action. To catch up the exceptions, the analysts need to identify the patterns in a single view of data stream trends, excepti
作者: bile648    時間: 2025-3-22 16:40

作者: coltish    時間: 2025-3-22 18:08
Golden Linear Group Key Agreement Protocole computing, ad-hoc networks, and wireless sensor networks, researchers are considering high group dynamics in communication security. Group key agreement protocol is for providing enough security for the group communication. Group key agreement protocol is a way to establish a shared cryptographic
作者: 凹處    時間: 2025-3-22 22:27
Implementing an In-Home Sensor Agent in Conjunction with an Elderly Monitoring NetworkResearch and development of the regional/solitary elderly life support system using multi-fusion sensors” project. At Akita Prefectural University, the bed and pillow sensors and corresponding monitoring system have been developed to watch elderly individuals at bedtime, in particular those who live
作者: 動機    時間: 2025-3-23 01:46
How Risk Tolerance Constrains Perceived Risk on Smartphone Users’ Risk Behaviorance, perceived, and risk awareness, the models also include several demographic and behavioral variables as controlled factors including tenure of using smartphone, average online time per day, average online time using smartphone per day, gender, age, education level, and monthly expenditure. The
作者: ENACT    時間: 2025-3-23 07:25

作者: flaunt    時間: 2025-3-23 10:18
Wireless Body Sensor Network for Monitoring and Evaluating Physical Activitytimulated the creation of actions to promote regular physical activity practices. The Brazilian Ministry of Health established a physical activity program, where people perform physical activities under the supervision of health professionals. In order to real-time monitoring individuals during thei
作者: Climate    時間: 2025-3-23 17:12

作者: magnate    時間: 2025-3-23 19:39

作者: 進步    時間: 2025-3-23 23:14
Performance Analysis of Transport Protocols for Multimedia Traffic Over Mobile Wi-Max Network Under can be best adjusted to multimedia traffic over the Internet. The operations of multimedia networks require fast and high processing communication systems, because sometimes prompt delivery of information is critical. The behavior of different transport protocol can affect the quality of service. T
作者: aerobic    時間: 2025-3-24 06:12

作者: 領(lǐng)先    時間: 2025-3-24 07:34
Router Security Penetration Testing in a Virtual Environmentlization provides a safe and self-contained environment for network simulation and security testing. This paper uses a virtual penetration testing environment to simulate and analyze the two phases of a typical Advanced Persistent Threat (APT): (1) . by way of reconnaissance (passive information gat
作者: annexation    時間: 2025-3-24 11:50

作者: BOOST    時間: 2025-3-24 15:47
Shahram LatifiFeatures the most recent advances in information technology;.Presents early work and novel results from research laboratories around the world;.Facilitates managers making business decisions, academic
作者: 為寵愛    時間: 2025-3-24 21:18
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/465649.jpg
作者: 債務(wù)    時間: 2025-3-25 01:30

作者: arthroplasty    時間: 2025-3-25 03:39
Information Technology - New Generations978-3-319-54978-1Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: Lobotomy    時間: 2025-3-25 08:52
https://doi.org/10.1007/978-3-319-54978-1ITNG 2017 proceedings; ICT; Data Mining; Big Data; Network Communications; Computer Security; Computer Pri
作者: obligation    時間: 2025-3-25 12:31

作者: 的’    時間: 2025-3-25 18:54
Tehreem Qasim,Qurrat ul Ain Minhas,Alam Mujahid,Naeem Ali Bhatti,Mubashar Mushtaq,Khalid Saleem,Hasa
作者: 完整    時間: 2025-3-25 23:27

作者: armistice    時間: 2025-3-26 03:07

作者: Dri727    時間: 2025-3-26 06:26
Fazlullah Khan,Faisal Rahman,Shahzad Khan,Syed Asif Kamal
作者: Gorilla    時間: 2025-3-26 10:23
Performance Enhancement of OMP Algorithm for Compressed Sensing Based Sparse Channel Estimation in Otion using the same number of pilot subcarrier. The added computational complexity is studied and several methods are suggested to keep it minimal while still achieving the performance gain provided by the LMMSE-OMP including using compressive sampling matching pursuit (CoSaMP) CS algorithm for the
作者: maculated    時間: 2025-3-26 15:12
ICI Mitigation for High-Speed OFDM Communications in High-Mobility Vehicular Channelsnce in the time domain is transmitted, and both channel amplitudes and Doppler shifts are estimated in time domain. Then, the complete frequency domain channel matrix is constructed from the estimated parameters and used for ICI mitigation. In contrast to conventional methods that only estimate diag
作者: 信徒    時間: 2025-3-26 17:24
Mobile Payment Protocol 3D (MPP 3D) by Using Cloud Messaginga of logarithms instead of algebra of exponents, achieves proper privacy protection for payer by involving mobile network operators and generating temporary identities, avoids repudiation attacks by utilizing digital signatures, avoids replay attacks by using random time-stamp generated numbers, and
作者: 嚴(yán)重傷害    時間: 2025-3-27 00:57

作者: 賭博    時間: 2025-3-27 02:47

作者: 空氣    時間: 2025-3-27 05:32
Performance Analysis of Transport Protocols for Multimedia Traffic Over Mobile Wi-Max Network Under effect of channel fading on these protocols. Six existing protocols and their performances under Nagagami-. channel are the theme of this paper with respect to suitability for multimedia applications, and the performances of these protocols have been evaluated. This paper concludes that extra effort
作者: 遭遇    時間: 2025-3-27 11:45

作者: 驚呼    時間: 2025-3-27 16:41

作者: callous    時間: 2025-3-27 20:19
Event-Based Anomalies in Big Dataons and catch up anomalies before the system collapses. In this paper, we present a system that detects the variations in the area of interest of data stream. The current research includes the classification of the data stream, detect the event type, commonly used detection methods, and interpret the detected events.
作者: Mettle    時間: 2025-3-28 01:41

作者: 賞錢    時間: 2025-3-28 03:16
2194-5357 ld;.Facilitates managers making business decisions, academic.This volume presents a collection of peer-reviewed, scientific articles from the .14.th .International Conference on Information Technology – New Generations., held at the University. .of Nevada at Las Vegas on April 10–12, at Tuscany Suit
作者: 男學(xué)院    時間: 2025-3-28 08:12
CyberSecurity Education and Training in a Corporate Environment in South Africa Using Gamified Treasamified treasure hunts to encourage participants to follow digital clues in order to find a physical treasure box of chocolates. By following the digital clues, participants in the treasure hunts will learn about such important security tools as Cryptography, GnuPG, SSL, HTTPS, Jasypt, Bouncy Castle, Wireshark, and common attack techniques.
作者: 扔掉掐死你    時間: 2025-3-28 12:25
Router Security Penetration Testing in a Virtual Environmentironment to simulate and analyze the two phases of a typical Advanced Persistent Threat (APT): (1) . by way of reconnaissance (passive information gathering), and (2) . by initial compromise to exploit vulnerabilities found in routers linking a corporate network with the untrusted zone of the inherently unsecure World Wide Web.
作者: hermetic    時間: 2025-3-28 15:54

作者: 小樣他閑聊    時間: 2025-3-28 21:36

作者: 仔細(xì)閱讀    時間: 2025-3-29 01:35

作者: paltry    時間: 2025-3-29 06:27
When Asteroids Attack the Moon: Design and Implementation of an STK-Based Satellite Communication Sih broadcasts alert to physical entities on the moon surface about the incoming of an asteroid. This paper describes the design of the communication federate, the federation object model, lessons learned and recommendations for future federate development.
作者: 無底    時間: 2025-3-29 10:07
Techniques for Secure Data Transfers of secure data transfer differ, they both share the same objective namely to protect the integrity of the data. This paper provides an explanation of Steganography and AES algorithm and how they can be used together to enhance the security of data. The experiments that this paper demonstrates used the AES-256 algorithm.
作者: 羊齒    時間: 2025-3-29 14:53

作者: 傳染    時間: 2025-3-29 18:16

作者: CRUDE    時間: 2025-3-29 22:45
James E. Sawyer‘ve been talking with Mark Plotnik and Bill Gale about asking you to conduct a basic course on using the lisp machine. Mark, for instance, would really like to cover basics like the flavor system, etc. , so he could start doing his own programming without a lot of trial and error, and Bill and I wou
作者: Frequency-Range    時間: 2025-3-30 01:39

作者: Infusion    時間: 2025-3-30 06:41
Full Hybrid ,-Calculus, Its Bisimulation Invariance and Application to Argumentation,s can also capture some of the semantics, the general issue of finding minimal modal logics that are able to describe certain argumentation semantics has not received a lot of attention in the literature so far. In this paper we show that full hybrid .-calculus cannot describe the preferred semantic
作者: Postmenopause    時間: 2025-3-30 08:23
Healthcare-Associated Gastrointestinal Infectionss, underlying illnesses, or tube feeding. Yet the acute onset of diarrhea in a hospitalized child may indicate a newly acquired gastrointestinal infection. ., norovirus, and rotavirus can cause sporadic or epidemic disease in pediatric inpatient settings. Early recognition of these enteric infection
作者: 我還要背著他    時間: 2025-3-30 13:12
Comprehensive Risk Assessment dying from this disease is related to the burden of risk factors. However, ASCVD is remarkably preventable through healthy lifestyle behaviors and drug therapies if indicated. This chapter describes guideline-recommended ASCVD risk assessment, the benefits and limitations of quantitative risk scori
作者: DEAF    時間: 2025-3-30 17:02
The Continuing Enigmas of Social Policynot fit unyieldingly variegated outcomes across sectors and countries. Moreover, like many other approaches, it tends to derive its analytical framing from the Keynesian period as opposed to forging an understanding of neoliberalism and the increasing role of financialization as a direct and indirec
作者: 心痛    時間: 2025-3-31 00:46

作者: Facilities    時間: 2025-3-31 01:26

作者: PAGAN    時間: 2025-3-31 08:14

作者: 聯(lián)想記憶    時間: 2025-3-31 09:51
Romain Loiseau,Mathieu Aubry,Lo?c Landrieus judged by the crowd) POIs. Our method is based on intelligently combining indices for spatial data (a spatial grid) and for relevance data (a graph) during query processing. An experimental evaluation using real and synthetic data establishes that our approach efficiently solves the .-RNN problem
作者: Cabinet    時間: 2025-3-31 14:07

作者: Innocence    時間: 2025-3-31 21:08
Spatial Opinion Structures in Social Systems, them into a rather “mechanical” description [206]. From the perspective of physics, on the other hand, it is claimed that the description of social processes “evidently lies outside of the realm of physics” (to quote an unknown referee).
作者: NEXUS    時間: 2025-3-31 23:34
Fostering Students’ Resilience. Analyses Towards Factors of Individual Resilience in the Computer and Information Literacy Domainws that students’ self-efficacy toward the use of . (ICT), their use of ICT for information-related activities itself and the use of ICT for basic and advanced purposes have been identified as significantly related to student resilience.
作者: 緩解    時間: 2025-4-1 03:38

作者: palette    時間: 2025-4-1 07:43

作者: 土產(chǎn)    時間: 2025-4-1 13:24





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
汉沽区| 广平县| 德惠市| 西贡区| 五家渠市| 开江县| 永平县| 奇台县| 宝应县| 禹城市| 上高县| 淄博市| 庄河市| 洛川县| 沙坪坝区| 钟祥市| 奉化市| 洪洞县| 宜良县| 临颍县| 侯马市| 伊吾县| 崇阳县| 昔阳县| 奇台县| 瑞金市| 毕节市| 涿鹿县| 潼南县| 高要市| 页游| 南昌县| 马龙县| 西畴县| 河源市| 广水市| 婺源县| 嫩江县| 贺州市| 那坡县| 磴口县|