派博傳思國際中心

標題: Titlebook: Information, Communication and Computing Technology; 4th International Co Abdullah Bin Gani,Pradip Kumar Das,Deepak Chahal Conference proce [打印本頁]

作者: lumbar-puncture    時間: 2025-3-21 20:04
書目名稱Information, Communication and Computing Technology影響因子(影響力)




書目名稱Information, Communication and Computing Technology影響因子(影響力)學科排名




書目名稱Information, Communication and Computing Technology網(wǎng)絡公開度




書目名稱Information, Communication and Computing Technology網(wǎng)絡公開度學科排名




書目名稱Information, Communication and Computing Technology被引頻次




書目名稱Information, Communication and Computing Technology被引頻次學科排名




書目名稱Information, Communication and Computing Technology年度引用




書目名稱Information, Communication and Computing Technology年度引用學科排名




書目名稱Information, Communication and Computing Technology讀者反饋




書目名稱Information, Communication and Computing Technology讀者反饋學科排名





作者: 拾落穗    時間: 2025-3-21 23:20
A Risk Transfer Based DDoS Mitigation Framework for Cloud Environmentidth which can be leveraged by the Cloud during an attack. The burden of protection is partially transferred to willing third parties. Such a proactive conceptual defensive framework has been proposed in this paper.
作者: 貴族    時間: 2025-3-22 02:16

作者: Bumble    時間: 2025-3-22 04:33
Soft Modeling Approach in Predicting Surface Roughness, Temperature, Cutting Forces in Hard Turning lts of ANN were in unison to those predicted by actual experimental procedure. It was concluded that relative error in values of surface finish, temperature and cutting forces as predicted with ANN versus those achieved during experimental procedure were 1.04%, 2.889% and 1.802% respectively, which were very close to actual values.
作者: Meditate    時間: 2025-3-22 12:24

作者: Cognizance    時間: 2025-3-22 16:39

作者: Incompetent    時間: 2025-3-22 21:03
Performance Analysis of Collaborative Recommender System: A Heuristic Approachof the generated recommendations, genuine and non-genuine recommendations are investigated. Push and Nuke attacks are considered, while testing matrix model. Various metrics are used to evaluate the performance of proposed Collaborative Recommender System.
作者: 無瑕疵    時間: 2025-3-22 21:19

作者: Little    時間: 2025-3-23 03:46

作者: CHYME    時間: 2025-3-23 08:36
1865-0929 ed from 120 submissions. The papers are organized in topical sections on communication and network systems; and emerging computing technologies..978-981-15-1383-1978-981-15-1384-8Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: thrombus    時間: 2025-3-23 11:59
1865-0929 CICCT 2019, held in New Delhi, India, in May 2019..The 23 full papers? and one short paper presented in this volume were carefully reviewed and selected from 120 submissions. The papers are organized in topical sections on communication and network systems; and emerging computing technologies..978-9
作者: 袖章    時間: 2025-3-23 17:15
Building Dominating Sets to Minimize Energy Wastage in Wireless Sensor Networksenhancing these two metrics, it is very crucial to ensure minimum energy wastage in energy critical WSNs. This study constructs disjoint dominating sets to activate them in a rotation for minimizing the energy wastage in the deployed network. The proposed methodology utilizes the unique properties o
作者: Congruous    時間: 2025-3-23 19:07
Design and Implementation of Low Noise Amplifier in Neural Signal Analysisigurations used for LNA in neural applications. We compare the different topologies and conclude which one is the best topology among the ones studied on basis of certain parameters that govern the performance of a LNA for neural applications. According to our analysis, CMOS bipotential amplifier is
作者: Neolithic    時間: 2025-3-23 22:47
Apache Hadoop Based Distributed Denial of Service Detection Framework within a short duration of time by overwhelming with the huge amount of attack traffic. A sophisticated attacker closely follows the current research of DDoS defense, perform a sophisticated attack by compromising millions of unsecured devices, and send a huge amount of attack traffic (Big Data) to
作者: 運氣    時間: 2025-3-24 03:28
Quality Assessment Models for Open Source Projects Hosted on Modern Web-Based Forges: A Reviewe from very low to very high. There exist various open source software quality assessment models that aid organizations in measuring the quality of a software project and to select a particular software application based upon some quality score. Commercial involvement and usage of social networking
作者: Watemelon    時間: 2025-3-24 07:37
VaFLE: Value Flag Length Encoding for Images in a Multithreaded Environment of the frequency of occurrences of that value. This lossless technique is effective for encoding images where many consecutive pixels have similar intensity values. One of the major problems of RLE for encoding runs of bits is that the encoded runs have their lengths represented as a fixed number o
作者: 一窩小鳥    時間: 2025-3-24 12:22
Impact of Sink Location in the Routing of Wireless Sensor Networksireless networks, energy constraint is significant. To provide communication between sensor devices, many routing protocols have been proposed. In each routing protocol, their main task is to transmit data (via single hop or multi-hop) towards the sink. Hence, location of the sink has a vital impact
作者: angina-pectoris    時間: 2025-3-24 18:03

作者: 即席    時間: 2025-3-24 22:18

作者: 賠償    時間: 2025-3-24 23:42

作者: aphasia    時間: 2025-3-25 06:23
A Risk Transfer Based DDoS Mitigation Framework for Cloud Environment Infrastructure services offered by Cloud computing has been widely adopted by industries and academia alike. Protecting the core architecture of Cloud computing environment against the wake of Distributed Denial of Service attacks is necessary. Any disruptions in Cloud services reduce availability
作者: Adrenaline    時間: 2025-3-25 09:41

作者: Pander    時間: 2025-3-25 15:02

作者: Airtight    時間: 2025-3-25 16:53

作者: covert    時間: 2025-3-25 20:42
Design of Hardware Accelerator for Artificial Neural Networks Using Multi-operand Adderng paradigms, hardware architectures, and their optimization has gained momentum. ANNs use large number of parallel operations because of which their implementation on conventional computer hardware becomes inefficient. This paper presents a new design methodology for Multi-operand adders. These add
作者: 粗語    時間: 2025-3-26 00:42
Performance Analysis of Collaborative Recommender System: A Heuristic Approachder systems get degraded due to these attacks from the non-genuine users. So exploration of the performance of Recommender Systems by considering possible attacks is the main issue of discussion in this paper. Here, a collaborative filtering based Recommender system is designed and implemented. Out
作者: EPT    時間: 2025-3-26 05:49

作者: 強制性    時間: 2025-3-26 09:46
Soft Modeling Approach in Predicting Surface Roughness, Temperature, Cutting Forces in Hard Turning cult to machine steels. In this research hard turning of EN-31 steel (tool steel) 48 HRC was done with Carbon Nano Tubes based coated insert and two tools. Taguchi L27 orthogonal array was used for design of experiments. The input parameters taken in this research were cutting speed, feed, depth of
作者: 熒光    時間: 2025-3-26 15:09

作者: 博識    時間: 2025-3-26 19:29
efonen oder PDAs. Die Technologie erm?glicht dem Anwender, Audio/Video-Streaming in guter Qualit?t und oder auch das Herunterladen von Dateien mobil zu nutzen, und sorgt so für vielf?ltige neue Verbreitungsm?glichkeiten von Rundfunk- und Multimediadiensten mit hohem Datenratenbedarf. DVB-H basiert a
作者: hurricane    時間: 2025-3-26 21:12
Bharath A. Kinnal,Ujjwal Pasupulety,V. Geetharofessionellen Projektmanagements.Includes supplementary mat.Im Allgemeinen bezieht sich dieses Buch auf Video-Produktionen mit Interaktion und im Besonderen auf die Formate DVD, Blu-ray Disc und HD DVD. In diesem Zusammenhang werden die Varianten der DVD nicht als Datentr?ger, sondern als Formate v
作者: 手段    時間: 2025-3-27 03:45
Mohit Sajwan,Karan Verma,Ajay K. Sharmarofessionellen Projektmanagements.Includes supplementary mat.Im Allgemeinen bezieht sich dieses Buch auf Video-Produktionen mit Interaktion und im Besonderen auf die Formate DVD, Blu-ray Disc und HD DVD. In diesem Zusammenhang werden die Varianten der DVD nicht als Datentr?ger, sondern als Formate v
作者: 騷擾    時間: 2025-3-27 08:03
Sanjay Chaturvedi,Arun Parakh,H. K. Vermaera, volse in arabo la . di Aristotele partendo da una traduzione siriaca.. Che un logico, quale era Abū Bis?r, s’interessasse alla ., non ci deve stupire: la ., come anche la ., che la precedeva nel canone delle opere del filosofo, era compresa dalla tradizione scolastica greca (nota agli arabi) fr
作者: FLIT    時間: 2025-3-27 10:42

作者: A保存的    時間: 2025-3-27 14:03

作者: 反感    時間: 2025-3-27 20:18

作者: 壁畫    時間: 2025-3-28 00:26

作者: 間諜活動    時間: 2025-3-28 03:10
aft erheblich an Bedeutung gewonnen. Das Volumen grenzüberschreitender Wanderungen ist sogar noch schneller gewachsen als die Weltbev?lkerung, und unterschiedliche Formen internationaler Migration betreffen heute fast alle Teile der Welt unmittelbar. Wesentliche Erkl?rungsfaktoren dieser Entwicklung
作者: Aerophagia    時間: 2025-3-28 08:06

作者: 1分開    時間: 2025-3-28 13:42

作者: malapropism    時間: 2025-3-28 15:53

作者: 河流    時間: 2025-3-28 22:46

作者: Neuropeptides    時間: 2025-3-28 23:14

作者: cornucopia    時間: 2025-3-29 05:58
Information, Communication and Computing Technology978-981-15-1384-8Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: Ingredient    時間: 2025-3-29 08:00

作者: Crohns-disease    時間: 2025-3-29 15:13
Apache Hadoop Based Distributed Denial of Service Detection Frameworkfic. In this paper, we propose a victim-end Hadoop based DDoS defense framework to identify an attack using the MapReduce programming model based on information theory metric. Further, we have implemented Hadoop based DDoS testbed and validated proposed framework using real datasets, such as, MIT Li
作者: adj憂郁的    時間: 2025-3-29 17:06

作者: forager    時間: 2025-3-29 22:34

作者: 有偏見    時間: 2025-3-30 00:00
Impact of Sink Location in the Routing of Wireless Sensor Networksing algorithm (i.e. HEEMP, CAMP, GSTEB, TBC, PEGASIS, LEACH) extensively. For each routing algorithm we have evaluated the impact of sink locality. The experimental results show that the HEEMP, CAMP algorithm outperforms other existing algorithms.
作者: amygdala    時間: 2025-3-30 07:18
Development of a WSN Based Data Logger for Electrical Power System. For that, we need to develop a database to save this data and a mechanism for logging this data into the database automatically..This paper presents development of two vital building blocks needed in the making of a wireless sensor network, using open source tools and open standards. First is a wi
作者: INTER    時間: 2025-3-30 08:16
Embedded Subscriber Identity Module with Context Switchingitations such as switching between the modules, parallel activation of the modules, module cloning etc. At the end of the paper, authors have compared ten such limitations, known as features with the existing models and presented a graphical simulation of the proposed model with the proposed methodo
作者: Affiliation    時間: 2025-3-30 14:07
A Comparative Analysis of Mobility Models for Network of UAVs new mobility models. A systematic comparative analysis is done based on certain parameters like their ability to cover the area, maintenance of connectivity, collision avoidance and energy consumption. Also, the paper explores some future directions and research problems related to the FANETs.
作者: scrutiny    時間: 2025-3-30 16:40
A Noise Tolerant Auto Resonance Network for Image Recognition biological system. Use of input transformations to achieve required perturbation of the network is discussed in the paper. Results show that the network is able to learn quickly without any stability issues. The present work shows that reasonable level of image classification can be obtained using
作者: reptile    時間: 2025-3-30 20:47
Design of Hardware Accelerator for Artificial Neural Networks Using Multi-operand Adderoperand adder using this basic 4-bit 4-operand adder block is presented. Verilog simulation results are presented for both 4?×?4 and 16?×?16 adders. Design strategy used for the 16?×?16 adder may further be extended to more number of bits or operands with ease, using the guidelines discussed in the
作者: 細頸瓶    時間: 2025-3-31 04:27
Nilesh Vishwasrao Patil,C. Rama Krishna,Krishan Kumar
作者: Brittle    時間: 2025-3-31 06:43

作者: 無表情    時間: 2025-3-31 10:57

作者: STERN    時間: 2025-3-31 14:01

作者: Indigence    時間: 2025-3-31 18:14





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
永州市| 边坝县| 治县。| 车致| 灌云县| 波密县| 焦作市| 大宁县| 长治市| 乐亭县| 漠河县| 洪洞县| 琼海市| 永新县| 克拉玛依市| 秦安县| 琼海市| 肃宁县| 武强县| 临泽县| 友谊县| 大兴区| 瓮安县| 嘉鱼县| 古交市| 枝江市| 方城县| 怀安县| 天峨县| 林口县| 定边县| 磐石市| 普安县| 依安县| 梓潼县| 兴隆县| 苏尼特左旗| 梅河口市| 伊金霍洛旗| 元江| 鄂托克旗|