作者: 規(guī)章 時間: 2025-3-21 23:12 作者: Hyperopia 時間: 2025-3-22 01:36 作者: 格子架 時間: 2025-3-22 08:03
Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahount. The paper discusses on how recommendation system using collaborative filtering is possible using Mahout environment. The performance of the approach has been presented using Speedup and efficiency.作者: 軍械庫 時間: 2025-3-22 12:38
Extending Lifetime of Wireless Sensor Network Using Cellular Automata,aneously. This causes reduction in the global energy of the network and step-up in the lifetime of the mesh. Thus, the principal aim of the topology control algorithms is to cut the initial topology of wireless sensor network by avoiding noise and hold out the life of the mesh.作者: 昏迷狀態(tài) 時間: 2025-3-22 13:56 作者: Nutrient 時間: 2025-3-22 17:38 作者: nuclear-tests 時間: 2025-3-23 00:00 作者: 本土 時間: 2025-3-23 04:01
Location-Based Mutual and Mobile Information Navigation System: Lemmings, stands for Location-based Mutual and Mobile Information Navigation System; it is based on a classical video game where a group of creatures have to work and win through the puzzle game together. The design presented is modular and it comprised of the logics, the data flows, and the database schema.作者: 整頓 時間: 2025-3-23 08:32 作者: Amplify 時間: 2025-3-23 12:53
A Heuristic for Link Prediction in Online Social Network,because they are willing to get help in identifying potential collaborators. Thus our focus will also on “.” and we would also like to have a quantitative analysis of the performance of the different existing methods and to study some domain specific heuristics that would improve the degree of prediction.作者: 漂亮 時間: 2025-3-23 16:25 作者: OFF 時間: 2025-3-23 19:13
Localization in Wireless Sensor Networks with Ranging Error,ce nodes according to RSS and geometry of reference nodes. We compare our simulation results with, localization with dynamic circle expanding mechanism (LoDCE), which clearly show that our method outperforms it.作者: Platelet 時間: 2025-3-24 01:05
Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust aptable to dynamic network topology. The new routing protocol is evaluated using Network Simulator 2 (NS2). Through extensive simulations, it has been proved that EESDSR protocol performs better than the standard DSR protocol.作者: Digitalis 時間: 2025-3-24 06:20
Neural Network Based Early Warning System for an Emerging Blackout in Smart Grid Power Networks,nst blackouts. An IEEE 30 bus test bed system has been modeled in powerworld and used in this paper for preparation of historical blackout data and validation of proposed model. The proposed model is a step towards realizing smart grid via intelligent ANN prediction technique.作者: COLIC 時間: 2025-3-24 09:36
Hybrid Genetic Fuzzy Rule Based Inference Engine to Detect Intrusion in Networks,tection system. The proposed network intrusion detection system will be able to classify normal behavior as well as anomalies in the network. Detailed analysis has been done on DARPA-KDD99 dataset to specify the behavior of each connection.作者: BOOM 時間: 2025-3-24 13:03
SemCrawl: Framework for Crawling Ontology Annotated Web Documents for Intelligent Information Retri ontologies/semantic web documents. The proposed framework is implemented and validated on different collection of web pages. This system has features of extracting heterogeneous documents from the web, filtering the ontology annotated web pages and extracting triples from them which supports better inferential capability.作者: 容易做 時間: 2025-3-24 17:45 作者: 敲竹杠 時間: 2025-3-24 21:08 作者: inspiration 時間: 2025-3-25 01:08 作者: 培養(yǎng) 時間: 2025-3-25 06:13 作者: Thrombolysis 時間: 2025-3-25 08:35
Dharavath Ramesh,Harshit Gupta,Kuljeet Singh,Chiranjeev Kumar hatte. Nach der überaus erfolgreichen Londoner Weltausstellung von 1851 handelte es sich dabei um die zweite Veranstaltung ihrer Art und die erste, die in Frankreich durchgeführt wurde. Das Zusammentreffen von Verdis Inszenierung vereinsamter Individuen und der gigantischen Selbstinszenierung einer作者: 肌肉 時間: 2025-3-25 14:59
Simon Fong,Renfei Luo,Suash Deb,Sabu M. Thampiher vorliegenden Erfahrungen unter Berücksichtigung aller der Forderungen, die sich aus der Tatsache ergeben, da? die Anstalt dazu bestimmt ist, die besonderen Probleme der Binnenschiffahrt und des Binnenschiffbaus zu untersuchen und zu l?sen. Mit Rücksicht auf die zur Verfügung stehenden Mittel erg作者: 憎惡 時間: 2025-3-25 15:53
Sudha Gupta,Faruk Kazi,Sushama Wagh,Ruta Kamblidzusetzen und zu modernisieren und eine neue Binnenschiffsflotte zu schaffen, die imstande war, mit gesteigerten Geschwindigkeiten den Wettbewerb mit anderen Verkehrstr?gern und mit der internationalen Rheinschiffahrt aufzunehmen, ergab sich die dringende Notwendigkeit, hierfür alle technischen Mitt作者: Ingrained 時間: 2025-3-25 23:32
Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahouation system. Due to large size of data, recommendation system suffers from scalability problem. Hadoop is one of the solutions for this problem. Collaborative filtering is a machine learning algorithm and Mahout is an open source java library which favors collaborative filtering on Hadoop environme作者: 令人苦惱 時間: 2025-3-26 00:30
A Result Verification Scheme for MapReduce Having Untrusted Participants,tributed among multiple mappers which distribute the reduced task to the reducers. Reducers perform identical set of computations on the reduced data independently. If any one of the reducers works maliciously and does not produce results as desired by the end-user, a significant error in the final 作者: venous-leak 時間: 2025-3-26 05:56
Quantifying Direct Trust for Private Information Sharing in an Online Social Network,is content if retrieved, stored, processed and spread beyond scope without user’s consent may result in a privacy breach. Adopting a coarse grained privacy mechanism such as sharing information to a group of “close friends” or the strong ties of the network is one of the solutions to minimize the ri作者: 波動 時間: 2025-3-26 09:49
A Heuristic for Link Prediction in Online Social Network,d exchange information and ideas. Social network is one of the most attracted areas in recent years. Link prediction is a key research area. In our proposed method we study link prediction using heuristic approach. Most of the previous papers only considered the network topology, they didn’t conside作者: 最初 時間: 2025-3-26 12:57
P-Skip Graph: An Efficient Data Structure for Peer-to-Peer Network,ty. Adjacency Matrix, Skip-Webs, Skip-Nets, Skip-List, Distributed Hash Table, and many more data structures form the candidature for peer-to-peer networks, of which, Skip-Graph (evolved version of skip-list) displays one of the best characteristics as it help to search and locate a node in a peer-t作者: 議程 時間: 2025-3-26 20:53
Localization in Wireless Sensor Networks with Ranging Error,Among various WSNs localization techniques, ranging methods based on received signal strength (RSS) are most popular because of simplicity and no additional hardware requirement. However, RSS ranging suffers from various environmental conditions and it can give an erroneous range for positioning of 作者: 做事過頭 時間: 2025-3-27 00:26
Dynamic Job Scheduling Using Ant Colony Optimization for Mobile Cloud Computing,nario there is no doubting the incredible impact that mobile technologies have had on both in scientific and commercial applications. The integration of emerging cloud computing concept and the potential mobile communication services is together considered as Mobile Cloud Computing (MCC). A prominen作者: 耕種 時間: 2025-3-27 02:57
Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust ckets in Mobile Ad Hoc Networks (MANETs) is introduced. Dynamic Source Routing (DSR) protocol [1] is extended and termed as Energy Efficient Secure Dynamic Source Routing (EESDSR). The protocol is based on an efficient, power aware and distributed trust model that enhances the security of Dynamic So作者: 甜得發(fā)膩 時間: 2025-3-27 05:56 作者: Working-Memory 時間: 2025-3-27 10:13
Extending Lifetime of Wireless Sensor Network Using Cellular Automata,vironments. In this paper, we introduced the use of cellular automata in Wireless sensor networks to control Topology. In the network the sensor nodes are redundantly deployed in the same field. Due to this redundant deployment the many nodes in the network have remained in their active state simult作者: 的事物 時間: 2025-3-27 16:36
Computer Network Optimization Using Topology Modification,affic. For network of computers, optimisations are achieved for various aspects such as cost of data transfer, maximum data transfer per unit time, capacity utilisation, uniform traffic distribution. One of the important aspects of computer networks is network topology represented using graph theore作者: Control-Group 時間: 2025-3-27 17:45
Mobile Sensor Localization Under Wormhole Attacks: An Analysis,n estimation or localization is a critical aspect for all the location related applications of sensor networks. Localization helps nodes find their absolute position coordinates. Like possibly every system, localization systems are prone to attacks. Through this study we intend to do a low-level ide作者: 恃強凌弱 時間: 2025-3-28 01:00 作者: Vo2-Max 時間: 2025-3-28 03:55 作者: cunning 時間: 2025-3-28 07:28
Location-Based Mutual and Mobile Information Navigation System: Lemmings, messaging system is presented. The messaging system will automatically disseminate the question which is related to a specific location, to a group of users who are either within the proximity currently or have just recently been there. The users are supposed to help each other; karma or some sort 作者: 帽子 時間: 2025-3-28 13:52 作者: 同步左右 時間: 2025-3-28 16:11 作者: Sputum 時間: 2025-3-28 22:49
SemCrawl: Framework for Crawling Ontology Annotated Web Documents for Intelligent Information Retrihe web it is getting difficult to use search engine tool for finding relevant information from the web. Future search engine tools will not be based merely on keyword search, whereas they will be able to interpret the meaning of the web contents to produce relevant results. Design of such tools requ作者: dainty 時間: 2025-3-29 02:53
A Result Verification Scheme for MapReduce Having Untrusted Participants,cal computations. The solution does not involve redundant computations on the data to prove the worker malicious. Implementation results on Hadoop show the detection rate of such cheating behavior by the proposed scheme. The accompanying theoretical analysis proves that the solution does not noticea作者: MOTTO 時間: 2025-3-29 05:35 作者: 被詛咒的人 時間: 2025-3-29 07:48
Dir-DREAM: Geographical Routing Protocol for FSO MANET, are received for routing. We also perform ns-2 simulations to conduct performance evaluation of Dir-DREAM with FSO interfaces and DREAM over RF interface. Our proposed protocol performs well with multiple FSO interfaces and increases data packet delivery ratio, and decreases end to end delay. The d作者: Infuriate 時間: 2025-3-29 11:47 作者: Liability 時間: 2025-3-29 18:28 作者: 激怒某人 時間: 2025-3-29 20:42 作者: ALLAY 時間: 2025-3-30 03:36 作者: 痛得哭了 時間: 2025-3-30 06:30 作者: 流行 時間: 2025-3-30 08:19 作者: 財主 時間: 2025-3-30 12:36
Simon Fong,Renfei Luo,Suash Deb,Sabu M. Thampiesem Bauabschnitt als Schwerpunkt anzusehen waren. Ferner mu?te der Gesichtspunkt berücksichtigt werden, da? die sp?tere Durchführung des zweiten Bauabschnittes ohne allzu gro?e Schwierigkeiten und Behinderung des laufenden Versuchsbetriebes erfolgen konnte. Man glaubte ferner mit gro?er Wahrscheinl作者: accrete 時間: 2025-3-30 20:24 作者: Medley 時間: 2025-3-30 21:54 作者: nonsensical 時間: 2025-3-31 04:30 作者: colostrum 時間: 2025-3-31 07:02 作者: 舞蹈編排 時間: 2025-3-31 10:53
Rajkumar Buyya,Sabu M. ThampiRecent research in Intelligent Distributed Computing.Carefully reviewed post-conference proceedings of the Third International Symposium on Intelligent Informatics (ISI‘14) held in Delhi, India during作者: 人類的發(fā)源 時間: 2025-3-31 13:51
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/469636.jpg作者: Orgasm 時間: 2025-3-31 19:01
978-3-319-11226-8Springer International Publishing Switzerland 2015作者: CHURL 時間: 2025-4-1 01:18 作者: 防銹 時間: 2025-4-1 04:57