派博傳思國際中心

標(biāo)題: Titlebook: International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC; Jude Hemanth,Xavier Fernando,Zubair [打印本頁]

作者: 法令    時(shí)間: 2025-3-21 16:16
書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC影響因子(影響力)




書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC影響因子(影響力)學(xué)科排名




書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC網(wǎng)絡(luò)公開度




書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC被引頻次




書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC被引頻次學(xué)科排名




書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC年度引用




書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC年度引用學(xué)科排名




書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC讀者反饋




書目名稱International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC讀者反饋學(xué)科排名





作者: 健談的人    時(shí)間: 2025-3-21 23:54

作者: 尊重    時(shí)間: 2025-3-22 02:07

作者: 胖人手藝好    時(shí)間: 2025-3-22 07:36

作者: 夸張    時(shí)間: 2025-3-22 10:58
Lecture Notes on Data Engineering and Communications Technologieshttp://image.papertrans.cn/i/image/471406.jpg
作者: phlegm    時(shí)間: 2025-3-22 13:04

作者: 敲竹杠    時(shí)間: 2025-3-22 19:52
IoT Based Framework for Enhancing the Capabilities of Educational ERP System,The paper discusses the efficient method by which we can enhance the capability of legacy ERP solutions, it is achieved with IoT solutions. These IoT solutions are integrated by the help of web service support to generate a dynamic binding in real time. Authors have used the concept of Dynamics Semantics Link (DSL), to link it with IoT devices.
作者: 仔細(xì)檢查    時(shí)間: 2025-3-22 22:23
Security Effect on AES in Terms of Avalanche Effect by Using Alternate S-Box,ct, which increases the security level of communication, is important. The powerful and highly demanded used secure algorithm is AES, it is a robust private key based cryptographic algorithm. In this paper different ways of encryption technique has been suggested, which is slightly robust against at
作者: 尾隨    時(shí)間: 2025-3-23 02:48

作者: Highbrow    時(shí)間: 2025-3-23 09:24

作者: 奴才    時(shí)間: 2025-3-23 11:56
Improving QoS Parameters Based on Traffic Type for AODV Routing Protocol in MANET,ile in nature, used to move anywhere and communicating with each node in the network. Though it is ease in development and infrastructure less in nature the MANET makes highly popular for multimedia applications. In a MANET, the transmission and reception of the data between the source and destinati
作者: ENDOW    時(shí)間: 2025-3-23 14:58
Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization,m called Cluster Based Wireless Sensor Network using Ant Colony Optimization (CBACO). The Cluster Heads (CH) are selected based on the cost derived from node parameters remaining energy, number of neighbours and distance to base station. The weighted average method is used to compute cost. The routi
作者: 無彈性    時(shí)間: 2025-3-23 20:31
A Study on Cross-Layer TCP Performance in Wireless Ad Hoc Network,acteristics like as node can move freely and a shared channel. Due to those characteristic, TCP facing some problems in wireless ad-hoc networks like as link failure, channel contention and high BER. The performance of TCP depredates due to these above-mentioned factors. The research community has b
作者: 專心    時(shí)間: 2025-3-23 22:28
Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security, Cloud computing is a stretchy, savvy, and affirmed conveyance stage for giving business or shopper IT benefits in overabundance of the Internet. Today, Cloud provider gives conveyance of registering as an administration. Contingent upon the administration, the colossal data is shared over the syste
作者: plasma    時(shí)間: 2025-3-24 04:56
Trust in VANET Using Reactive Protocol,on rely on upon messages passed on by those copartners the place they got message Might a chance to be poisonous. Thereabouts Likewise with shield VANETs starting with poisonous activities, each vehicle must have those ability on assess, pick furthermore react mainly on the information got starting
作者: 闖入    時(shí)間: 2025-3-24 08:05

作者: Foolproof    時(shí)間: 2025-3-24 13:52

作者: Gerontology    時(shí)間: 2025-3-24 18:26

作者: 痛打    時(shí)間: 2025-3-24 19:54
A Novel Scheme for Bot Detection in Online Social Media: BotDefender,ministration several billions of dynamic clients all around the globe are utilizing the web interpersonal organisations such as Facebook, Twitter, LinkedIn and so on. Online Social Media (OSM) gave platforms to the client to interface, impart and communicate with other individuals. In this paper, on
作者: ineptitude    時(shí)間: 2025-3-25 03:00

作者: 爭(zhēng)吵    時(shí)間: 2025-3-25 07:14

作者: 硬化    時(shí)間: 2025-3-25 10:31
Predicting Personality Using Deep Learning Techniques,learning. Undoubtedly the logical foundations of cognition predominantly support classical machine learning conversely, deep learning remains a radical departure from classical methods. As technology is advancing, the focus preliminarily remains that human replacement must be able to engineer machin
作者: Panacea    時(shí)間: 2025-3-25 15:19
Hardware Implementation of Secure Message Service Using Symmetric Cryptographic Technique Using Jav Computer networks are used for sharing the data for printers and sending emails where there is a big issue of security. But today people are using internet not only for sharing tool but for blocking the creditable products like debit cards, credit cards and are misusing the accounts by hacking the
作者: magnanimity    時(shí)間: 2025-3-25 16:53
Hybrid Clean Energy Harvesting for Low Power Devices,ignals is an attractive solution to the existing energy problem. Another effective source is the human body heat. This paper focuses on design of hybrid model which has two parts. First being the harvesting of energy from RF signals in the range of GSM 4G band (1800–2100?MHz) using a micro-strip pat
作者: 邊緣    時(shí)間: 2025-3-25 21:57
2367-4512 understand the importance of data communication and advanced technologies in IoT, it offers different perspectives to help readers increase their knowledge and motivates them to conduct research in the area, highlighting various innovative ideas for future research..978-3-030-03145-9978-3-030-03146-6Series ISSN 2367-4512 Series E-ISSN 2367-4520
作者: 陪審團(tuán)    時(shí)間: 2025-3-26 00:12

作者: Platelet    時(shí)間: 2025-3-26 06:32

作者: conquer    時(shí)間: 2025-3-26 10:32

作者: Critical    時(shí)間: 2025-3-26 15:36

作者: TRUST    時(shí)間: 2025-3-26 17:59
Improving QoS Parameters Based on Traffic Type for AODV Routing Protocol in MANET,or AODV routing protocol and used to compare the parameters like Packet delivery ratio, throughput and improved the QoS parameters of the AODV protocol. The effectiveness of the proposed scheme is analyzed using the simulated results.
作者: anachronistic    時(shí)間: 2025-3-26 21:22
Optimal Location Aided Routing with Directional Antennas in Mobile Ad Hoc Networks,r focuses on obtaining optimal shape for request zone by varying node density. Comparison of different shapes of request zones in term of routing overhead, the end to end delay is made. Further, our simulation results show that directional antennas outperform Omni-directional antennas in reducing the interference, redundant packet collisions, etc.
作者: 舊石器    時(shí)間: 2025-3-27 03:15

作者: 江湖郎中    時(shí)間: 2025-3-27 08:42

作者: Blanch    時(shí)間: 2025-3-27 09:36
Conference proceedings 2019 technologies in IoT, it offers different perspectives to help readers increase their knowledge and motivates them to conduct research in the area, highlighting various innovative ideas for future research..
作者: Daily-Value    時(shí)間: 2025-3-27 14:33
2367-4512 Conference on Intelligent Data Communication Technologies a.This book discusses data communication and computer networking, communication technologies and the applications of IoT (Internet of Things), big data, cloud computing and healthcare informatics. It explores, examines and critiques intellig
作者: 禁令    時(shí)間: 2025-3-27 21:16

作者: 颶風(fēng)    時(shí)間: 2025-3-28 01:08

作者: Tdd526    時(shí)間: 2025-3-28 04:58
Bineeth Kuriakose,Varghese Mathai,Arun Baby,Jeexson Jose
作者: Heresy    時(shí)間: 2025-3-28 08:15
Farhana Begum,Smita Sarma,Sandeep Mishra,Anup Dandapat
作者: 尖牙    時(shí)間: 2025-3-28 12:22
Rakeash Mukati,Pritesh Jain,Makrand Samvatsar,Upendra Singh
作者: 秘方藥    時(shí)間: 2025-3-28 16:21

作者: AFFIX    時(shí)間: 2025-3-28 19:55

作者: characteristic    時(shí)間: 2025-3-28 23:47
K. Vivek Raj,K. Namana Shenoy,L. Dhanalakshmi,Drishya Jayan,Ayushi
作者: 重力    時(shí)間: 2025-3-29 03:49
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICIC
作者: 地名表    時(shí)間: 2025-3-29 08:13

作者: cornucopia    時(shí)間: 2025-3-29 13:50

作者: Sigmoidoscopy    時(shí)間: 2025-3-29 17:04

作者: Trypsin    時(shí)間: 2025-3-29 21:41

作者: mucous-membrane    時(shí)間: 2025-3-30 00:15
Industrial Metal Waste Management with MAGNETO Robot,agnet is lowered through a motorised control. This gives the flexibility, ease of movement and lower power requirement for the robot. Different sensors are deployed on the robot for the overall assistance of the robot for its manoeuvre and iron acquisition. The robot as well as the electromagnet is
作者: GRAZE    時(shí)間: 2025-3-30 04:48
Support Vector Neural Network and Principal Component Analysis for Fault Diagnosis of Analog Circuithe comprehensive diagnosis of the faults in the analog circuits. The experimentation is performed using the triangular wave generator and the simulation results highlight that SVNN classifier attained a classification percentage of 99.54% and low False Alarm Rate of 0.68%.
作者: Coma704    時(shí)間: 2025-3-30 09:19
Predicting Personality Using Deep Learning Techniques, certain projects. In most of the discussed papers in order to predict human behavior related outcomes classical methods have already been employed. Also, we have carried out an analysis on the feature extraction on labelled and unlabeled data.
作者: 甜瓜    時(shí)間: 2025-3-30 14:52
Hardware Implementation of Secure Message Service Using Symmetric Cryptographic Technique Using Javd and characterized experimentally using the performance measurement approach JAVA in which file of any data length can be practically compressed, converted to ASCII, encrypted and decrypted using new encryption technique. Java is used as it is based on the computing system concept, because of the b
作者: 畸形    時(shí)間: 2025-3-30 19:07

作者: 考得    時(shí)間: 2025-3-30 21:13

作者: LARK    時(shí)間: 2025-3-31 04:33

作者: Rankle    時(shí)間: 2025-3-31 06:54
F. Javier Ferrández-Pastor,José M. Cámara-Zapata,Sara Alca?iz-Lucas,Sofía Pardo,Jose A. Brenes by assessing the proportion of soft and clayish limestone and obtaining a mixture similar to the one that helps support buildings, bridges, and houses today. Variations of this product were typified and standardized so as to comply with different environmental conditions and improve the durability
作者: Aerate    時(shí)間: 2025-3-31 10:02

作者: REIGN    時(shí)間: 2025-3-31 16:35
0302-9743 t intelligence; user experience in intelligent environments; developing distributed, pervasive and intelligent environments; smart cities.978-3-319-07787-1978-3-319-07788-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: jagged    時(shí)間: 2025-3-31 20:02
Quality Rating and Recommendation of Learning Objects and developed instructional materials. Hence, there is a clear need for quality evaluations prior to making a recommendation that can be communicated in a coherent, standardized format to measure the quality of learning objects.
作者: mitral-valve    時(shí)間: 2025-3-31 23:30

作者: 膽小鬼    時(shí)間: 2025-4-1 05:11
https://doi.org/10.1057/9780230505094eighteenth century; England; law; reform




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
揭阳市| 会同县| 岱山县| 祥云县| 山丹县| 和顺县| 隆尧县| 上蔡县| 天峻县| 滁州市| 韶关市| 曲水县| 拜城县| 井陉县| 象山县| 开化县| 都昌县| 宝兴县| 莲花县| 营口市| 邓州市| 彰化县| 诸暨市| 平乐县| 瓮安县| 页游| 扶沟县| 永泰县| 宁陕县| 西安市| 巴林右旗| 西乡县| 福海县| 石屏县| 闸北区| 安多县| 通山县| 启东市| 承德市| 柳河县| 鸡泽县|