標題: Titlebook: Next Generation of Internet of Things; Proceedings of ICNGI Raghvendra Kumar,Brojo Kishore Mishra,Prasant Kuma Conference proceedings 2021 [打印本頁] 作者: DUMMY 時間: 2025-3-21 19:13
書目名稱Next Generation of Internet of Things影響因子(影響力)
書目名稱Next Generation of Internet of Things影響因子(影響力)學(xué)科排名
書目名稱Next Generation of Internet of Things網(wǎng)絡(luò)公開度
書目名稱Next Generation of Internet of Things網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Next Generation of Internet of Things被引頻次
書目名稱Next Generation of Internet of Things被引頻次學(xué)科排名
書目名稱Next Generation of Internet of Things年度引用
書目名稱Next Generation of Internet of Things年度引用學(xué)科排名
書目名稱Next Generation of Internet of Things讀者反饋
書目名稱Next Generation of Internet of Things讀者反饋學(xué)科排名
作者: 可忽略 時間: 2025-3-21 21:14
Sunita,Tamanna Jain,Sudhir Kumar Sharmangness” of graft chains, coupled with the inherent nature of photochemical processing, enables the development of complex graft-polymerized surface designs with controlled graft-chain length and composition, regiospecific addressability and high-dimensional precision. As an extension of the advantag作者: 無聊點好 時間: 2025-3-22 01:51
Urmila Pilania,Ashwani Kaushik,Yatharth Vohra,Shikhar Jadaunngness” of graft chains, coupled with the inherent nature of photochemical processing, enables the development of complex graft-polymerized surface designs with controlled graft-chain length and composition, regiospecific addressability and high-dimensional precision. As an extension of the advantag作者: paragon 時間: 2025-3-22 05:55 作者: 大炮 時間: 2025-3-22 08:56
Artatrana Biswaprasan Dash,Biswaranjan Mishra,Amar Nath Singhypical characteristics of the grafted polymersthat may change spatially along the specimen include molecular weight, grafting density on the substrate,and chemical composition. The concept of surface-anchored polymer assemblies is employed in severalprojects, including, study of the mushroom-to-brus作者: Introduction 時間: 2025-3-22 13:37
Bandita Sahu,Pradipta Kumar Das,Manas Ranjan KabatContains techniques for the motion picture method and quandlThis introductory volume provides the basics of surface-knots and related topics, not only for researchers in these areas but also for graduate students and researchers who are not familiar with the field..Knot theory is one of the most act作者: 最低點 時間: 2025-3-22 19:22 作者: 忘川河 時間: 2025-3-23 00:37
H. R. Swapna,D. Arpanaative to conventional luminescent dyes in biomedical applications, including biomolecule (BM) targeting, luminescence imaging and drug delivery. A key parameter to ensure successful biomedical applications of QDs is the appropriate surface modification, i.e. the surface of the nanomaterials should b作者: Ligament 時間: 2025-3-23 04:55
Ravi Kishan Surapaneni,Sailaja Nimmagadda,K. Pragathihange and permits respiration. But because lungs can fail, artificial lungs have been designed; the most-efficient ones have high surface/volume ratios and are capable of achieving a high gas-exchange efficiency. Aerogels are rigid solid substances that are extremely porous and have exceedingly low 作者: Basal-Ganglia 時間: 2025-3-23 07:18
K. S. Jasminehange and permits respiration. But because lungs can fail, artificial lungs have been designed; the most-efficient ones have high surface/volume ratios and are capable of achieving a high gas-exchange efficiency. Aerogels are rigid solid substances that are extremely porous and have exceedingly low 作者: 莎草 時間: 2025-3-23 11:18
Gaming: Around the World Geography,ng industry. It is proved as a ?boom in the?gaming industry and has earned?profit to the gaming industrialist. This research paper shows a brief description of gaming around the world. It contains history of gaming and its growth till now. This research paper is for new generation who wants to dive 作者: resuscitation 時間: 2025-3-23 17:27
Smart Blind Stick for Blind People,e smart blind stick will act as a way to identify the world around them. In this paper, we represented a smart blind stick with ultrasonic sensors to detect any hurdles and also use IR camera to identify that hurdle in front of the user with the help of Google API, within a range of 1?m. Speech warn作者: acolyte 時間: 2025-3-23 21:25
How Societies and Businesses Will Technologically Evolve with COVID-19,th several lockdowns taking place worldwide, various tasks and activities started to rely on technology to deliver services and elementary goods. In an attempt to stop the spread and help save lives, we have assisted to the appearance of several software applications using AI, big data, robots and d作者: immunity 時間: 2025-3-24 00:50
Identification of Premature Diagnosis for Detection of Brain Tumor Using Blockchain Strategy,ion, banking and health care also. In health care, most of the health issues occur because of their negligence of proper diagnosis by the doctor and ignorance the symptom by patients. The most common disease nowadays is called as tumor. A tumor is a kind of disease which is usually not going to be d作者: Ibd810 時間: 2025-3-24 05:33 作者: Venules 時間: 2025-3-24 09:07
IoT-Malware Classification Model Using Byte Sequences and Supervised Learning Techniques, IoT devices are more susceptible to malware attacks due to the lack of secured protocols and security standards in these devices. Therefore, securing data in IoT networks is highly challenging yet essential task. In this paper, we have considered byte sequences of IoT-malware and benign files which作者: ALB 時間: 2025-3-24 12:38
Chatbots as a Game Changer in E-recruitment: An Analysis of Adaptation of Chatbots,y recruiter, and chatbots are trying to make sure it takes away monotonous and tedious task. We have come to rely on a key contact role in an effort to improve organizational and technical transparency. While efficient for design and development, centralizing this role poses challenges to transparen作者: 性別 時間: 2025-3-24 15:06 作者: UNT 時間: 2025-3-24 20:51 作者: Endemic 時間: 2025-3-25 01:26
Enhancement the ChaCha20 Encryption Algorithm Based on Chaotic Maps,is lightweight cryptographic hash functions. Light hash functions are a common topic in cryptography, and its strength depends primarily on cryptographic analysis of hash functions. Therefore, it always requires an improvement in the designs of light hash functions in addition to paying attention to作者: 無能力 時間: 2025-3-25 03:33 作者: Ancillary 時間: 2025-3-25 11:34 作者: mortuary 時間: 2025-3-25 14:40
Secure Data Sharing Based on Linear Congruetial Method in Cloud Computing,of data wishes to share this data with another user, the security of data will form a complicated problem. In the current research, a secure data sharing and storing system is suggested on the cloud, with offering data secrecy and access control authenticity for data. The suggested model reduces the作者: 使激動 時間: 2025-3-25 17:22
Evaluating the Effects of Varying Model Parameter Values on the Characteristics of a Photovoltaic Mry focus was on the photovoltaic cell, the essential component in the transformation of light into electric current. Furthermore, for the purposes of the present study, it has been depended on previous research to design a simulation model of a photovoltaic cell and module using MATLAB to represent 作者: forthy 時間: 2025-3-25 21:01 作者: pantomime 時間: 2025-3-26 01:27
Implementing Cybersecurity in IoT Using IPAI Algorithm,tifiers (UIDs) that are able to transmit data over a network without human-to-human or human-to-computer communication being needed. The Internet of Things is the fastest evolving example of the potential of individuals and organisations to transform physical activity. In various areas such as nursi作者: Mobile 時間: 2025-3-26 04:58
OCR-Based Automatic Toll Collection and Theft Vehicle Detection Using IoT,ely. In the proposed scheme, to capture information on passing vehicles and make hassle-free automated transactions supporting the unique identity pin (UIP), the toll will be equipped with optical character recognition (OCR) and RFID sensing. The UIP is passed to the central server unit (CSU) where 作者: 細絲 時間: 2025-3-26 08:45
A Comprehensive Survey on Software-Defined Network Controllers,ower efficiency, and load balancing. SDN is an architecture that disconnects the control plane of any networking equipment (router or switch) from its data plane, making it suitable to observe, control, and administrate the entire network from a centralized entity (controller). In SDN paradigm, cent作者: 兇兆 時間: 2025-3-26 13:27
Performance Evaluation of Nanorobot Drug Delivery Mechanism for Breast Cancer,ns in mammogram images are segmented using an area growing algorithm. The conventional cancer treatment procedures are excruciating, which makes the patients withdraw from treatment, and hence, researchers are working to overcome this drawback. Nanotechnology, the developing trend, overcomes this dr作者: 擦試不掉 時間: 2025-3-26 18:33 作者: 注意力集中 時間: 2025-3-26 21:37
Next Generation of Internet of Things978-981-16-0666-3Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: daredevil 時間: 2025-3-27 01:28 作者: Free-Radical 時間: 2025-3-27 05:42 作者: 大炮 時間: 2025-3-27 11:06 作者: sphincter 時間: 2025-3-27 14:22
Gaming: Around the World Geography,iption of gaming around the world. It contains history of gaming and its growth till now. This research paper is for new generation who wants to dive in the?gaming industry. ?The?Gaming industry has made huge profit since last three years. It attracts the youngsters from new upcoming products.作者: SLING 時間: 2025-3-27 20:42 作者: MAUVE 時間: 2025-3-27 22:41
Conference proceedings 2021ent of Computer Science and Engineering, School of Engineering, GIET University, Gunupur, Odisha, India, during 5–6 February 2021. The book covers topics such as IoT network design and architecture, IoT network virtualization, IoT sensors, privacy and security for IoT, SMART environment, social netw作者: 破譯密碼 時間: 2025-3-28 05:38
Change Point Detection Technique for Weather Forecasting Using Bi-LSTM and 1D-CNN Algorithm,ether an artificial neural network has a good potential for forecasting weather conditions in addition of large datasets, due to its applicability in a number of fields. It is a benefit to have meteorological data available from through online outlets.作者: 我吃花盤旋 時間: 2025-3-28 06:14
Attacking the Application of Three-Pass Protocol in Hill-Cipher,on the encryption algorithm, three-pass protocol on Hill-Cipher, is introduced. This attack depends only on the ciphertext which makes us break this system by analyzing the encryption and decryption process.作者: 躺下殘殺 時間: 2025-3-28 12:50
Secure Data Sharing Based on Linear Congruetial Method in Cloud Computing, load on the central management and offers encryption and decryption for the files shared by the users. The suggested system consists of three fundamental entities: cloud service (CS), certificate authority (CA), and users, where CA is the trusted entity to generate keys and distribute them on other entities and to encrypt and decrypt files.作者: Muffle 時間: 2025-3-28 16:43
A Comprehensive Survey on Software-Defined Network Controllers,ralized nodes named “controllers” work in a similar way such as network operating systems (NOS) by running various applications that control and manage the entire network by deploying well-defined APIs. This paper offers an up-to-date survey of the SDN controllers including types, features, architectures, design, and many other important aspects.作者: incarcerate 時間: 2025-3-28 20:56 作者: aspersion 時間: 2025-3-28 23:53
Smart Blind Stick for Blind People,Map link. The stick can detect in the range of 1?m and give an alert message to the user which makes the blind to move 2 times faster of his usual speed. The smart stick is budget-friendly, fast responsive, consuming low power, portable and also a lightweight device.作者: Incorporate 時間: 2025-3-29 04:42
Cuckoo Search Applied Path Planning of Twin Robot in Multi-Robot Environment,onously. Cooperation between the twin robot is achieved by satisfying the distance and velocity constraint. The performance of the proposed approach is compared with several existing algorithms that results in better success rate in producing the global path.作者: 啤酒 時間: 2025-3-29 09:37 作者: 潛移默化 時間: 2025-3-29 12:01
OCR-Based Automatic Toll Collection and Theft Vehicle Detection Using IoT,unlock the barricade until the balance is deducted at CSU, and the vehicle is not permitted to move; if the vehicle is found to be robbed at CSU, it will mean that the TCS will not unlock the barricade. For further intervention, these information can be included.作者: Talkative 時間: 2025-3-29 15:58 作者: ABYSS 時間: 2025-3-29 20:31 作者: 真 時間: 2025-3-30 01:23 作者: 密碼 時間: 2025-3-30 06:45 作者: 不如屎殼郎 時間: 2025-3-30 11:49 作者: exacerbate 時間: 2025-3-30 16:11 作者: 改變 時間: 2025-3-30 17:52
Urmila Pilania,Ashwani Kaushik,Yatharth Vohra,Shikhar Jadaun The confocal laser scanning microscopic measurement for dye-stained grafted surfaces and the force–distance curves of atomic force microscopy provided some physicochemical and structural insights into graft architectures. Under appropriate conditions, the cross-recommendation reaction of two differ作者: 挖掘 時間: 2025-3-31 00:22 作者: 變白 時間: 2025-3-31 01:06 作者: Fierce 時間: 2025-3-31 05:05
Om Prakash Samantray,Satya Narayan TripathyIncluded in this book are basics of surface-knots and the related topics ofclassical knots, the motion picture method, surface diagrams, handle surgeries, ribbon surface-knots, spinning construction, knot concordance and 4-genus, quandles and their homology theory, and two-dimensional braids..作者: 認識 時間: 2025-3-31 09:55 作者: Ancestor 時間: 2025-3-31 16:26 作者: Irksome 時間: 2025-3-31 21:34 作者: 畏縮 時間: 2025-3-31 22:24 作者: Obscure 時間: 2025-4-1 04:03 作者: Parley 時間: 2025-4-1 07:19
Non-functional Testing-Based Framework for Developing Reliable IoT Products,ce manufacturers have to take into considerations of various non-functional aspects when designing their products such as security, safety, scalability, reliability and performance. This paper proposes a layered IoT framework with a focus on non-functional testing aspects in order to enable the orga作者: 討人喜歡 時間: 2025-4-1 12:01 作者: Lacerate 時間: 2025-4-1 18:15 作者: Myocyte 時間: 2025-4-1 20:15
Forwarding Information Base Design Techniques in Content-Centric Networking: A Survey,hin these challenges. This paper presents an up-to-date survey of FIB design techniques in content-centric networks. Its main purpose is to classify comprehensive FIB designing and implementation techniques in an abridged style. Then presenting their pros and cons and identifying the requisite neces作者: scrape 時間: 2025-4-2 00:50
Implementing Cybersecurity in IoT Using IPAI Algorithm,e to the absence of immense volatile node movements. The suggested solution focuses on the study of the bandwidth attacks inquiry, which primarily targets DDoS, which can be a very difficult task and difficult to track, which decreases network performance. The diagnostic procedures of IDS, which are