派博傳思國際中心

標(biāo)題: Titlebook: Computer Communication, Networking and IoT; Proceedings of 5th I Suresh Chandra Satapathy,Jerry Chun-Wei Lin,T. M. Conference proceedings [打印本頁]

作者: 遮蔽    時(shí)間: 2025-3-21 19:31
書目名稱Computer Communication, Networking and IoT影響因子(影響力)




書目名稱Computer Communication, Networking and IoT影響因子(影響力)學(xué)科排名




書目名稱Computer Communication, Networking and IoT網(wǎng)絡(luò)公開度




書目名稱Computer Communication, Networking and IoT網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Communication, Networking and IoT被引頻次




書目名稱Computer Communication, Networking and IoT被引頻次學(xué)科排名




書目名稱Computer Communication, Networking and IoT年度引用




書目名稱Computer Communication, Networking and IoT年度引用學(xué)科排名




書目名稱Computer Communication, Networking and IoT讀者反饋




書目名稱Computer Communication, Networking and IoT讀者反饋學(xué)科排名





作者: FIR    時(shí)間: 2025-3-21 20:51
A Design Model of Copyright Protection System Based on Distributed Ledger Technology,parency and traceability. This paper covers basic understanding of blockchain, existing copyright system, and a new echo system can be implemented using blockchain technology effectively. A solution model is designed for the system along with the explanation of the procedure to build the system.
作者: conceal    時(shí)間: 2025-3-22 02:51
2367-3370 ovember 2021.Serves as a reference for young scholars, reseaThis book features a collection of high-quality, peer-reviewed papers presented at the Fifth International Conference on Intelligent Computing and Communication (ICICC 2021) organized by the Department of Computer Science and Engineering an
作者: PUT    時(shí)間: 2025-3-22 04:35

作者: Indolent    時(shí)間: 2025-3-22 09:46

作者: beta-carotene    時(shí)間: 2025-3-22 15:27
Tata Memorial Centre Textbook of Oncologys the network lifetime by reducing the computational energy and minimizing the number of dead nodes. From the simulation results, it is inferred that the proposed K-WCH algorithm outperforms K-means and LEACH protocol in terms of energy consumption and dead nodes.
作者: beta-carotene    時(shí)間: 2025-3-22 17:34
Gouri Pantvaidya,Abhay Kattepurased Routing Protocol (MIEEPB) where the sink is dynamic. MATLAB tool is used for simulation of protocols for various parameters. The analysis proves that MIEEPB is a better technique with mobile sink support when compared to PEGASIS which has a fixed sink location.
作者: fabricate    時(shí)間: 2025-3-22 22:26

作者: 厭倦嗎你    時(shí)間: 2025-3-23 03:56

作者: 換話題    時(shí)間: 2025-3-23 07:38
,Soziale Bedingungen h?uslicher Gewalt,rprises and associated statistical variants. Here the model is proposed using data fusion techniques to use statistical and non-statistical parameters. This intern improves cognitive decision-making. The system can be adapted to other applications like gamification, economics applications, etc.
作者: inspired    時(shí)間: 2025-3-23 10:32
Web Crawling-Based Search Engine for Programming Languages,amming languages, and the search engine will be designed to extract the data from these sites and provide a list of possible answers to the query. Proposed search engine gives better accuracy and faster crawling.
作者: 6Applepolish    時(shí)間: 2025-3-23 16:54
K-Weighted Cluster Head Selection in Wireless Sensor Networks,s the network lifetime by reducing the computational energy and minimizing the number of dead nodes. From the simulation results, it is inferred that the proposed K-WCH algorithm outperforms K-means and LEACH protocol in terms of energy consumption and dead nodes.
作者: hermetic    時(shí)間: 2025-3-23 18:34
Implementation and Performance Analysis of PEGASIS and MIEEPB Protocols in Wireless Sensor Networksased Routing Protocol (MIEEPB) where the sink is dynamic. MATLAB tool is used for simulation of protocols for various parameters. The analysis proves that MIEEPB is a better technique with mobile sink support when compared to PEGASIS which has a fixed sink location.
作者: 抵制    時(shí)間: 2025-3-23 22:17

作者: SPURN    時(shí)間: 2025-3-24 06:08

作者: Blood-Clot    時(shí)間: 2025-3-24 09:52
Gameplay Cognitive Decision Support Using Statistical and Non-statistical Parametric Fusion,rprises and associated statistical variants. Here the model is proposed using data fusion techniques to use statistical and non-statistical parameters. This intern improves cognitive decision-making. The system can be adapted to other applications like gamification, economics applications, etc.
作者: 鼓掌    時(shí)間: 2025-3-24 11:37
Gouri Pantvaidya,Abhay Kattepurity. Falls are the leading contributor to fatal incidents and sometimes the death of miners as appropriate treatment is not provided within the time set. Hence, the proposed system detects a fall and sends the current location of the miner to the base station.
作者: Assault    時(shí)間: 2025-3-24 16:36

作者: Endearing    時(shí)間: 2025-3-24 20:47

作者: Indecisive    時(shí)間: 2025-3-25 02:34

作者: 得罪人    時(shí)間: 2025-3-25 03:34

作者: 虛弱的神經(jīng)    時(shí)間: 2025-3-25 08:38

作者: Petechiae    時(shí)間: 2025-3-25 12:45

作者: 雜色    時(shí)間: 2025-3-25 17:42
Securing Communication in IoT Environment Using Lightweight Key Generation-Assisted Homomorphic Autsisted homomorphic authenticated encryption. In order to judge it’s efficiency and adaptability, we carried out the computational complexity, security, correctness analysis and experimental evaluation of the developed framework. Later, the comparative analysis is also performed with some significant state-of-the-art approaches.
作者: 嚴(yán)峻考驗(yàn)    時(shí)間: 2025-3-25 21:48
Conference proceedings 2023munication (ICICC 2021) organized by the Department of Computer Science and Engineering and Department of Computer Science and Technology, Dayananda Sagar University, Bengaluru, India, on November 26 – 27, 2021. The book is organized in two volumes and discusses advanced and multi-disciplinary resea
作者: Melodrama    時(shí)間: 2025-3-26 03:30
Suresh Chandra Satapathy,Jerry Chun-Wei Lin,T. M. Presents recent innovative research in the field of communication and networks.Results of ICICC 2021 organized in Bengaluru, India, during November 2021.Serves as a reference for young scholars, resea
作者: 嚴(yán)重傷害    時(shí)間: 2025-3-26 06:16
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/c/image/233523.jpg
作者: Conserve    時(shí)間: 2025-3-26 09:06
https://doi.org/10.1007/978-981-19-1976-3Internet of Things; Wireless and Wireline Network; Intelligent Computing, IOT; Computer Communication; I
作者: 斜谷    時(shí)間: 2025-3-26 15:02
978-981-19-1975-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
作者: 紅潤    時(shí)間: 2025-3-26 19:06
https://doi.org/10.1007/978-0-8176-4578-6ng student population. The current study analyses in brief the efficacy of e-learning services in the classroom and how cloud computing will play a significant role in future of education. While incorporating cloud computing into e-learning services has many advantages, there are certain risks and c
作者: 著名    時(shí)間: 2025-3-26 21:58
Divisors on hyperelliptic curvesfor developing software, testing a hardware and simulation of gadgets. Therefore, an engine is required which can find relevant solution links for code errors which will reduce a developer’s web browsing time, increase implementation chances and faster production of a software-based project. In this
作者: 高談闊論    時(shí)間: 2025-3-27 03:57
Gouri Pantvaidya,Abhay Kattepur the miners. Underground mining results in suffocation, gas poisoning, object fall, roof collapse, and gas explosion. Therefore, there is a need for an intelligent monitoring system to eliminate these hazards. This paper proposes a smart helmet based on wireless sensor network for real-time monitori
作者: commonsense    時(shí)間: 2025-3-27 08:34
Tata Memorial Centre Textbook of Oncologygies due to a set of specific requirements and feature such as node density, power requirements, and computer capabilities. To increase the lifetime of WSN, clustering is one of the most important ways which includes the collection of sensor nodes into groups and the selection of Cluster Heads (CHs)
作者: 舊石器時(shí)代    時(shí)間: 2025-3-27 10:53
Gouri Pantvaidya,Abhay Kattepureds to be transmitted to the sink for further processing and analysis. Sensor nodes form the basic element of a WSN. The primary requirement of WSN is to enhance the lifetime of network. Accordingly, different types of routing protocols are implemented and categorized into flat routing, hierarchical
作者: installment    時(shí)間: 2025-3-27 13:39

作者: 不可救藥    時(shí)間: 2025-3-27 17:46

作者: 希望    時(shí)間: 2025-3-28 01:13
https://doi.org/10.1007/978-3-531-93272-9ent studies, international airports like CIAL, which operate only on renewable energy, are transforming India into a solar powerhouse. And in the Indian state of Tamil Nadu, one of the giant solar power plants has recently been built. The project‘s goal is to develop a test device for usage before a
作者: miniature    時(shí)間: 2025-3-28 05:11
Introduction: History, Class, and Context,ad to wrong diagnosis and medical errors, which can even cost a life. “About 2.6?million deaths are caused yearly due to medical mistakes”, said by WHO. Most of which are due to lack of knowledge about the patient’s medical history. This paper proposes a solution which provides the registered users
作者: 系列    時(shí)間: 2025-3-28 07:26
Introduction: History, Class, and Context,on and translation is exploding. Hand gesture-based sign language recognition is a fortunate application of human–computer interaction. A developed model detects sign language gestures involving feature extraction and classification. This work presents transfer learning-based image recognition model
作者: 柱廊    時(shí)間: 2025-3-28 13:04

作者: neoplasm    時(shí)間: 2025-3-28 16:16
Menschliche Eingriffe in den Naturraum Erdehe daily needs of people. In this paper, we are going to discuss the impingement of pandemic outbreak on different business sectors and day-to-day life of human being. To study the influence of pandemic, a survey is conducted for the peoples of different age groups, gender and different occupation a
作者: indenture    時(shí)間: 2025-3-28 19:21

作者: Eviction    時(shí)間: 2025-3-29 02:28

作者: 包租車船    時(shí)間: 2025-3-29 03:33
,Soziale Bedingungen h?uslicher Gewalt,ecially in the area of Internet Banking, user authentication is a major issue. An extra layer of security is necessary for user authentication. Two-factor authentication is providing extra layer security in banking services. Biometric-based authentication, password-based authentication, smart card-b
作者: tenuous    時(shí)間: 2025-3-29 10:11
https://doi.org/10.1007/978-3-531-93127-2s and partners. Here, digital security plays an important role in establishing the trust between the enterprises and the consumers [.]. To secure the web content, at present, we are using secure socket layer (SSL) over HTTP. However, SSL tackles only a subset of security services. SSL does not offer
作者: Melatonin    時(shí)間: 2025-3-29 12:07
Siegfried Lamnek,Ralf Ottermann security measures. This article reports how cyber threat intelligence (CTI) can prevent an attack before it strikes, rather than researching about how to repair the damage caused by it. cyber threat intelligence in general refers to information that is collected from an open source or in an organiz
作者: Engulf    時(shí)間: 2025-3-29 19:23
,Soziale Bedingungen h?uslicher Gewalt,rks in actions and associative responses. Gaming and cognition have a close association while decision-making in gaming or economics applications. These applications always respond to opponents’ moves using statistical variants. These responses are always affected due to surprises. These surprises c
作者: Systemic    時(shí)間: 2025-3-29 20:39
Tatort K?rper — Spurensicherungfrastructure. Keeping in mind that IoT devices are computationally limited and resource constrained, it is important that the primitives employed in the construction of any key generation mechanism are lightweight. During communication among IoT sensor nodes/ smart devices, data privacy preservation
作者: 容易懂得    時(shí)間: 2025-3-30 02:20

作者: absolve    時(shí)間: 2025-3-30 05:08

作者: Canvas    時(shí)間: 2025-3-30 09:14

作者: 表主動(dòng)    時(shí)間: 2025-3-30 12:51

作者: 瑪瑙    時(shí)間: 2025-3-30 19:04
https://doi.org/10.1007/978-3-531-93272-9he smartphone app, you may see the chart. We can determine whether the site we are considering for a large project like a solar farm is viable by looking at the graph. With this initiative, we can anticipate the future performance of the solar farm and prepare accordingly. As a result, it aids in av
作者: 傻    時(shí)間: 2025-3-30 21:02

作者: 左右連貫    時(shí)間: 2025-3-31 01:16

作者: 用肘    時(shí)間: 2025-3-31 09:05
https://doi.org/10.1007/978-3-531-93127-2na A in Universal designated multi verifier signature without random oracles, pp. 168–171, 2006) [.] representations and different key storage formats. But we need to have a standardised approach to consume the underlying PKI services. Except the vendors adhere to the formats which are standard meti
作者: ONYM    時(shí)間: 2025-3-31 12:32

作者: 的染料    時(shí)間: 2025-3-31 15:17
Cloud-Based E-learning: Scaffolding the Environment for Adaptive E-learning Ecosystem Based on Cloumore efficient than on-premises e-learning systems and are considerably safer. Author examined several contemporary technologies and weighed their benefits and drawbacks in this article, concluding that some platforms are there to stay, while others may perish because of its operational difficulty.
作者: immunity    時(shí)間: 2025-3-31 18:59

作者: Vasodilation    時(shí)間: 2025-4-1 00:03
Sensor Integration and Information Sharing for Automated Electric Vehicles for Better Estimation of for all input states, the high level of uncertainty associated with unknown or novel states is captured. A risk-aware DRL agent based on distributional RL algorithms was created for environmental uncertainty. Because the decision-making process was based on conditional value at risk rather than exp
作者: STYX    時(shí)間: 2025-4-1 03:32
Cloud-Computed Solar Tracking System,he smartphone app, you may see the chart. We can determine whether the site we are considering for a large project like a solar farm is viable by looking at the graph. With this initiative, we can anticipate the future performance of the solar farm and prepare accordingly. As a result, it aids in av
作者: indicate    時(shí)間: 2025-4-1 07:16
Patient Identifier Using Biometric Authentication, effects can be reduced. In severe cases, the victim may not be in a position to brief about his username and password, so the biometric fingerprint authentication is added for the convenience of medical staff to acquire the victim’s medical history. Different medical attributes like blood sugar lev
作者: 出價(jià)    時(shí)間: 2025-4-1 10:47
Dynamic Authentication Using Visual Cryptography,yptography technique” for the authentication of a user in Internet Banking systems. Visual cryptography was proposed by Naor and Shamir (Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of the advances in cryptology—Eurocrypt) in 1994. VC is one of the most secure techniques which can be
作者: 顯示    時(shí)間: 2025-4-1 16:51





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
历史| 乌苏市| 陈巴尔虎旗| 鄂温| 达拉特旗| 淳安县| 报价| 三穗县| 远安县| 芦溪县| 息烽县| 吉林省| 梁平县| 行唐县| 拉萨市| 务川| 东山县| 固阳县| 广宁县| 岢岚县| 上林县| 郧西县| 聂荣县| 岳池县| 遂宁市| 垫江县| 湘阴县| 孙吴县| 凤庆县| 泽库县| 南丰县| 甘洛县| 湟源县| 丰镇市| 平乡县| 扬中市| 含山县| 莱西市| 洪湖市| 逊克县| 肥城市|