派博傳思國際中心

標(biāo)題: Titlebook: Computing Science, Communication and Security; 4th International Co Nirbhay Chaubey,Sabu M. Thampi,Kiran Amin Conference proceedings 2023 T [打印本頁]

作者: 調(diào)停    時間: 2025-3-21 17:49
書目名稱Computing Science, Communication and Security影響因子(影響力)




書目名稱Computing Science, Communication and Security影響因子(影響力)學(xué)科排名




書目名稱Computing Science, Communication and Security網(wǎng)絡(luò)公開度




書目名稱Computing Science, Communication and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computing Science, Communication and Security被引頻次




書目名稱Computing Science, Communication and Security被引頻次學(xué)科排名




書目名稱Computing Science, Communication and Security年度引用




書目名稱Computing Science, Communication and Security年度引用學(xué)科排名




書目名稱Computing Science, Communication and Security讀者反饋




書目名稱Computing Science, Communication and Security讀者反饋學(xué)科排名





作者: 軍火    時間: 2025-3-21 23:44

作者: Nebulous    時間: 2025-3-22 02:57

作者: 平靜生活    時間: 2025-3-22 08:06
Performance Analysis of Smart Antenna in Wireless Communication System,ated with a MATLAB simulator under multipath effects and multiple users. Comparing the results of the simulations with those of previous work suggests an improvement in the convergence rate, which leads to better efficiency of the system.
作者: FEAS    時間: 2025-3-22 12:08
1865-0929 023, held in Gandhinagar, India, during February 6–7, 2023.?.The 20 full papers included in this book were carefully reviewed and selected from 190 submissions. They were organized in topical sections on?artificial intelligence and machine learning; networking and communications..978-3-031-40563-197
作者: Functional    時間: 2025-3-22 14:09

作者: Functional    時間: 2025-3-22 18:02

作者: 重疊    時間: 2025-3-23 00:21

作者: 真實的人    時間: 2025-3-23 02:36
A Comparative Study of DWT and DCT Along with AES Techniques for Safety Transmission of Digital Banopyright protection to the cheque image. In this study, the discrete wavelet (DWT) and discrete cosine (DCT) transforms are integrated and implemented for watermarking using the AES technique with a maximum key length of ‘256 bits. In addition, the analysis is done for watermarking, for which AES is used for security against various attack types.
作者: Deadpan    時間: 2025-3-23 08:38

作者: 旅行路線    時間: 2025-3-23 10:37

作者: VICT    時間: 2025-3-23 15:06
1865-0929 bmissions. They were organized in topical sections on?artificial intelligence and machine learning; networking and communications..978-3-031-40563-1978-3-031-40564-8Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 上腭    時間: 2025-3-23 21:43

作者: 固執(zhí)點好    時間: 2025-3-23 22:15

作者: Freeze    時間: 2025-3-24 06:26
https://doi.org/10.1007/978-3-031-40564-8artificial intelligence; communication channels (information theory); communication systems; computer h
作者: 露天歷史劇    時間: 2025-3-24 06:40
978-3-031-40563-1The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
作者: 種類    時間: 2025-3-24 12:05
https://doi.org/10.1007/978-3-540-30033-5due to co-channel interference (CCI) in time selective fading channel. To suppress CCI effects various signal detection techniques are investigated including diagonalized zero forcing detection (DZFD), successive interference cancellation (SIC), decision feedback detection (DFD), List-SIC, and maxim
作者: 占卜者    時間: 2025-3-24 18:39

作者: dragon    時間: 2025-3-24 23:00

作者: Integrate    時間: 2025-3-25 02:20
https://doi.org/10.1007/978-3-540-30033-5 Cost-based, chaining, and clustering models are just a few of the many that inform the creation of routing protocols. It can be challenging to keep track of all of the nodes in Wireless Sensor Networks because there are so many of them. The optimal strategy is to form a cluster out of several nodes
作者: CAB    時間: 2025-3-25 03:30
https://doi.org/10.1007/978-3-540-30033-5 target in WSN. Compared to other prediction methods, the efficiency of the TDNN is better. By considering target velocity and geometrical shapes, lost target recovery can be improved further in terms of energy efficiency. Performance of different methods based on circular and contour geometrical sh
作者: Compass    時間: 2025-3-25 08:12

作者: CHIP    時間: 2025-3-25 14:38

作者: transient-pain    時間: 2025-3-25 17:28

作者: agitate    時間: 2025-3-25 23:23
https://doi.org/10.1007/b137708eased and network life can be prolonged via the process of clustering. To reduce the network’s power consumption and increase its lifespan, we used a new clustering technique in this work. Centralized cluster formation and decentralized cluster heads form the basis of this stage of clustering. Clust
作者: 外來    時間: 2025-3-26 02:30
https://doi.org/10.1007/b137708omic advantages, particularly in catastrophic weather event scenarios and vital military operations. The utilization of Non-Orthogonal Multiple Access(NOMA) has been efficiently done to enhance channel utilization. Multiple users transmit information using similar frequency bands. This technique is
作者: Triglyceride    時間: 2025-3-26 04:31
https://doi.org/10.1007/b137708s are proposed for this task, and each of these models showcases non-uniform performance & complexity levels when applied to real-time scenarios. To overcome such issues, this text proposes the design of a deep-learning-based bioinspired model that assists in improving the feature extraction capabil
作者: Tdd526    時間: 2025-3-26 10:35

作者: Hallmark    時間: 2025-3-26 13:14

作者: Inscrutable    時間: 2025-3-26 20:04

作者: 同步左右    時間: 2025-3-27 00:39
https://doi.org/10.1007/b137708nes, ecommerce sites and download the video or photos. Various web browsers are available in the market for this purpose but Google chrome, Mozilla Firefox and Brave are the well-known browser application. These web browsers might be use for normal internet access also use to committee the crime. In
作者: 清澈    時間: 2025-3-27 04:52

作者: CRAB    時間: 2025-3-27 05:29

作者: Forehead-Lift    時間: 2025-3-27 11:47

作者: 偏狂癥    時間: 2025-3-27 13:36
https://doi.org/10.1007/b137708d solution. However, the electromagnetic spectrum is becoming increasingly congested, making this a more and more challenging task. In this paper, we present a standard LMS algorithm that can detect taps based on NLMS and active detection. The proposed scheme takes advantage of refining the converge
作者: Overdose    時間: 2025-3-27 19:52
Communications in Computer and Information Sciencehttp://image.papertrans.cn/c/image/234751.jpg
作者: Charitable    時間: 2025-3-27 23:39

作者: inflame    時間: 2025-3-28 05:13
https://doi.org/10.1007/978-3-540-30033-5ion is carried out for proposed OIDF method and various standard conventional signal detection methods based on complexity and bit error rate (BER). The results show that BER performance of OIDF method nearly approaches to ML method with substantial reduction in complexity.
作者: ciliary-body    時間: 2025-3-28 07:58

作者: 血統(tǒng)    時間: 2025-3-28 14:19

作者: 材料等    時間: 2025-3-28 14:52
https://doi.org/10.1007/978-3-540-30033-5he cluster’s leader. It is the responsibility of the cluster head to collect data from each of the individual nodes and then transmit that data to the home station. The ACO-DEEC protocol chooses a leader for the cluster by putting a probability rule that is based on the parameters of the distance be
作者: ANTI    時間: 2025-3-28 20:41

作者: 波動    時間: 2025-3-28 23:45

作者: 外表讀作    時間: 2025-3-29 04:42
https://doi.org/10.1007/b137708n problem, but also significantly lengthens the lifespan of the network. The results demonstrate the following ways in which the suggested method lessens the burden on network resources. It increases network lifetime by 301%, 131%, and 122%, decreases energy consumption by 20.53%, 6.14%, and 5%, and
作者: 一罵死割除    時間: 2025-3-29 08:45

作者: Ancestor    時間: 2025-3-29 15:17
https://doi.org/10.1007/b137708ata-rate control, the model is capable of performing temporal learning for the identification of multiple disease progressions. These progressions are also evaluated via the 1D CNN model, which can be tuned for heterogeneous disease types. Due to the integration of these methods, the proposed model
作者: prosperity    時間: 2025-3-29 15:57
https://doi.org/10.1007/b137708s. Malwares that are polymorphic and metamorphic, both of which have efficient mutational features, are largely responsible for the exponential increase in the variability of malwares. The efficient categorization of the malware samples is a crucial and challenging task. This study mainly focuses on
作者: Abduct    時間: 2025-3-29 23:29
https://doi.org/10.1007/b137708performs antenna without meta surface by 4%, 6.7 dBi for performance in gain and 29% decrease in the patch’s size while making utilization of a meta-surface. Applications for S-band Radar using this antenna include wide range of radar systems such as weather, surface ship and space borne type radar.
作者: 圓桶    時間: 2025-3-30 03:31
https://doi.org/10.1007/b137708yzed. For simulation, open-source Network Simulator NS3 is used which takes lesser time to set up the network, provides a precise level of simulation for wireless networks, and minutely mimics real-world wireless networks scenarios. Simulations show that for a single antenna of 5?GHz band at 80?MHz
作者: affect    時間: 2025-3-30 06:29
https://doi.org/10.1007/b137708chniques cause a reduction in the probability of detection and involve a complex process to sense the spectrum. To overcome these drawbacks, the optimal signal is constructed from the original signal, and this, the spectrum is sensed. This process provides better results in terms of the probability
作者: Diverticulitis    時間: 2025-3-30 08:25
https://doi.org/10.1007/b137708 ns-3, aquasim-ng2, and obtained results among the three algorithms, reflect that the cross-layer approach in CARP enables less energy usage as compared to VBF and DBR.?Based on this finding, we proposes a new model of CARP protocol in which data packet transmission is initiated only when environmen
作者: Dislocation    時間: 2025-3-30 12:53
,An Efficient Signal Detection Technique for?STBC-OFDM in?Fast Fading Channel,ion is carried out for proposed OIDF method and various standard conventional signal detection methods based on complexity and bit error rate (BER). The results show that BER performance of OIDF method nearly approaches to ML method with substantial reduction in complexity.
作者: 侵略主義    時間: 2025-3-30 18:26

作者: 案發(fā)地點    時間: 2025-3-30 22:38
Relational Model and Improvised DSR Assisted Framework for Secure Wireless Communication, a proper security solution. The proposed work presents a novel idea of security towards resisting adversarial impact of selfish node and routing mis-behavior present in wireless communications environment. The 1.-framework introduces a retaliation model where a novel role of node called as an auxil
作者: CHARM    時間: 2025-3-31 00:59
DEEC Protocol with ACO Based Cluster Head Selection in Wireless Sensor Network,he cluster’s leader. It is the responsibility of the cluster head to collect data from each of the individual nodes and then transmit that data to the home station. The ACO-DEEC protocol chooses a leader for the cluster by putting a probability rule that is based on the parameters of the distance be
作者: 莊嚴(yán)    時間: 2025-3-31 08:00

作者: rheumatism    時間: 2025-3-31 12:21
Improvement of Network Protocol and Analysis of Security Using Aspect of Cryptography,curity. The origin of quantum cryptography explained in the Heisenberg uncertainty principle, which tells that the certain pairs of physical channels are related in a way that measuring one property restricts the third user from knowing the value of the other at the same time. In our current researc
作者: agonist    時間: 2025-3-31 14:51

作者: Servile    時間: 2025-3-31 20:25
Physical Layer Security Optimisation for NOMA Based UAV Communication for Optimal Resource Allocati are accessing the same resources. To circumvent such issues much emphasis has been given to the physical layer. The popular matrices that are used for such a system are the probability of a link going down and the likelihood of a communication interception. This study examines the practicality of p
作者: 使人煩燥    時間: 2025-4-1 00:21
DBFEH: Design of a Deep-Learning-Based Bioinspired Model to Improve Feature Extraction Capabilitiesata-rate control, the model is capable of performing temporal learning for the identification of multiple disease progressions. These progressions are also evaluated via the 1D CNN model, which can be tuned for heterogeneous disease types. Due to the integration of these methods, the proposed model
作者: endocardium    時間: 2025-4-1 05:31

作者: Breach    時間: 2025-4-1 08:59
Design and Analysis of Wide-Band Planar Antenna Using Meta-material for S-Band Applications,performs antenna without meta surface by 4%, 6.7 dBi for performance in gain and 29% decrease in the patch’s size while making utilization of a meta-surface. Applications for S-band Radar using this antenna include wide range of radar systems such as weather, surface ship and space borne type radar.
作者: 抗體    時間: 2025-4-1 14:13





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
元朗区| 乌恰县| 唐河县| 绥滨县| 和平区| 宽甸| 东至县| 河池市| 左云县| 贵溪市| 宁化县| 和平区| 广安市| 淮滨县| 安溪县| 和硕县| 海林市| 湖北省| 桓仁| 玉环县| 巴林右旗| 莫力| 牡丹江市| 陆河县| 浮山县| 微山县| 英吉沙县| 长寿区| 永吉县| 庄浪县| 鹤山市| 三穗县| 垣曲县| 玉林市| 连南| 无为县| 亚东县| 兰州市| 呼伦贝尔市| 威信县| 大荔县|