派博傳思國(guó)際中心

標(biāo)題: Titlebook: Computing Science, Communication and Security; Third International Nirbhay Chaubey,Sabu M. Thampi,Noor Zaman Jhanjhi Conference proceeding [打印本頁(yè)]

作者: Suture    時(shí)間: 2025-3-21 16:21
書目名稱Computing Science, Communication and Security影響因子(影響力)




書目名稱Computing Science, Communication and Security影響因子(影響力)學(xué)科排名




書目名稱Computing Science, Communication and Security網(wǎng)絡(luò)公開度




書目名稱Computing Science, Communication and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computing Science, Communication and Security被引頻次




書目名稱Computing Science, Communication and Security被引頻次學(xué)科排名




書目名稱Computing Science, Communication and Security年度引用




書目名稱Computing Science, Communication and Security年度引用學(xué)科排名




書目名稱Computing Science, Communication and Security讀者反饋




書目名稱Computing Science, Communication and Security讀者反饋學(xué)科排名





作者: 類型    時(shí)間: 2025-3-21 20:52
Application of Forensic Audio-Video Steganography Technique to Improve Security, Robustness, and Au data embedding approaches does not provide information security, authentication and its robustness of secret data. To avoids these limitations this paper uses the Forensic Exploiting Modification Direction (FEMD) algorithm for audio video steganography to increase data security, authentication and
作者: Archipelago    時(shí)間: 2025-3-22 03:13
An Efficient Cluster Based Energy Routing Protocol (E-CBERP) for Wireless Body Area Networks Using e design of WBAN and due to its fundamental nature, routing of patients’ critical data to the server in an indoor hospital environment brought challenges. In this paper, an effective cluster-based energy routing protocol (E-CBERP) which uses the ANT colony soft computing technique, is proposed to im
作者: ligature    時(shí)間: 2025-3-22 04:58
,Ortho Image Mosaicing and?Object Identification of?UAV Data,ract useful information from them. This paper illustrates a comprehensive python-based algorithm to stitch multiple images gathered from a single UAV and then perform a landscape scan to identify features and other non-homogeneities in the ortho-mosaiced image. The methodology introduced for image s
作者: notice    時(shí)間: 2025-3-22 12:05

作者: Nuance    時(shí)間: 2025-3-22 16:30
,Blocking Estimation Using Optimal Guard Channel Policy in?GSM 900 System,onnect to a mobile network unless voice support is available, so enabling this is a must. Voice service requires end-to-end 5G network support to enable the high quality voice service experience for mobile devices. So, we need to consider the whole network chain with IP Multimedia Subsystem (IMS), 5
作者: Nuance    時(shí)間: 2025-3-22 18:26
Systematic Review on Various Techniques of Android Malware Detection,usiness and office work can be operated by mobile phone and the demand for online classes demand for all class of students have become a compulsion without any alternate due to the COVID-19 pandemic. Android is considered as the most prevailing and used operating system for the mobile phone on this
作者: 陪審團(tuán)每個(gè)人    時(shí)間: 2025-3-22 23:51
Adaptive Rider Grey Wolf Optimization Enabled Pilot-Design for Channel Estimation in Cognitive Rading unauthorized Secondary Users (SUs) functions within service limit of authorized Primary Users (PUs), while creating bearable intervention to the PUs. Typically, secondary network is constructed as Half-Duplex (HD) and are carried out orthogonally in frequency or time domain. CR has been considere
作者: falsehood    時(shí)間: 2025-3-23 02:24
To Identify Malware Using Machine Learning Algorithms,may be broken by various attackers by injecting malware to another device through various ways such as malicious links generally. Malware is like software that may harm the system of the user. The most commonly used malware nowadays is ransomware coverts files or any data to unused form by encryptio
作者: 土坯    時(shí)間: 2025-3-23 08:06

作者: Acupressure    時(shí)間: 2025-3-23 11:08

作者: 不可磨滅    時(shí)間: 2025-3-23 16:13
,One-to-One Matching for?Cooperative Resource Sharing and?Communication in?CRNs,rum scarcity problem by sharing scare spectrum resources (bandwidth, access time) among cooperative users and thus improves spectrum efficiency. In this paper, a partner-assignment scheme for cooperative communication is proposed for multiple primary users (PUs) and secondary users (SUs) Cognitive R
作者: 赤字    時(shí)間: 2025-3-23 20:06
,Sandbox Environment for?Real Time Malware Analysis of?IoT Devices,f Service (DDoS), Eavesdropping, Privilege Escalation, etc. With a lack of research in IoT security, there are lake solutions to analyze the advanced malware in a secure environment to understand IoT malware behavior. This paper has proposed a sandbox environment concept model that analyses malware,
作者: Annotate    時(shí)間: 2025-3-24 01:41

作者: 一回合    時(shí)間: 2025-3-24 05:56
Traffic Flow Prediction Using Deep Learning Techniques,lop a smart city, data related to traffic flow is essential. Many Intelligent Transportation Systems now employ the ongoing technology to predict the traffic flow, reduce road accidents, and anticipate vehicle speed, and so on. However, the prediction that considers some other factors as environment
作者: 感情脆弱    時(shí)間: 2025-3-24 08:59
Meta Heuristic Backtracking Algorithm for Virtual Machine Placement in Cloud Computing Migration,puting served as a backbone for almost all industries across the globe by its humongous computing facility. This necessitates numerous algorithms for the best usage of cloud resources namely virtual machines (VM). One such technique is our proposed meta heuristic Backtracking algorithm for finding a
作者: Conscientious    時(shí)間: 2025-3-24 12:12
,Achieving Energy Efficiency in?Life-Logging Applications of?Internet of?Things Using Data Compressiof a human. These devices have a combination of sensors that capture the respective biosignals and report the recorded data to the edge device (usually a mobile phone) which in turn acts as a primary communicator delivering the data over cloud for storage and future analysis. As this huge amount of
作者: 一再煩擾    時(shí)間: 2025-3-24 15:14
Cab Fare Prediction Using Machine Learning,mand, many companies have sprung up to offer cab rides to users. However, few companies charge higher fares for the same route. Therefore, customers have to pay an unwanted high amount even though the prices should be lower. The main objective is to estimate travel costs before booking a cab to have
作者: ear-canal    時(shí)間: 2025-3-24 22:43

作者: 排名真古怪    時(shí)間: 2025-3-25 01:56

作者: Basilar-Artery    時(shí)間: 2025-3-25 05:33

作者: 紡織品    時(shí)間: 2025-3-25 09:11

作者: 脊椎動(dòng)物    時(shí)間: 2025-3-25 12:15

作者: 制定法律    時(shí)間: 2025-3-25 17:34

作者: Promotion    時(shí)間: 2025-3-25 20:47
https://doi.org/10.1007/b137708mation to develop a smart environment around us. The proliferation of rich cloud services has introduced an efficient computing technique, edge computing, where processing the IoT data has been carried out at close to the source or edge of the network. Edge computing is advantageous for large volume
作者: 指派    時(shí)間: 2025-3-26 01:40

作者: GLUE    時(shí)間: 2025-3-26 06:21

作者: 歸功于    時(shí)間: 2025-3-26 12:25

作者: 炸壞    時(shí)間: 2025-3-26 15:24

作者: negligence    時(shí)間: 2025-3-26 19:29

作者: 語(yǔ)源學(xué)    時(shí)間: 2025-3-26 21:56
https://doi.org/10.1007/b137708usiness and office work can be operated by mobile phone and the demand for online classes demand for all class of students have become a compulsion without any alternate due to the COVID-19 pandemic. Android is considered as the most prevailing and used operating system for the mobile phone on this
作者: expository    時(shí)間: 2025-3-27 01:44

作者: 冥界三河    時(shí)間: 2025-3-27 05:54
https://doi.org/10.1007/b137482may be broken by various attackers by injecting malware to another device through various ways such as malicious links generally. Malware is like software that may harm the system of the user. The most commonly used malware nowadays is ransomware coverts files or any data to unused form by encryptio
作者: Hdl348    時(shí)間: 2025-3-27 10:41

作者: Veneer    時(shí)間: 2025-3-27 13:56
https://doi.org/10.1007/b137482. Sensor contains small battery that is difficult to rechargeable or replacement. So, the challenges are improving the prolong life time of sensor. This paper, presents a k-mean clustering algorithm to enhance energy saving (ES) and prolong life time of sensor node in term of the packet of L-bit tow
作者: 漂亮    時(shí)間: 2025-3-27 18:54
https://doi.org/10.1007/b137482rum scarcity problem by sharing scare spectrum resources (bandwidth, access time) among cooperative users and thus improves spectrum efficiency. In this paper, a partner-assignment scheme for cooperative communication is proposed for multiple primary users (PUs) and secondary users (SUs) Cognitive R
作者: meretricious    時(shí)間: 2025-3-27 22:44
https://doi.org/10.1007/b137482f Service (DDoS), Eavesdropping, Privilege Escalation, etc. With a lack of research in IoT security, there are lake solutions to analyze the advanced malware in a secure environment to understand IoT malware behavior. This paper has proposed a sandbox environment concept model that analyses malware,
作者: MONY    時(shí)間: 2025-3-28 05:08
https://doi.org/10.1007/b137482 rates, more reliability and greater capacity, the healthcare system can provide remote services for patients. For remote monitoring of a patient’s health, real time data delivery is a must. The crucial requirement of the current time in the healthcare industry is the security of the patient’s sensi
作者: echnic    時(shí)間: 2025-3-28 08:28

作者: AGONY    時(shí)間: 2025-3-28 14:09
https://doi.org/10.1007/b137482puting served as a backbone for almost all industries across the globe by its humongous computing facility. This necessitates numerous algorithms for the best usage of cloud resources namely virtual machines (VM). One such technique is our proposed meta heuristic Backtracking algorithm for finding a
作者: 令人發(fā)膩    時(shí)間: 2025-3-28 17:17
https://doi.org/10.1007/b137482of a human. These devices have a combination of sensors that capture the respective biosignals and report the recorded data to the edge device (usually a mobile phone) which in turn acts as a primary communicator delivering the data over cloud for storage and future analysis. As this huge amount of
作者: Subdue    時(shí)間: 2025-3-28 21:25
https://doi.org/10.1007/b137482mand, many companies have sprung up to offer cab rides to users. However, few companies charge higher fares for the same route. Therefore, customers have to pay an unwanted high amount even though the prices should be lower. The main objective is to estimate travel costs before booking a cab to have
作者: 揮舞    時(shí)間: 2025-3-28 23:24

作者: Liberate    時(shí)間: 2025-3-29 04:34
Conference proceedings 2022 in Gandhinagar, India, in February 2022. Due to the COVID-19 pandemic the conference was held virtually.?.The 22 full papers were thoroughly reveiwed and selected from 143 submissions. The papers present?ideas, and research results on the aspects of computing science, network communication, and sec
作者: 防銹    時(shí)間: 2025-3-29 08:46

作者: Mortar    時(shí)間: 2025-3-29 11:56
An Efficient Cluster Based Energy Routing Protocol (E-CBERP) for Wireless Body Area Networks Using discrete-event network simulator. On comparing the performance of our proposed E-CBERP protocol with the traditional existing routing algorithms, the acquired results verify that E-CBERP gives better performance with respect to the Network Lifetime, Energy Consumption, Network Throughput, and Latency.
作者: conference    時(shí)間: 2025-3-29 18:30
To Identify Malware Using Machine Learning Algorithms,n and demands money for regaining original data. So we need a method to detect it to stop it to work in any condition like updating its signature etc. We propose a method to identify different types of malwares including ransomware with the use of API call data. We achieve the highest accuracy of 0.9636.
作者: MELON    時(shí)間: 2025-3-29 23:45

作者: inhumane    時(shí)間: 2025-3-30 02:39
1865-0929 y reveiwed and selected from 143 submissions. The papers present?ideas, and research results on the aspects of computing science, network communication, and security..978-3-031-10550-0978-3-031-10551-7Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: Cardioplegia    時(shí)間: 2025-3-30 05:26

作者: 擁護(hù)    時(shí)間: 2025-3-30 10:28

作者: STIT    時(shí)間: 2025-3-30 16:08
1865-0929 2022, held in Gandhinagar, India, in February 2022. Due to the COVID-19 pandemic the conference was held virtually.?.The 22 full papers were thoroughly reveiwed and selected from 143 submissions. The papers present?ideas, and research results on the aspects of computing science, network communicatio
作者: concise    時(shí)間: 2025-3-30 18:36

作者: judiciousness    時(shí)間: 2025-3-30 22:52
https://doi.org/10.1007/b137708any distortion. The observed and verified software results confirm that the implemented security model provides better authentication, imperceptibility, robustness, CC (Concealed Capacity), and CR (Concealed Rate) as compared to any existing EMD methods.
作者: Obscure    時(shí)間: 2025-3-31 01:00

作者: 責(zé)任    時(shí)間: 2025-3-31 07:52

作者: BIAS    時(shí)間: 2025-3-31 10:51

作者: 扔掉掐死你    時(shí)間: 2025-3-31 17:19
Development of Smart Sensor for IoT Based Environmental Data Analysis Through Edge Computing,loud through Raspberry Pi based MQTT broker and analyzing the data through Edge Server and re-duce Publisher-Subscriber (pub-sub) costs by approximately 50% for Google Cloud Platform (GCP) by reducing telemetry data.
作者: Ancestor    時(shí)間: 2025-3-31 18:03

作者: 無(wú)價(jià)值    時(shí)間: 2025-3-31 23:47

作者: Diskectomy    時(shí)間: 2025-4-1 05:16
,Sandbox Environment for?Real Time Malware Analysis of?IoT Devices, the sandbox environment generates the report. Static analysis is performed by collecting information from shared libraries, ELF, and other binary files using the Convolutional Neural Networks model generated automated analysis report.
作者: 使顯得不重要    時(shí)間: 2025-4-1 08:55

作者: 不透氣    時(shí)間: 2025-4-1 10:19
,Ortho Image Mosaicing and?Object Identification of?UAV Data,g analyzed. The results indicate that the algorithm can extract meaningful information such as the location and intensity of features from the ortho-mosaiced image. The computational power required to implement this algorithm is extremely minimal, making it a good preliminary algorithm to use for mo




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
富阳市| 大厂| 礼泉县| 黄冈市| 靖远县| 巫山县| 蒙城县| 阿鲁科尔沁旗| 莱州市| 泾源县| 廉江市| 湖州市| 乌兰察布市| 施秉县| 深水埗区| 天津市| 成武县| 华蓥市| 西和县| 奉化市| 南木林县| 曲阜市| 荔波县| 花莲县| 吐鲁番市| 阿瓦提县| 九江县| 象山县| 八宿县| 翁牛特旗| 武隆县| 珠海市| 绩溪县| 冕宁县| 玉溪市| 阿拉善右旗| 肃南| 马尔康县| 大城县| 柯坪县| 波密县|