派博傳思國際中心

標(biāo)題: Titlebook: Computing and Network Sustainability; Proceedings of IRSCN Sheng-Lung Peng,Nilanjan Dey,Mahesh Bundele Conference proceedings 2019 Springer [打印本頁]

作者: Strategy    時間: 2025-3-21 19:40
書目名稱Computing and Network Sustainability影響因子(影響力)




書目名稱Computing and Network Sustainability影響因子(影響力)學(xué)科排名




書目名稱Computing and Network Sustainability網(wǎng)絡(luò)公開度




書目名稱Computing and Network Sustainability網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computing and Network Sustainability被引頻次




書目名稱Computing and Network Sustainability被引頻次學(xué)科排名




書目名稱Computing and Network Sustainability年度引用




書目名稱Computing and Network Sustainability年度引用學(xué)科排名




書目名稱Computing and Network Sustainability讀者反饋




書目名稱Computing and Network Sustainability讀者反饋學(xué)科排名





作者: 失望昨天    時間: 2025-3-21 23:49

作者: 死亡    時間: 2025-3-22 03:03
Adequacy Conditions and Failed Theoriesns, who possess respective expertise and are well aware of the domain jargons. The main objective of such systems is to get rid of the time-consuming, laborious manual process and to provide patent analysts a better way for classifying patent documents. Also it helps in better management, maintenanc
作者: Hdl348    時間: 2025-3-22 07:50

作者: 稱贊    時間: 2025-3-22 11:40

作者: 引起痛苦    時間: 2025-3-22 13:31

作者: 引起痛苦    時間: 2025-3-22 19:17
Classifier Ensembling: Dataset Learning Using Bagging and Boosting,f tasks. In the following work, a classification technique is explained which considers the ensemble of classifiers for bagging and for boosting separately, where decision tree is used as the classifier for bagging and for boosting artificial neural network (ANN) is being used as the classifier. For
作者: organic-matrix    時間: 2025-3-22 21:35
Exploration and Implementation of Classification Algorithms for Patent Classification,ns, who possess respective expertise and are well aware of the domain jargons. The main objective of such systems is to get rid of the time-consuming, laborious manual process and to provide patent analysts a better way for classifying patent documents. Also it helps in better management, maintenanc
作者: 減少    時間: 2025-3-23 03:41

作者: Eclampsia    時間: 2025-3-23 09:36

作者: 減少    時間: 2025-3-23 11:33
Snaring Cyber Attacks on IoT Devices with Honeynet,s things which interconnect uniquely in already prevailing Internet infrastructure called as the Internet of things. Due to wider implementation of IoT, devices are prone to cyber attacks. To beat those attacks, concept of a Honeypot is implemented in IoT. The Honeypot is the security resource frame
作者: 怕失去錢    時間: 2025-3-23 16:49

作者: 無目標(biāo)    時間: 2025-3-23 21:55
Evaluation of e-NAM Adoption: A Case of ,, Gujarat,gricultural markets. e-NAM aims to reduce information asymmetry between buyers and sellers and facilitate the provision of real-time price discovery. Through a pilot study of the project in ., Gujarat, the authors intend to bring out the issues and challenges in adoption and implementation by variou
作者: CHURL    時間: 2025-3-24 01:33
A New Technique for Extrinsic Text Summarization,t essential points of the primary text. The present work is one new type of extrinsic technique of summarization, which finds an exemplary subset of the original sentence set, which possesses the precise erudition of the primary text.
作者: Noctambulant    時間: 2025-3-24 05:43
Dynamic Provisioning of Cloud Resources Based on Workload Prediction,vides various services like software as a service (SAAS), infrastructure as a service (IAAS) or anything as a service (XAAS) that is required to develop and deploy any business application. These cloud services are provided as virtual machines (VM) that can handle the end-user’s requirements. The cl
作者: 隨意    時間: 2025-3-24 09:35

作者: periodontitis    時間: 2025-3-24 12:13
The Role of Social Factors in Education: A Case Study in Social Network Perspective,ting and transmitting knowledge depends on so many social factors. Social network analysis is a growing body of research with a great deal of opportunities. The study of social network is a multidisciplinary area involving social, mathematical, statistical and computer sciences. The idea is to map s
作者: 散步    時間: 2025-3-24 16:29
Investigating the Effect of Compression and Decompression in Video Using Fractal Technique,and large amount of bandwidth for the transmission of video. The largest part of multimedia is video. There is upsurge in demand of compressed data due to excessive usage of multimedia applications on Internet. Hence in success of multimedia data, video compression and decompression are majorly used
作者: 清唱劇    時間: 2025-3-24 19:36
Classifier Ensembling: Dataset Learning Using Bagging and Boosting,ing have been projected such as association rules, decision trees, neural networks, etc. from many years it takes its position in center. The efficiency of the real time or artificial is being enhanced using certain data mining techniques like bagging and boosting and AdaBoost by which the accuracy
作者: 真實的人    時間: 2025-3-25 00:51

作者: 侵略    時間: 2025-3-25 06:52
Predicting Diabetic Foot Maturing Through Evolutionary Computation,etes, rises to values never seen before. It is envisaging the development of an . plug-into extract relevant feature from diabetic foot images and, in conjunction with the patient’s clinical and lifelong data, a computational system to predict and evaluate its severity. The applied problem-solving m
作者: 脫離    時間: 2025-3-25 10:13
Exploration and Implementation of Classification Algorithms for Patent Classification,g techniques to a great extent. Patent mining consists of various tasks such as retrieval of patent, classification, patent valuation, patent visualization and detecting infringements. Among these, patent classification is an important task. It deals with the classification of patents into various c
作者: beta-cells    時間: 2025-3-25 15:33

作者: 得體    時間: 2025-3-25 15:54
SDN-Based Fast Handover Approach to Improve the QoS of Video Streaming over Wi-Fi Networks,aming over Wi-Fi networks. During the handover of mobile stations, two major bottleneck are experienced towards providing fast transition from one access point to another. These bottlenecks are scan latency and authentication latency. These two add up and result in a high handover latency which is u
作者: 不安    時間: 2025-3-25 20:58
Towards DHT-Based P2P Resource Sharing Over Hybrid Infrastructure of Wireless Mesh Network and Mobie the university campuses, railway stations, airports and shopping malls, etc. are facing the challenge of providing uninterrupted Internet connectivity. Wireless mesh network (WMN) presents themself as an elegant alternative for this purpose. These networks exhibit self-organization, self-healing a
作者: 鑒賞家    時間: 2025-3-26 00:07

作者: compel    時間: 2025-3-26 06:34

作者: 拍下盜公款    時間: 2025-3-26 08:31

作者: anaerobic    時間: 2025-3-26 13:53
Reservation Policy for Multi-Sharing Resources in Heterogeneous Cloud User,viders are offering outstanding reservation and on-demand plans with restrictions. It restricts sharing of multiple resources with multiple users. There was no provision for user coalition and no option was provided to carry forward the unused resources. In this paper, the improvised model reservati
作者: 破裂    時間: 2025-3-26 17:32

作者: 粗魯性質(zhì)    時間: 2025-3-26 23:50

作者: Opponent    時間: 2025-3-27 03:47
Chirurgische Therapie des Bronchialkarzinomsgricultural markets. e-NAM aims to reduce information asymmetry between buyers and sellers and facilitate the provision of real-time price discovery. Through a pilot study of the project in ., Gujarat, the authors intend to bring out the issues and challenges in adoption and implementation by variou
作者: ADORE    時間: 2025-3-27 08:04

作者: Anhydrous    時間: 2025-3-27 10:19

作者: 漸變    時間: 2025-3-27 17:21
?tiologie des Bronchialkarzinomslps in taking model-based data-driven decisions. The prelude to any successful analytical model building and implementation phase is a properly conducted initial data analysis stage. IDA encompasses laborious tasks of data cleansing: missing value treatment, outlier detection, checking the veracity
作者: 易于交談    時間: 2025-3-27 20:43
K.-M. Müller,A. Fisseler-Eckhoffting and transmitting knowledge depends on so many social factors. Social network analysis is a growing body of research with a great deal of opportunities. The study of social network is a multidisciplinary area involving social, mathematical, statistical and computer sciences. The idea is to map s
作者: 發(fā)炎    時間: 2025-3-27 22:36

作者: 壓倒性勝利    時間: 2025-3-28 02:09
K.-M. Müller,A. Fisseler-Eckhoffing have been projected such as association rules, decision trees, neural networks, etc. from many years it takes its position in center. The efficiency of the real time or artificial is being enhanced using certain data mining techniques like bagging and boosting and AdaBoost by which the accuracy
作者: 淺灘    時間: 2025-3-28 07:52

作者: MUT    時間: 2025-3-28 13:11

作者: cleaver    時間: 2025-3-28 15:24
Adequacy Conditions and Failed Theoriesg techniques to a great extent. Patent mining consists of various tasks such as retrieval of patent, classification, patent valuation, patent visualization and detecting infringements. Among these, patent classification is an important task. It deals with the classification of patents into various c
作者: LEER    時間: 2025-3-28 18:44
https://doi.org/10.1007/1-4020-5085-2cks. It is collection of tiny-sized sensor nodes. The reason behind these attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN (Butani et al. in Int J Comput Appl IJCA 95(3):32–39, 2014, [.])
作者: Innocence    時間: 2025-3-29 01:53
The Case for Object-Dependent Thoughtsaming over Wi-Fi networks. During the handover of mobile stations, two major bottleneck are experienced towards providing fast transition from one access point to another. These bottlenecks are scan latency and authentication latency. These two add up and result in a high handover latency which is u
作者: 使習(xí)慣于    時間: 2025-3-29 05:57

作者: Arroyo    時間: 2025-3-29 08:14

作者: 擴大    時間: 2025-3-29 12:39

作者: pericardium    時間: 2025-3-29 18:39

作者: QUAIL    時間: 2025-3-29 21:53

作者: Arresting    時間: 2025-3-30 01:26

作者: dandruff    時間: 2025-3-30 07:44

作者: Flustered    時間: 2025-3-30 11:19

作者: oracle    時間: 2025-3-30 13:09

作者: Peristalsis    時間: 2025-3-30 19:42
Springer Nature Singapore Pte Ltd. 2019
作者: 跳動    時間: 2025-3-30 22:46
Sheng-Lung Peng,Nilanjan Dey,Mahesh BundelePresents high quality peer-reviewed research papers from young researchers.Discusses the latest advances in computing and network sustainability.Presents a variety of applications of sustainable metho
作者: 窩轉(zhuǎn)脊椎動物    時間: 2025-3-31 04:28

作者: 演繹    時間: 2025-3-31 06:32

作者: 不透明    時間: 2025-3-31 11:59

作者: Eosinophils    時間: 2025-3-31 14:18

作者: 附錄    時間: 2025-3-31 18:14

作者: Basal-Ganglia    時間: 2025-4-1 00:45
2367-3370 lity.Presents a variety of applications of sustainable metho.This book offers a compilation of technical papers presented at the International Research Symposium on Computing and Network Sustainability (IRSCNS 2018) held in Goa, India on 30–31st August 2018. It covers areas such as sustainable compu
作者: GRAZE    時間: 2025-4-1 05:33
S. Cafarotti,A. Condoluci,R. Inderbitzirfections in an image caused by noise. Morphology finds its application in the representation of shape of a region, describing skeletons, surface deviation analysis, and other surface metrological applications. Morphological operations are performed using erosion and dilation algorithms, and the results are verified using MATLAB R2013a.




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
偏关县| 崇阳县| 西宁市| 楚雄市| 盐源县| 新营市| 伊宁县| 维西| 抚松县| 应城市| 宁德市| 溧水县| 宜兰市| 邹平县| 唐山市| 呈贡县| 正阳县| 林州市| 湘潭县| 德保县| 吉林省| 平昌县| 定结县| 鄂州市| 昌宁县| 怀安县| 嘉鱼县| 清新县| 垣曲县| 西城区| 佛教| 蚌埠市| 孟州市| 永昌县| 屏边| 吉林省| 重庆市| 平定县| 松阳县| 瑞金市| 正宁县|