標(biāo)題: Titlebook: Computing and Network Sustainability; Proceedings of IRSCN Sheng-Lung Peng,Nilanjan Dey,Mahesh Bundele Conference proceedings 2019 Springer [打印本頁] 作者: Strategy 時間: 2025-3-21 19:40
書目名稱Computing and Network Sustainability影響因子(影響力)
書目名稱Computing and Network Sustainability影響因子(影響力)學(xué)科排名
書目名稱Computing and Network Sustainability網(wǎng)絡(luò)公開度
書目名稱Computing and Network Sustainability網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computing and Network Sustainability被引頻次
書目名稱Computing and Network Sustainability被引頻次學(xué)科排名
書目名稱Computing and Network Sustainability年度引用
書目名稱Computing and Network Sustainability年度引用學(xué)科排名
書目名稱Computing and Network Sustainability讀者反饋
書目名稱Computing and Network Sustainability讀者反饋學(xué)科排名
作者: 失望昨天 時間: 2025-3-21 23:49 作者: 死亡 時間: 2025-3-22 03:03
Adequacy Conditions and Failed Theoriesns, who possess respective expertise and are well aware of the domain jargons. The main objective of such systems is to get rid of the time-consuming, laborious manual process and to provide patent analysts a better way for classifying patent documents. Also it helps in better management, maintenanc作者: Hdl348 時間: 2025-3-22 07:50 作者: 稱贊 時間: 2025-3-22 11:40 作者: 引起痛苦 時間: 2025-3-22 13:31 作者: 引起痛苦 時間: 2025-3-22 19:17
Classifier Ensembling: Dataset Learning Using Bagging and Boosting,f tasks. In the following work, a classification technique is explained which considers the ensemble of classifiers for bagging and for boosting separately, where decision tree is used as the classifier for bagging and for boosting artificial neural network (ANN) is being used as the classifier. For作者: organic-matrix 時間: 2025-3-22 21:35
Exploration and Implementation of Classification Algorithms for Patent Classification,ns, who possess respective expertise and are well aware of the domain jargons. The main objective of such systems is to get rid of the time-consuming, laborious manual process and to provide patent analysts a better way for classifying patent documents. Also it helps in better management, maintenanc作者: 減少 時間: 2025-3-23 03:41 作者: Eclampsia 時間: 2025-3-23 09:36 作者: 減少 時間: 2025-3-23 11:33
Snaring Cyber Attacks on IoT Devices with Honeynet,s things which interconnect uniquely in already prevailing Internet infrastructure called as the Internet of things. Due to wider implementation of IoT, devices are prone to cyber attacks. To beat those attacks, concept of a Honeypot is implemented in IoT. The Honeypot is the security resource frame作者: 怕失去錢 時間: 2025-3-23 16:49 作者: 無目標(biāo) 時間: 2025-3-23 21:55
Evaluation of e-NAM Adoption: A Case of ,, Gujarat,gricultural markets. e-NAM aims to reduce information asymmetry between buyers and sellers and facilitate the provision of real-time price discovery. Through a pilot study of the project in ., Gujarat, the authors intend to bring out the issues and challenges in adoption and implementation by variou作者: CHURL 時間: 2025-3-24 01:33
A New Technique for Extrinsic Text Summarization,t essential points of the primary text. The present work is one new type of extrinsic technique of summarization, which finds an exemplary subset of the original sentence set, which possesses the precise erudition of the primary text.作者: Noctambulant 時間: 2025-3-24 05:43
Dynamic Provisioning of Cloud Resources Based on Workload Prediction,vides various services like software as a service (SAAS), infrastructure as a service (IAAS) or anything as a service (XAAS) that is required to develop and deploy any business application. These cloud services are provided as virtual machines (VM) that can handle the end-user’s requirements. The cl作者: 隨意 時間: 2025-3-24 09:35 作者: periodontitis 時間: 2025-3-24 12:13
The Role of Social Factors in Education: A Case Study in Social Network Perspective,ting and transmitting knowledge depends on so many social factors. Social network analysis is a growing body of research with a great deal of opportunities. The study of social network is a multidisciplinary area involving social, mathematical, statistical and computer sciences. The idea is to map s作者: 散步 時間: 2025-3-24 16:29
Investigating the Effect of Compression and Decompression in Video Using Fractal Technique,and large amount of bandwidth for the transmission of video. The largest part of multimedia is video. There is upsurge in demand of compressed data due to excessive usage of multimedia applications on Internet. Hence in success of multimedia data, video compression and decompression are majorly used作者: 清唱劇 時間: 2025-3-24 19:36
Classifier Ensembling: Dataset Learning Using Bagging and Boosting,ing have been projected such as association rules, decision trees, neural networks, etc. from many years it takes its position in center. The efficiency of the real time or artificial is being enhanced using certain data mining techniques like bagging and boosting and AdaBoost by which the accuracy 作者: 真實的人 時間: 2025-3-25 00:51 作者: 侵略 時間: 2025-3-25 06:52
Predicting Diabetic Foot Maturing Through Evolutionary Computation,etes, rises to values never seen before. It is envisaging the development of an . plug-into extract relevant feature from diabetic foot images and, in conjunction with the patient’s clinical and lifelong data, a computational system to predict and evaluate its severity. The applied problem-solving m作者: 脫離 時間: 2025-3-25 10:13
Exploration and Implementation of Classification Algorithms for Patent Classification,g techniques to a great extent. Patent mining consists of various tasks such as retrieval of patent, classification, patent valuation, patent visualization and detecting infringements. Among these, patent classification is an important task. It deals with the classification of patents into various c作者: beta-cells 時間: 2025-3-25 15:33 作者: 得體 時間: 2025-3-25 15:54
SDN-Based Fast Handover Approach to Improve the QoS of Video Streaming over Wi-Fi Networks,aming over Wi-Fi networks. During the handover of mobile stations, two major bottleneck are experienced towards providing fast transition from one access point to another. These bottlenecks are scan latency and authentication latency. These two add up and result in a high handover latency which is u作者: 不安 時間: 2025-3-25 20:58
Towards DHT-Based P2P Resource Sharing Over Hybrid Infrastructure of Wireless Mesh Network and Mobie the university campuses, railway stations, airports and shopping malls, etc. are facing the challenge of providing uninterrupted Internet connectivity. Wireless mesh network (WMN) presents themself as an elegant alternative for this purpose. These networks exhibit self-organization, self-healing a作者: 鑒賞家 時間: 2025-3-26 00:07 作者: compel 時間: 2025-3-26 06:34 作者: 拍下盜公款 時間: 2025-3-26 08:31 作者: anaerobic 時間: 2025-3-26 13:53
Reservation Policy for Multi-Sharing Resources in Heterogeneous Cloud User,viders are offering outstanding reservation and on-demand plans with restrictions. It restricts sharing of multiple resources with multiple users. There was no provision for user coalition and no option was provided to carry forward the unused resources. In this paper, the improvised model reservati作者: 破裂 時間: 2025-3-26 17:32 作者: 粗魯性質(zhì) 時間: 2025-3-26 23:50 作者: Opponent 時間: 2025-3-27 03:47
Chirurgische Therapie des Bronchialkarzinomsgricultural markets. e-NAM aims to reduce information asymmetry between buyers and sellers and facilitate the provision of real-time price discovery. Through a pilot study of the project in ., Gujarat, the authors intend to bring out the issues and challenges in adoption and implementation by variou作者: ADORE 時間: 2025-3-27 08:04 作者: Anhydrous 時間: 2025-3-27 10:19 作者: 漸變 時間: 2025-3-27 17:21
?tiologie des Bronchialkarzinomslps in taking model-based data-driven decisions. The prelude to any successful analytical model building and implementation phase is a properly conducted initial data analysis stage. IDA encompasses laborious tasks of data cleansing: missing value treatment, outlier detection, checking the veracity 作者: 易于交談 時間: 2025-3-27 20:43
K.-M. Müller,A. Fisseler-Eckhoffting and transmitting knowledge depends on so many social factors. Social network analysis is a growing body of research with a great deal of opportunities. The study of social network is a multidisciplinary area involving social, mathematical, statistical and computer sciences. The idea is to map s作者: 發(fā)炎 時間: 2025-3-27 22:36 作者: 壓倒性勝利 時間: 2025-3-28 02:09
K.-M. Müller,A. Fisseler-Eckhoffing have been projected such as association rules, decision trees, neural networks, etc. from many years it takes its position in center. The efficiency of the real time or artificial is being enhanced using certain data mining techniques like bagging and boosting and AdaBoost by which the accuracy 作者: 淺灘 時間: 2025-3-28 07:52 作者: MUT 時間: 2025-3-28 13:11 作者: cleaver 時間: 2025-3-28 15:24
Adequacy Conditions and Failed Theoriesg techniques to a great extent. Patent mining consists of various tasks such as retrieval of patent, classification, patent valuation, patent visualization and detecting infringements. Among these, patent classification is an important task. It deals with the classification of patents into various c作者: LEER 時間: 2025-3-28 18:44
https://doi.org/10.1007/1-4020-5085-2cks. It is collection of tiny-sized sensor nodes. The reason behind these attacks is its limited resource capacity. It is screened to external atmosphere for circulating data. Node capture attack is supposed to be severe attacks in WSN (Butani et al. in Int J Comput Appl IJCA 95(3):32–39, 2014, [.])作者: Innocence 時間: 2025-3-29 01:53
The Case for Object-Dependent Thoughtsaming over Wi-Fi networks. During the handover of mobile stations, two major bottleneck are experienced towards providing fast transition from one access point to another. These bottlenecks are scan latency and authentication latency. These two add up and result in a high handover latency which is u作者: 使習(xí)慣于 時間: 2025-3-29 05:57 作者: Arroyo 時間: 2025-3-29 08:14 作者: 擴大 時間: 2025-3-29 12:39 作者: pericardium 時間: 2025-3-29 18:39 作者: QUAIL 時間: 2025-3-29 21:53 作者: Arresting 時間: 2025-3-30 01:26 作者: dandruff 時間: 2025-3-30 07:44 作者: Flustered 時間: 2025-3-30 11:19 作者: oracle 時間: 2025-3-30 13:09 作者: Peristalsis 時間: 2025-3-30 19:42
Springer Nature Singapore Pte Ltd. 2019作者: 跳動 時間: 2025-3-30 22:46
Sheng-Lung Peng,Nilanjan Dey,Mahesh BundelePresents high quality peer-reviewed research papers from young researchers.Discusses the latest advances in computing and network sustainability.Presents a variety of applications of sustainable metho作者: 窩轉(zhuǎn)脊椎動物 時間: 2025-3-31 04:28 作者: 演繹 時間: 2025-3-31 06:32 作者: 不透明 時間: 2025-3-31 11:59 作者: Eosinophils 時間: 2025-3-31 14:18 作者: 附錄 時間: 2025-3-31 18:14 作者: Basal-Ganglia 時間: 2025-4-1 00:45
2367-3370 lity.Presents a variety of applications of sustainable metho.This book offers a compilation of technical papers presented at the International Research Symposium on Computing and Network Sustainability (IRSCNS 2018) held in Goa, India on 30–31st August 2018. It covers areas such as sustainable compu作者: GRAZE 時間: 2025-4-1 05:33
S. Cafarotti,A. Condoluci,R. Inderbitzirfections in an image caused by noise. Morphology finds its application in the representation of shape of a region, describing skeletons, surface deviation analysis, and other surface metrological applications. Morphological operations are performed using erosion and dilation algorithms, and the results are verified using MATLAB R2013a.