派博傳思國際中心

標題: Titlebook: Data, Engineering and Applications; Volume 2 Rajesh Kumar Shukla,Jitendra Agrawal,Geetam Singh Book 2019 Springer Nature Singapore Pte Ltd [打印本頁]

作者: 夾子    時間: 2025-3-21 16:31
書目名稱Data, Engineering and Applications影響因子(影響力)




書目名稱Data, Engineering and Applications影響因子(影響力)學(xué)科排名




書目名稱Data, Engineering and Applications網(wǎng)絡(luò)公開度




書目名稱Data, Engineering and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Data, Engineering and Applications被引頻次




書目名稱Data, Engineering and Applications被引頻次學(xué)科排名




書目名稱Data, Engineering and Applications年度引用




書目名稱Data, Engineering and Applications年度引用學(xué)科排名




書目名稱Data, Engineering and Applications讀者反饋




書目名稱Data, Engineering and Applications讀者反饋學(xué)科排名





作者: delta-waves    時間: 2025-3-21 22:51
Book 2019re data-driven, or generate huge amounts of data that are ripe for the picking. There are now more sources of data than ever before, and more means of capturing data. At the same time, the sheer volume and complexity of the data have sparked new developments, where many Big Data problems require new
作者: Expiration    時間: 2025-3-22 02:15

作者: gentle    時間: 2025-3-22 05:37

作者: Affiliation    時間: 2025-3-22 08:54
Wing S. Chow,Sunderesh Heragu,Andrew Kusiakprovise the use of resources. This paper discusses various scheduling algorithms implemented in Hadoop environment. The paper also discusses how fine-tuning of scheduling policies could be used to achieve better performance of different applications, which have been implemented and tested in Apache Hadoop.
作者: 亞當心理陰影    時間: 2025-3-22 13:50

作者: 亞當心理陰影    時間: 2025-3-22 18:34

作者: 舞蹈編排    時間: 2025-3-23 00:15
Secret Image Sharing Over Cloud Using One-Dimensional Chaotic Mapecryption, both the shares are gathered and secret image is revealed. The proposed method is secure and simple, and involves less complex operations. Different experimental tests have been performed to demonstrate security aspects of the proposed scheme.
作者: 債務(wù)    時間: 2025-3-23 02:52

作者: 蠟燭    時間: 2025-3-23 06:48
Performance Analysis of Scheduling Algorithms in Apache Hadoopprovise the use of resources. This paper discusses various scheduling algorithms implemented in Hadoop environment. The paper also discusses how fine-tuning of scheduling policies could be used to achieve better performance of different applications, which have been implemented and tested in Apache Hadoop.
作者: 偽造者    時間: 2025-3-23 11:21
NB Tree Based Intrusion Detection Technique Using Rough Set Theory Modelncertainty. Integration of rough set in IDS facilitates better identification of potential malicious contents. Experimental results clearly indicates that NB tree-based IDS with rough set reports better detection rate and lower false positive, subsequently outperforms the existing state of the art.
作者: myriad    時間: 2025-3-23 16:52
Comparative Study of Digital Forensic Toolsy help investigating officers and forensic experts to choose the best tool among all available for better crime examination and identification of evidences. Categorization of different forensic tools can result in saving of time while choosing a tool.
作者: 饒舌的人    時間: 2025-3-23 21:33

作者: nutrition    時間: 2025-3-24 00:27

作者: alcohol-abuse    時間: 2025-3-24 05:21
Simulation and Simulation Models revocation list to reduce the overburdening of the hybrid ah hoc network. We have also compared our proposed scheme with other binary tree data structure. The result shows that the proposed mechanism is feasible and takes an order of milliseconds.
作者: Flat-Feet    時間: 2025-3-24 10:21

作者: 諂媚于性    時間: 2025-3-24 13:10

作者: cornucopia    時間: 2025-3-24 15:49

作者: 舞蹈編排    時間: 2025-3-24 21:07

作者: 難聽的聲音    時間: 2025-3-25 01:06

作者: cortex    時間: 2025-3-25 04:19

作者: Sigmoidoscopy    時間: 2025-3-25 09:27
Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc NetworkThe paper proposes an algorithm Algo_Authenticate_Node for authentication of a new node using the concept of the secured sum. It provides initial-level security. An algorithm is developed for short-span mobile ad hoc network.
作者: 元音    時間: 2025-3-25 15:09

作者: 確保    時間: 2025-3-25 17:49

作者: MOTIF    時間: 2025-3-25 20:08
Design and Development of a Cloud-Based Electronic Medical Records (EMR) Systemechnology. The implementation requirement includes the use of client-side tools and server-side scripting languages, as well as a hosting platform. The client-side tools include HTML, CSS, Javascript, and jquery. PHP was used as the server-side scripting while MySQL served as the database. The appli
作者: Intact    時間: 2025-3-26 02:42
Energy-Aware Prediction-Based Load Balancing Approach with VM Migration for the Cloud Environmentid these unnecessary migrations, our approach uses a prediction approach which predicts the load on the PM before triggering the migrations. CloudSim simulator was used to develop a cloud environment. Experiment results depict that proposed approach consumes less amount of energy and less number of
作者: NOVA    時間: 2025-3-26 05:55
An Energy-Efficient Intrusion Detection System for MANETer consumption. In order to overcome all these disadvantages of the proposed, Cluster-based game theory for IDS has been proposed that integrates the Game theory and K-means. In the proposed methodology, game theory is used to calculate reliability score, where K-means provide scope of reliability s
作者: 大洪水    時間: 2025-3-26 10:57
DDoS Attack Mitigation Using Random and Flow-Based Schemef DoS and DDoS attacks and the techniques used for the prevention, detection, and trace back of such attacks. The next section gives a brief description of the existing methods used for mitigation of such attacks. The third section provides a detailed understanding of the algorithm we are using with
作者: 出血    時間: 2025-3-26 13:42

作者: 并排上下    時間: 2025-3-26 17:29
Image Forgery Detection: Survey and Future Directionsnipulation tools are becoming more and more sophisticated. The main purpose of this paper is to review the various existing methods developed for detecting the image forgery. A categorization of various forgery detection techniques has been presented in the paper.
作者: 熄滅    時間: 2025-3-26 22:16

作者: 熔巖    時間: 2025-3-27 01:34

作者: 不斷的變動    時間: 2025-3-27 08:05
Computer-Aided Production Managementid these unnecessary migrations, our approach uses a prediction approach which predicts the load on the PM before triggering the migrations. CloudSim simulator was used to develop a cloud environment. Experiment results depict that proposed approach consumes less amount of energy and less number of
作者: PHON    時間: 2025-3-27 13:29

作者: amorphous    時間: 2025-3-27 15:32

作者: 哄騙    時間: 2025-3-27 18:14
David Greve,Matthew Wilding,David Hardintheme for VANET have been planned. The planned theme is compared with other decentralized and centralized approaches and it is observed experimentally that the proposed approach achieves better performance.
作者: SEED    時間: 2025-3-27 22:57

作者: 暗指    時間: 2025-3-28 05:16

作者: 放棄    時間: 2025-3-28 08:37

作者: 歌曲    時間: 2025-3-28 12:13
Secret Image Sharing Over Cloud Using One-Dimensional Chaotic Mapre also emerging as cloud infrastructures are deployed and maintained by third parties. In this paper, we propose a simple method to secure an image for privacy-preserving storage over cloud infrastructure. One-dimensional chaotic logistic map is used to divide the secret image into two shares such
作者: 修飾語    時間: 2025-3-28 17:32

作者: syring    時間: 2025-3-28 19:46

作者: Myocarditis    時間: 2025-3-29 02:32

作者: entice    時間: 2025-3-29 03:59

作者: 以煙熏消毒    時間: 2025-3-29 07:21

作者: 元音    時間: 2025-3-29 14:44
Certificate Revocation in Hybrid Ad Hoc Networktionally or unintentionally, to other vehicles of the VANET which should ignore such messages to protect its safety. However, public-key cryptography (PKI) is used for authentication to protect attackers from causing evils. The work also addresses to remove the malicious certificate from certificate
作者: alliance    時間: 2025-3-29 17:29
NB Tree Based Intrusion Detection Technique Using Rough Set Theory Modelmechanism that strives to differentiate between legitimate and malicious activities with intent to secure the resource and henceforth establish trust. Due to this importance significant amount of research has been carried in this domain. This paper introduces concept of Rough sets in IDS as theoreti
作者: 旋轉(zhuǎn)一周    時間: 2025-3-29 21:05
An Energy-Efficient Intrusion Detection System for MANETngs to ad hoc wireless network. Nodes in mobile network have small batteries with limited power. The huge numbers of mobile nodes in MANET makes it impractical to replace sensor node batteries. Along with that, it has open medium and wide distribution of nodes that make MANET open to various types o
作者: Pepsin    時間: 2025-3-30 03:24

作者: Cabinet    時間: 2025-3-30 04:39

作者: 微不足道    時間: 2025-3-30 09:07

作者: rods366    時間: 2025-3-30 13:40
Image Forgery Detection: Survey and Future Directionsyday life. Unprecedented involvement of digital images can be seen in various paramount fields like medical science, journalism, sports, criminal investigation, image forensic, etc., where authenticity of image is of vital importance. Various tools are available free of cost or with a negligible amo
作者: 燒烤    時間: 2025-3-30 19:23

作者: indemnify    時間: 2025-3-30 21:32
A Systematic Survey on Mobile Forensic Tools Used for Forensic Analysis of Android-Based Social Netw An increasing number of our social and economic transactions are taking place with the help of these applications. Unsurprisingly, these developments have attracted the attention of criminals, who commit crimes using the same applications. Fortunately, a criminal almost always leaves behind some ev
作者: 突變    時間: 2025-3-31 03:50
Enhanced and Secure Acknowledgement IDS in Mobile Ad Hoc Network by Hybrid Cryptography Technique around the network. Unlike wired frameworks, there is no settled and dedicated association open between the center points. So any center point can get to any association between any center points. Primary Property of MANET is it is open to all which attracts harmful customers. IDS frameworks are us
作者: HILAR    時間: 2025-3-31 05:24
Geometric Definitions in Generalalth care, social networking, etc. As a result, an intelligent data analysis tool is needed. MapReduce (MR) framework is normally designed to process huge data and to support potential decision-making. MR has three phases—“., . The intermediate data of mapper is sent to the . via . phase. Thus, the
作者: enfeeble    時間: 2025-3-31 13:00

作者: FAST    時間: 2025-3-31 14:14
Representations for assembly sequencesas improving the efficiency of the patient lifecycle and optimization of the record retrieval process. There seems to be a relationship between delayed access to a healthcare service and mortality rate. The problem of managing patient time, quick access to records, patient workflow coordination, ine




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
临城县| 成都市| 会同县| 临沧市| 黔西| 烟台市| 江永县| 平山县| 上杭县| 南投县| 江城| 高密市| 陵水| 麻江县| 临湘市| 山东省| 阿坝县| 沂水县| 洞头县| 九寨沟县| 襄樊市| 桐柏县| 宁海县| 贡嘎县| 蚌埠市| 盐城市| 宝丰县| 彩票| 宣恩县| 即墨市| 小金县| 广南县| 且末县| 永定县| 民勤县| 永丰县| 西藏| 房产| 鲜城| 胶南市| 宣城市|