標(biāo)題: Titlebook: Intelligent Communication Technologies and Virtual Mobile Networks; ICICV 2019 S. Balaji,álvaro Rocha,Yi-Nan Chung Conference proceedings 2 [打印本頁] 作者: TIBIA 時間: 2025-3-21 19:44
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks影響因子(影響力)
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks影響因子(影響力)學(xué)科排名
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks網(wǎng)絡(luò)公開度
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks被引頻次
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks被引頻次學(xué)科排名
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks年度引用
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks年度引用學(xué)科排名
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks讀者反饋
書目名稱Intelligent Communication Technologies and Virtual Mobile Networks讀者反饋學(xué)科排名
作者: Constitution 時間: 2025-3-22 00:02
Conference proceedings 2020 India, on February 14–15, 2019. It presents the state of the art in the field, identifying emerging research topics and communication technologies and defining the future of intelligent communication approaches and virtual computing. In light of the tremendous growth ICT, it examines the rapid deve作者: instulate 時間: 2025-3-22 01:02
Impact of Mobility and Density on Performance of MANET,des and forestall them from electronic communication method solely. There are many different reasons corresponding to mobility and congestion of mobile nodes due to which the data could loss in MANETS. Thus planned theme ETSR is meant by considering these parameters so as to provide a more stable, reliable and secure routes.作者: choroid 時間: 2025-3-22 08:06 作者: chapel 時間: 2025-3-22 09:39 作者: Bernstein-test 時間: 2025-3-22 16:24 作者: interrupt 時間: 2025-3-22 18:13 作者: 四溢 時間: 2025-3-22 23:46
A Novel for Analytical Healthcare Using Message Queue Telemetry Transfer, will immediately give the alert to the doctor and to the care taker. Machine to Machine (M2M) communication has been established to transfer the data with very high speed. Due to high speed connectivity, the result of patient monitoring will be very accurate and the patient’s life can be saved without any delay.作者: 替代品 時間: 2025-3-23 02:37
VLSI Implementation of Image Encryption Using DNA Cryptography,re generated by pseudo random sequence generator. Deciphering the image is possible with encryption key and primer sequence key. The HDL synthesis report for hardware design is implemented for encryption using verilog code on a device Virtex VII.作者: 孵卵器 時間: 2025-3-23 05:48
Comparative Analysis of Privacy Preserving Approaches for Collaborative Data Processing,ng approaches viz. the non-cryptography based approach and the cryptography based approach can be utilized. This paper aims to discuss an insight of these approaches and to highlight the parametric comparison.作者: 6Applepolish 時間: 2025-3-23 12:10 作者: 詳細(xì)目錄 時間: 2025-3-23 16:12
Various Face Annotation Techniques: Survey,same person only. In this paper we described various techniques of face annotation such as Content based, Retrieval based, Search Based, Cluster Based and Caption Based face annotation. Based on the study we present the parametric evaluation of existing techniques.作者: dilute 時間: 2025-3-23 20:16 作者: engagement 時間: 2025-3-24 01:11
Damage Detection and Evaluation in Wireless Sensor Network for Structural Health Monitoring,s the boundary region to detect the damaged areas. The operational phase contains three sub processes. They are data collection, transmission and damage evaluation. The clusters are formed and cluster head passes the details to detect the damage. The simulation shows the efficiency of these processes.作者: 阻礙 時間: 2025-3-24 06:07
RTMDC for Effective Cloud Data Security,ased Trust Management system with Data Colouring) systems, which builds and tests a secure platform using Reputation Based Trust Management technique. Reputation based trust factor is then calculated using the collective reviews given by the users. This research work focuses on the images that has been related to the cloud users.作者: UTTER 時間: 2025-3-24 07:19 作者: 內(nèi)行 時間: 2025-3-24 12:28 作者: Dysplasia 時間: 2025-3-24 18:39
R. Uma Maheswari,S. Rajalingam,T. K. Senthilkumars menschlichen Geschlechts ist. Die Staaten, abgesehen von ihren Pflichten und Rechten als ?rtliche Herrscher, haben gemeinschaftliche Pflichten dem menschlichen Geschlecht gegenüber und üben, als Gesamtheit, die diesen Pflichten korrelativen Befugnisse aus. Das ist der Schlüssel der wechselseitigen作者: BAN 時間: 2025-3-24 20:32
Pankaj Verma,Nilima Dongre,Vijaylaxmi Bittal fragen, wie die ver?nderten Konkurrenzverh?ltnisse die Handlungsbedingungen der Gewerkschaften in der Post-Entflechtungs?ra beeinflussen und welche strategischen Antworten von gewerkschaftlicher Seite hierauf gegeben werden. Dabei soll — soweit dies aus unserer Perspektive m?glich ist — versucht we作者: conference 時間: 2025-3-24 23:18 作者: 不可磨滅 時間: 2025-3-25 05:22 作者: 動物 時間: 2025-3-25 11:00 作者: 有惡意 時間: 2025-3-25 15:22 作者: 警告 時間: 2025-3-25 18:32
Urvashi Solanki,Bintu Kadhiwalasie mit ein paar Zeilen abgetan, aus welchen deutlich herauszulesen ist, da? sich dieses Gebiet noch in der Kontroverse befindet. Auch in der Literatur der letzten Jahrg?nge habe ich nur 2 ausführlichere Aufs?tze über den Fu?-, speziell den Hackenschmerz entdeckt; beide rühren von Chirurgen her; der作者: neutral-posture 時間: 2025-3-25 23:14
S. Surya,R. Ravisie mit ein paar Zeilen abgetan, aus welchen deutlich herauszulesen ist, da? sich dieses Gebiet noch in der Kontroverse befindet. Auch in der Literatur der letzten Jahrg?nge habe ich nur 2 ausführlichere Aufs?tze über den Fu?-, speziell den Hackenschmerz entdeckt; beide rühren von Chirurgen her; der作者: Gingivitis 時間: 2025-3-26 03:28
Condition Monitoring of Coal Mine Using Ensemble Boosted Tree Regression Model,early integrating the weaker estimations. Threshold rule-based decision making is adopted for the effective mitigation of risks. EBRT is optimized to minimize the cross-validation loss. Furthermore, Bayesian optimizer is used to minimize the objective function to 7.81 with regularized parameter lamb作者: 難取悅 時間: 2025-3-26 08:05 作者: Intellectual 時間: 2025-3-26 08:38 作者: A精確的 時間: 2025-3-26 16:36 作者: 巨頭 時間: 2025-3-26 17:55
2367-4512 ly life, like transportation, e-commerce, health care, secure communication, location detection, smart home, smart city, social networks and many more..978-3-030-28363-6978-3-030-28364-3Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: intertwine 時間: 2025-3-26 22:15 作者: 笨拙的我 時間: 2025-3-27 01:37 作者: Arboreal 時間: 2025-3-27 09:14 作者: 智力高 時間: 2025-3-27 11:57
Intelligent Communication Technologies and Virtual Mobile NetworksICICV 2019作者: 從屬 時間: 2025-3-27 17:32 作者: 不公開 時間: 2025-3-27 18:07
S. Balaji,álvaro Rocha,Yi-Nan ChungPresents the latest research in the fields of computer networks, network protocols and wireless networks, data communication technologies, and network security.Features the outcomes of the Intelligent作者: 罵人有污點 時間: 2025-3-28 01:23 作者: Phenothiazines 時間: 2025-3-28 05:48
https://doi.org/10.1007/978-3-030-28364-3Data Communication; Data Analytics; Mobile Networks; IoT; Cloud; Virtual Networks and Artificial Intellig作者: induct 時間: 2025-3-28 09:52 作者: medieval 時間: 2025-3-28 12:15
Intelligent Communication Technologies and Virtual Mobile Networks978-3-030-28364-3Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: cumulative 時間: 2025-3-28 17:00
Cluster Restructuring and Compressive Data Gathering for Transmission Efficient Wireless Sensor Netes. The challenge of reducing high transmissions with low cost on-node processing can be achieved using Compressive Sensing (CS) CS data gathering from these nodes is designed under various routing mechanisms. Cluster-based routing integrated with CS, reduce transportation cost, but overall transmis作者: 團結(jié) 時間: 2025-3-28 19:34
Condition Monitoring of Coal Mine Using Ensemble Boosted Tree Regression Model,llution. By using various risk assessment methodologies, coal miners can easily predict the potential risks of forthcoming hazards in advance. In this work, a novel approach is proposed for monitoring the fire-resistant hydraulic fluids (HFA) contamination level. Fire resistance property of HFA flui作者: fibroblast 時間: 2025-3-29 00:30
Performance Analysis of Image Compression Using LPWCF,loping an effective decompression. The input images that is compressed may not be more effectively restored in the decompression process that is based on quantization using Cosine Transformations or Wavelet transformations where the pixel information will be lost. To overcome these challenges, encod作者: forecast 時間: 2025-3-29 06:35
Facial Analysis Using Deep Learning,. In this first sort massive album of photos, to figure out the top-k most alike faces. The k retrieved prospect is re-ranked by emerging equalities depending on deep features and those results by the COTS matcher. The software based technique is complex and large. It analysis unique shape, pattern 作者: Fretful 時間: 2025-3-29 07:29 作者: 無瑕疵 時間: 2025-3-29 12:43
RTMDC for Effective Cloud Data Security,is that the cloud computing also appears as a vulnerable platform and therefore the security becomes the most important aspect in the cloud computing applications. Security issues are mainly dealt with known and unknown threats, malware and network access by unknown or unauthorised users. Hence, it 作者: antedate 時間: 2025-3-29 17:47 作者: 肉身 時間: 2025-3-29 19:44 作者: Exhilarate 時間: 2025-3-30 01:50
Various Face Annotation Techniques: Survey,tion are used to give an appropriate name to the face image. In this research work, first the face notations are saved in the database and it can be retrieved any time for further processing and then it compares two different images of a same person and finds out whether those images belongs to the 作者: hauteur 時間: 2025-3-30 07:24 作者: 多產(chǎn)子 時間: 2025-3-30 09:26
Algo_Seer: System for Extracting and Searching Algorithms in Scholarly Big Data,nals, conference papers or thesis. Algorithms plays important role especially in the computational and research areas where the researchers and developers look for the innovations. Therefore there is need for a search system which automatically searches for algorithms from the scholarly big data. Al作者: 鴿子 時間: 2025-3-30 13:32
A Review on Infrared and Visible Image Fusion Techniques, intended to find compatible fused image with detailed textures of visible images and an impressive infrared object area. We therefore combine infrared and visible images to create solitary image. Current real - time applications that encourage image fusion including military surveillance, automate 作者: 挑剔小責(zé) 時間: 2025-3-30 18:28
Implementation of the Standard Floating Point DWT Using IEEE 754 Floating Point MAC,dio purpose the fixed point DWT is used as audio CODEC [.]. The main bottleneck of the fixed point DWT or the traditional DWT is the speed because at the input of the fixed point DWT the over-sampled ADC which is the Sigma-Delta ADC is used. The Sigma-Delta ADC can’t give the speed more than 1?MHz b作者: 鞠躬 時間: 2025-3-30 23:22 作者: coagulation 時間: 2025-3-31 01:24
Impact of Mobility and Density on Performance of MANET, dynamic topology. Most of the recent ways didn’t solve the entire downside of data loss in MANETs as they targeted on distinguishing the malicious nodes and forestall them from electronic communication method solely. There are many different reasons corresponding to mobility and congestion of mobil作者: anagen 時間: 2025-3-31 05:27
Next Generation Web for Alumni Web Portal,dual is vital which will be accomplished by establishing an online alumni interface. With this the alumni can communicate to the students regarding job opportunities and the students can share their department activities to the alumni. The proposed system has the dynamic architecture and less static作者: 下垂 時間: 2025-3-31 10:34 作者: palpitate 時間: 2025-3-31 15:13
Comparative Analysis of Privacy Preserving Approaches for Collaborative Data Processing,ng process. Moreover, availability of high speed internet and sophisticated data mining tools make sharing of this collected data across various organizations possible. As a consequence, these organizations may share and combine their datasets to retrieve the improved result from the combined data u作者: 環(huán)形 時間: 2025-3-31 18:04 作者: Cupidity 時間: 2025-3-31 22:55
R. Uma Maheswari,S. Rajalingam,T. K. Senthilkumarinternationale Privatrecht nichts anders sind als das ?ffentliche Recht und das Privatrecht, betrachtet vom Standpunkt einer Rechtsgemeinschaft, welche ausgedehnter ist als ein isolierter Staat. Da diese Rechtsgemeinschaft in ihrer ?uszersten Ausdehnug das ganze menschliche Geschlecht umfaszt, haben作者: antenna 時間: 2025-4-1 04:58 作者: paltry 時間: 2025-4-1 09:41
J. R. Mahajan,C. S. Rawatnssektor besch?ftigen. Wir wollen der Frage nachgehen, wie das Aufbrechen des fordistischen Akkumulationsmodells die ?konomischen Grundlagen und die Formen der Regulation des Lohnverh?ltnisses in der telephone industry ver?ndert hat und ob bzw. inwieweit sich in diesem Umbruchsproze? bereits Konture作者: Pillory 時間: 2025-4-1 10:57
Vaishali V. Sarbhukan,Ragha Lata Die Entwicklung in Japan wird ihren besonderen Stellenwert auch für die bundesdeutsche fernmeldepolitische Diskussion haben. Das Buch stellt den Abschlu?bericht eines gleichnamigen Forschungsprojektes des WIK dar. Die Studie arbeitet heraus, da? die Liberalisierung der ordnungspolitischen Rahmenbed作者: APEX 時間: 2025-4-1 16:20