標題: Titlebook: Inventive Communication and Computational Technologies; Proceedings of ICICC G. Ranganathan,Joy Chen,álvaro Rocha Conference proceedings 20 [打印本頁] 作者: 休耕地 時間: 2025-3-21 17:04
書目名稱Inventive Communication and Computational Technologies影響因子(影響力)
書目名稱Inventive Communication and Computational Technologies影響因子(影響力)學(xué)科排名
書目名稱Inventive Communication and Computational Technologies網(wǎng)絡(luò)公開度
書目名稱Inventive Communication and Computational Technologies網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Inventive Communication and Computational Technologies被引頻次
書目名稱Inventive Communication and Computational Technologies被引頻次學(xué)科排名
書目名稱Inventive Communication and Computational Technologies年度引用
書目名稱Inventive Communication and Computational Technologies年度引用學(xué)科排名
書目名稱Inventive Communication and Computational Technologies讀者反饋
書目名稱Inventive Communication and Computational Technologies讀者反饋學(xué)科排名
作者: obsession 時間: 2025-3-22 00:06
Ashish Jain,Ravindra Kumar Sharma,Vimal Agarwal,Sunil Sharma作者: Engaged 時間: 2025-3-22 03:14
Amruta Chavan,Dipti Jadhav,Nilesh Marathe,Nilima Dongre作者: breadth 時間: 2025-3-22 05:02
Haider K. Hoomod,Ali Jameel Al-Mousawi,Jolan Rokan Naif作者: 認識 時間: 2025-3-22 12:20
P. V. Vivek Sridhar Mallya,Aparna Ajith,T. R. Sangeetha,Arya Krishnan,Gayathri Narayanan作者: GULLY 時間: 2025-3-22 15:47 作者: 不能根除 時間: 2025-3-22 20:34
G. Charles Babu,A. Sai Hanuman,J. Sasi Kiran,B. Sankara Babu作者: 赦免 時間: 2025-3-23 00:44
Priyanka Gotter,Kiranbir Kaurst blank space) approach for coordinated interference management between macro and femto cells (3GPP, Technical report on UMTS heterogeneous networks, 2013, [.]). Therefore, specific user case that can handle mobility management between femto and macro cells, and in a more broader sense vertical han作者: CANT 時間: 2025-3-23 02:37
S. V. Viraktamath,A. S. Umarfarooq,Vinayakgouda Yallappagoudar,Abhilash P. Hasankarpectives for employing gas-liquid absorption for decarbonisation of the energy sector and modern industries are strengthened by recent solvent based research outcomes. Developments in gas–liquid absorption are essential for wide-scale deployment of CO. capture and are therefore approached through al作者: Emasculate 時間: 2025-3-23 07:03
Inventive Communication and Computational TechnologiesProceedings of ICICC作者: 吸引力 時間: 2025-3-23 10:55 作者: 小樣他閑聊 時間: 2025-3-23 15:48 作者: Conquest 時間: 2025-3-23 20:49
Implementation of Automated Bottle Filling System Using PLC,ess also enhances the knowledge of fabrication, programming, design, planning, and presentation skills. The PLC is gaining popularity because it is easy for troubleshooting which makes programming easier and reduces downtime.作者: Diuretic 時間: 2025-3-24 00:46 作者: CAGE 時間: 2025-3-24 04:02
A Framework for Formal Verification of Security Protocols in C++,P can be proved mathematically. In the proposed work, a new framework is proposed, which includes a library of functions to specify a security protocol in C++ by following a set of rules (syntax and semantics), a interpreter to interpret the C++ code to security protocol description language (SPDL),作者: 其他 時間: 2025-3-24 09:01
,Locality—Aware Scheduling for Containers in Cloud Computing,vely settle it. The most difficult part is that some sub-issues are amazingly unpredictable (for instance, NP-hard) and heuristic calculations must be formulated. To wrap things up, we actualize a framework model of the proposed planning procedure for containerized cloud administrations. Exploratory作者: 無底 時間: 2025-3-24 12:50 作者: 易受刺激 時間: 2025-3-24 17:29
Inventive Communication and Computational Technologies978-981-15-0146-3Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: 橡子 時間: 2025-3-24 21:17
https://doi.org/10.1007/978-981-15-0146-3ICICCT 2019; Internet of Things; Social Networks; Mobile Computing; Big Data Analytics; Cloud Computing; B作者: 榮幸 時間: 2025-3-25 00:05
G. Ranganathan,Joy Chen,álvaro RochaHighlights innovative research in the fields of computing and computational technologies.Outlines future research directions in computational technologies.Addresses topical issues and challenges in co作者: 步履蹣跚 時間: 2025-3-25 04:03
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/i/image/474628.jpg作者: Agronomy 時間: 2025-3-25 08:53
2367-3370 include the Internet of Things, Social Networks, Mobile Communications, Big Data Analytics, Bio-inspired Computing and Cloud Computing.. .The book is chiefly intended for academics and practitioners working to resolve practical issues in this area. ? .978-981-15-0148-7978-981-15-0146-3Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: 輕打 時間: 2025-3-25 15:37
Enhancing High Availability for NoSQL Database Systems Using Failover Techniques,the proposed technique which provides high availability of data in case of failures by utilizing the checkpointing. Experimental results reveal that the proposed technique provides efficient results, especially in case of any kind of failures in distributed NoSQL servers.作者: Ceremony 時間: 2025-3-25 15:53
An Integrated Approach to Network Intrusion Detection and Prevention,he program behavior as intrusive or not. To prevent DoS (Denial-of-Service) attacks, a new method is implemented in this paper. The KNN classified data which provides malicious IP address are blocked in routers through Standard Access-list.作者: cavity 時間: 2025-3-25 22:20 作者: 季雨 時間: 2025-3-26 02:16 作者: 燦爛 時間: 2025-3-26 07:33
New Complex Hybrid Security Algorithm (CHSA) for Network Applications,der to obtain the best results in terms of resistance to multiple cyber-attacks. This paper also contains an analytical study of the algorithms used and their effectiveness in resistance to attacks represented by statistical results and graphs.作者: Debate 時間: 2025-3-26 08:35 作者: Incisor 時間: 2025-3-26 15:16
Development of an Efficient Nondestructive Grading Method for Pomegranate Using Magnetic Resonance ata was 0.92. This study shows that MRI has higher potential for nondestructive method of grading pomegranate fruit based on the chemical values which are the basis for determining the maturity of the fruit.作者: GENRE 時間: 2025-3-26 18:11 作者: 斜坡 時間: 2025-3-27 00:59
Internet of Things: Service-Oriented Architecture Opportunities and Challenges,yers are sensing layer, network layer, service layer and application layer. Various data processing techniques are integrated along with data filtering and data conversion. Protocol transformation is also feeling the major challenges faced by enterprises wanting to shift to the style in brand new technology.作者: WAX 時間: 2025-3-27 03:41
Performance Analysis of Unified Threat Management (UTM),sed by the researchers. In this paper, survey and numerical analysis of each technique is done based on the overall packet processing time. Based on the numerical analysis, we suggest the best technique to reduce the overall packet processing time in UTM and hence reduce the load under heavy traffic conditions.作者: VOC 時間: 2025-3-27 06:59 作者: AVOID 時間: 2025-3-27 12:54
Conference proceedings 2020il 2019 at Gnanamani College of Technology, Tamil Nadu, India. The respective contributions highlight recent research efforts and advances in a new paradigm called ISMAC (IoT in Social, Mobile, Analytics and Cloud contexts). Topics covered include the Internet of Things, Social Networks, Mobile Comm作者: Permanent 時間: 2025-3-27 16:11 作者: sclera 時間: 2025-3-27 20:57
A New Design of Equiangular Circular Cum Elliptical Honeycomb Photonic Crystal Fiber,ive index is calculated with Sellmeier equation in this method which is equal to the conventional silica glass, i.e., 1.457. The proposed design is also used to show the non-linear effects of the material used.作者: 土坯 時間: 2025-3-27 23:35 作者: Orthodontics 時間: 2025-3-28 06:03
TorBot: Open Source Intelligence Tool for Dark Web, presents a tool which shows OSINT in the dark web. With the use of this tool, researchers and Law Enforcement Agencies can automate their task of crawling and identifying different services in the Tor network. This tool has several features which can help extract different intelligence.作者: Missile 時間: 2025-3-28 08:20 作者: 試驗 時間: 2025-3-28 12:06
S. V. Viraktamath,A. S. Umarfarooq,Vinayakgouda Yallappagoudar,Abhilash P. Hasankar energy sector and beyond. The process is used in nature on a large scale greatly contributing to the global carbon cycle. CO. is captured from air by oceans and stroma (aqueous fluid) of plant leaf cells during photosynthesis. Step-change biological developments are associated with the evolution of作者: 先行 時間: 2025-3-28 15:18
Enhanced Security Mechanism in Cloud Based on DNA Excess 3 Codes,for exchanging and retrieving the required data. Portability and operability inside cloud framework are achieved through disconnected and online mediums, which are persistently alluring, yet the issue of security emerges amid the transmission process. Security and unwavering quality are the key issu作者: Sciatica 時間: 2025-3-28 21:23
TensorFlow-Based Semantic Techniques for Multi-cloud Application Portability and Interoperability,e easily and hastily granted with minimal management effort. With the advancements in cloud computing, many cloud service providers have started using the distributed high-end servers to provide services to its users. However, while designing an efficient cloud environment, it has been found that th作者: Neutropenia 時間: 2025-3-28 23:20
Enhancing High Availability for NoSQL Database Systems Using Failover Techniques,vers. Most of these databases are created to perform on full throttle despite the presence of low-cost hardware. Users are able to create the database more quickly due to the non-relational nature of NoSQL. There is no need of developing the detailed (fine-grained) database model. As a result, it wi作者: 懸掛 時間: 2025-3-29 05:07
Implementation of Automated Bottle Filling System Using PLC,red amount of liquid or water to be inserted in the bottles. It is generally used where many bottles of same volume are to be filled by passing bottles over the conveyor belt. PLC is a main functional block in the automation which tries to minimize the complexity and increases safety and cost reduct作者: 關(guān)節(jié)炎 時間: 2025-3-29 07:22 作者: 敘述 時間: 2025-3-29 14:01 作者: Parameter 時間: 2025-3-29 15:54
Survey of Different Countermeasure on Network Layer Attack in Wireless Network,al security issue is observed on the network layer on different wireless networked systems. Defense mechanisms are used to shield the network layer from these repetitive malicious attacks. Malicious hubs are detected and differentiated along the network by using these mechanisms. These networks trul作者: 江湖郎中 時間: 2025-3-29 20:31 作者: 松軟 時間: 2025-3-30 02:54 作者: 使迷惑 時間: 2025-3-30 04:47 作者: malign 時間: 2025-3-30 11:57
Performance Assessment of Various Encoding Schemes with Bit Stuffing,ethods of source coding. This technique can be applied to any of the existing methods of source encoding under controlled conditions. In particular, the method is very efficient when the encoded bits have more number of ones or zeros than a predefined threshold, at any point of time and in any part 作者: 表臉 時間: 2025-3-30 15:14
,3D(Dimensional)—Wired and Wireless Network-on-Chip (NoC),of the NoC architecture and power consumption. NoC is designed with three main components: switches, Network Interfaces (NIs) and links. NoC is used for several application domains, such as multi-media processing, consumer electronics, biological applications, etc. NoC is the technology proposed to 作者: MANIA 時間: 2025-3-30 20:00
Performance Analysis of Unified Threat Management (UTM),tant to prevent data breaches and industrial sabotage. Unified Threat Management are the Next-Generation network security appliances that include multiple security features along with the performance required for future networks. But packet processing usually consumes 70% of the CPU time and during 作者: Engaging 時間: 2025-3-30 23:55 作者: osteocytes 時間: 2025-3-31 03:41
,Implementation of Differential Privacy Using Diffie–Hellman and AES Algorithm,. Here, in this work, differential privacy is being implemented in the context of vehicular ad hoc networks (VANETs). In this paper, we implement the concept of differential privacy using the Diffie–Hellman key exchange algorithm and the advanced encryption standards (AES) algorithms that are very p作者: 容易生皺紋 時間: 2025-3-31 07:25
Implementation of Neural Signals in MATLAB (Thought Signals),ifferent means. The human brain is a universe consisting of a cluster of neurons connected to each other. There are about 100?billion neurons in the human brain. Estimated that a neuron connection transmits at least one signal per second, and some theories proved that some of the specialized connect作者: Grating 時間: 2025-3-31 12:31
A Framework for Formal Verification of Security Protocols in C++,ork by using a set of cryptographic security protocols (CSPs). Many security protocols proved secure were cracked within a short span of time, and the best example is Needham–Schroeder authentication protocol. The quality assurance about the correctness of security protocols is one of the key challe作者: 季雨 時間: 2025-3-31 14:50
,Locality—Aware Scheduling for Containers in Cloud Computing,ding application execution, are ignored. In the period of Big Data, applications advance to be progressively more information escalated and subsequently performed inadequately when conveyed on containerized cloud administrations. With that in mind, this paper means to enhance the present cloud admin作者: BROW 時間: 2025-3-31 21:22
TorBot: Open Source Intelligence Tool for Dark Web,hese services. Open source intelligence (OSINT) is a technique used to gather intelligence on targets by harvesting publicly available data. Performing OSINT on the Tor network makes it a challenge for both researchers and developers because of the complexity and anonymity of the network. This paper作者: 凈禮 時間: 2025-4-1 00:36
0065-2598 their thanks to the authors of the papers and to the Plenum Publishing Corporation for the prompt response which has enabled the rapid publication of the volum978-1-4899-0414-0978-1-4614-4616-3Series ISSN 0065-2598 Series E-ISSN 2214-8019 作者: 賞錢 時間: 2025-4-1 03:58
Introductionh of classical liberal capitalism. Then, the background of the economic theory of the period is analyzed: the crisis of classical political economy, the Historical School’s criticism, and the legacy of the marginalist and neoclassical Revolution. Lastly, the map of economic theory from the last deca作者: 啞劇 時間: 2025-4-1 09:11 作者: 騷動 時間: 2025-4-1 14:11