標(biāo)題: Titlebook: Networking Communication and Data Knowledge Engineering; Volume 2 Gregorio Martinez‘Perez,Krishn K. Mishra,Munesh C. Conference proceedings [打印本頁(yè)] 作者: EXTRA 時(shí)間: 2025-3-21 16:09
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering影響因子(影響力)
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering被引頻次
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering被引頻次學(xué)科排名
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering年度引用
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering年度引用學(xué)科排名
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering讀者反饋
書(shū)目名稱(chēng)Networking Communication and Data Knowledge Engineering讀者反饋學(xué)科排名
作者: 你不公正 時(shí)間: 2025-3-21 23:27
WebN: A Strainer Approach for Website Performance Analysisnt principles of testing. Performance testing is the process of determining the speed and the effectiveness of a system. It basically focuses on determining whether the user of the system will be satisfied with the performance characteristics of the application. Performance optimization is the proce作者: arthroscopy 時(shí)間: 2025-3-22 01:44 作者: 值得贊賞 時(shí)間: 2025-3-22 08:10 作者: Explosive 時(shí)間: 2025-3-22 10:17
Trust for Task Scheduling in Cloud Computing Unfolds It Through Fruit Congenialprobability of failure of task of particular scheduling makes one understand that the scheduling is not good for profit in the market, and one does not trust that. Trust can be generated through many factors or reasons. The fruit congenial concept explores these factors to make the things understand作者: 整體 時(shí)間: 2025-3-22 15:36
Log-Based Cloud Forensic Techniques: A Comparative Studyay-per-use service, and all time availability, reliability, and scalability. Although it offers numerous advantages, but due to its multi-tenant architecture, it is prone to various malicious attacks and illegal activities. Cloud service provider (CSP) takes the responsibility to secure customers’ d作者: 手勢(shì) 時(shí)間: 2025-3-22 19:20 作者: Biomarker 時(shí)間: 2025-3-23 00:46 作者: 安慰 時(shí)間: 2025-3-23 03:34 作者: 擺動(dòng) 時(shí)間: 2025-3-23 06:43 作者: 不舒服 時(shí)間: 2025-3-23 11:49
Relation Between Facebook Stories and Hours of a Dayf user behavior on social network applications. In this paper, structural and dynamical modeling issues have been investigated. Social networks are treated as random graphs where a node is indicator variable of an entity on social network. The term random graph refers to the messy nature of the arra作者: 樂(lè)器演奏者 時(shí)間: 2025-3-23 15:35
Lagrangian Twin SVR Based Grayscale Image Watermarking Using LWT-QR Decompositioncomposition for copyright protection application is proposed in this chapter. Firstly, host image decomposed into low-frequency subband (.) and detail subbands by applying lifting wavelet transform (LWT). Secondly, the blocks of . depend on the fuzzy entropy, and the selected regions of . are transf作者: 禁令 時(shí)間: 2025-3-23 21:16
Difference in Lights and Color Background Differentiates the Color Skin Model in Face Detection for t look directly into the camera; when the face is not held in the same angle, the system might not recognize the face. In this paper, we are considering various live studies where security surveillance ought to be a first preference of our own lives. Few studies have taken as source input study whic作者: MURKY 時(shí)間: 2025-3-24 01:54
Feature Extraction and Fuzzy-Based Feature Selection Method for Long Range Captured Iris Imagesition, feature extraction and feature selection play a major role in increasing the recognition accuracy. This paper proposes feature extraction method using discrete cosine transform domain-based no-reference image quality assessment model, gray-level co-occurrence matrix, Hu seven moments, and sta作者: dainty 時(shí)間: 2025-3-24 05:15 作者: Dislocation 時(shí)間: 2025-3-24 08:49
Comparative Analysis and Evaluation of Biclustering Algorithms for Microarray Databiclustering algorithms over the drawbacks of clustering algorithms on gene expression data. Many biclustering algorithms have been published in recent years. Some of them performed well on gene expression data and other have some issues. In this paper, analysis of some popular biclustering algorith作者: 幻影 時(shí)間: 2025-3-24 11:50
Unconstrained Iris Image Super Resolution in Transform Domain method combines iterated back projection approach with the Papoulis-Gerchberg (PG) method to super resolute the iris images in discrete cosine transform domain. The method is tested on CASIA long-range iris database by comparing and analyzing the structural similarity index matrix, peak signal-to-n作者: 偉大 時(shí)間: 2025-3-24 15:33
Difference in Lights and Color Background Differentiates the Color Skin Model in Face Detection for ng various live studies where security surveillance ought to be a first preference of our own lives. Few studies have taken as source input study which helped us for better outcome. Further algorithm designed to get significant result is least expected to perform well on small sample data.作者: Anthrp 時(shí)間: 2025-3-24 21:11 作者: Glucose 時(shí)間: 2025-3-25 03:06
Conference proceedings 2018 engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the advances in these fields from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of ‘International Conference on Recent Advancement 作者: Dorsal 時(shí)間: 2025-3-25 06:16
Trust for Task Scheduling in Cloud Computing Unfolds It Through Fruit Congenialable in actual way. In this review, we will categorize all these factors through flowchart and suitable diagrams and help to think the reality to make/do the things correct toward technology. Trust remains same in real life as well as in technology.作者: 短程旅游 時(shí)間: 2025-3-25 11:08
Unconstrained Iris Image Super Resolution in Transform Domainoise ratio, visual information fidelity in pixel domain, and execution time of bicubic, Demirel, and Nazzal state-of-the-art algorithms. The result analysis shows that the proposed method is well suited for super resolution of unconstrained iris images in transform domain.作者: 和平主義 時(shí)間: 2025-3-25 15:40
A Survey on Code Clone, Its Behavior and Applicationse the approaches followed in the tools and further summarized the Code Clone patterns that are used for qualitative analysis. Overall, our findings indicate that the management of Clones should be started at the earliest.作者: nitric-oxide 時(shí)間: 2025-3-25 18:39
Log-Based Cloud Forensic Techniques: A Comparative Studyities. In this paper, some existing log-based cloud forensic techniques have been widely studied. The detailed comparative analysis has been done for the various techniques based on their advantages and limitations. By exploring the limitations and advantages of the existing approaches, future research areas have been identified.作者: 制定 時(shí)間: 2025-3-25 23:37 作者: medium 時(shí)間: 2025-3-26 02:03
Relation Between Facebook Stories and Hours of a Daymap algorithm and other statistical inference mechanism. Activities on social network are such as posting, commenting, sharing, and sending message, watch videos, and advertisements which are modeled as random events on random graphs.作者: exclusice 時(shí)間: 2025-3-26 04:47 作者: 娘娘腔 時(shí)間: 2025-3-26 08:45 作者: configuration 時(shí)間: 2025-3-26 16:22 作者: Frequency 時(shí)間: 2025-3-26 16:54 作者: 使腐爛 時(shí)間: 2025-3-26 21:29 作者: 譏諷 時(shí)間: 2025-3-27 04:03
978-981-10-4599-8The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: 圓桶 時(shí)間: 2025-3-27 08:12 作者: CON 時(shí)間: 2025-3-27 11:19 作者: 生來(lái) 時(shí)間: 2025-3-27 15:36
https://doi.org/10.1007/978-981-10-4600-1Computer Science; Informatics; Conference Proceedings; Research; Applications; ICRACCCS; RACCCS 2016; Compu作者: GRAIN 時(shí)間: 2025-3-27 21:13
Gregorio Martinez‘Perez,Krishn K. Mishra,Munesh C.Presents the latest developments and technical solutions in all areas of computer and computational sciences.Helps industry personnel to derive the advances of next generation computer and communicati作者: 蛛絲 時(shí)間: 2025-3-27 23:53 作者: Cervical-Spine 時(shí)間: 2025-3-28 03:31 作者: 終點(diǎn) 時(shí)間: 2025-3-28 06:58
Lagrangian Twin SVR Based Grayscale Image Watermarking Using LWT-QR Decompositioned by applying Arnold transformation, which provide security to the proposed approach. Experimental results using various kinds of images and comparison of existing methods prove that the proposed approach is highly imperceptible and robust.作者: 懶鬼才會(huì)衰弱 時(shí)間: 2025-3-28 13:49
Feature Extraction and Fuzzy-Based Feature Selection Method for Long Range Captured Iris Imagesfication accuracy than existing feature selection method. The results demonstrate that the proposed work is well suited to extract the features of iris polar images captured at a long distance and to reduce the dimensionality by selecting the useful features which increase the recognition accuracy.作者: obsolete 時(shí)間: 2025-3-28 18:14 作者: Noisome 時(shí)間: 2025-3-28 20:02 作者: 消散 時(shí)間: 2025-3-29 00:18 作者: STALL 時(shí)間: 2025-3-29 04:37
2367-4512 sion, and Security.. The book will help the perspective readers from computer industry and academia to derive the advances of next generation communication and computational technology and shape them into real life applications..978-981-10-4599-8978-981-10-4600-1Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: Preamble 時(shí)間: 2025-3-29 07:40
Palash Santra,Asmita Roy,Sadip Midya,Koushik Majumder,Santanu Phadikar作者: OGLE 時(shí)間: 2025-3-29 12:42 作者: 憤怒歷史 時(shí)間: 2025-3-29 18:26
Priti Narwal,Shailendra Narayan Singh,Deepak Kumar作者: 共同確定為確 時(shí)間: 2025-3-29 23:13 作者: multiply 時(shí)間: 2025-3-30 00:06
Adaptive Access Scheme Selection in Software-Based Wireless Multimedia Communicationsriate access scheme out of TDMA and CDMA. With typical multimedia service model supposed to be provided in third or later generation mobile communications systems, we evaluate the traffic performance in terms of average delay time by computer simulation.作者: prosthesis 時(shí)間: 2025-3-30 07:07 作者: 死亡率 時(shí)間: 2025-3-30 11:08 作者: infinite 時(shí)間: 2025-3-30 15:50
Interpolation of Precipitation for Flood Modelling,ed at the end of the chapter. The first one deals with interpolation of hourly rainfall using radar as additional information. The second one compares the application of precipitation data obtained from interpolation and simulation for rainfall-runoff modelling.作者: Reservation 時(shí)間: 2025-3-30 20:31
Jacek Batóg,Barbara Batógcontexts, and anticipations of the future interact. The author explains how certain rational directionality is compatible with the possibility of deglobalisation, disintegrative tendencies, and “gridlock” in gl978-3-031-32307-2978-3-031-32305-8Series ISSN 2522-0985 Series E-ISSN 2522-0993 作者: 血友病 時(shí)間: 2025-3-30 22:56
,Schalten kleiner induktiver Str?me,b und wie ein EDV-Softwaresystem diese Zielvorstellungen wirtschaftlich realisiert, um dann in einer zweiten Phase seine Entwicklung vorzunehmen. In einer dritten Phase erfolgt schlie?lich die übernahme der Software in den aktuellen Betrieb.作者: 遺棄 時(shí)間: 2025-3-31 03:21 作者: Homocystinuria 時(shí)間: 2025-3-31 08:04