標(biāo)題: Titlebook: Ubiquitous Communications and Network Computing; Second EAI Internati Navin Kumar,R. Venkatesha Prasad Conference proceedings 2019 ICST Ins [打印本頁] 作者: 粘上 時間: 2025-3-21 18:00
書目名稱Ubiquitous Communications and Network Computing影響因子(影響力)
書目名稱Ubiquitous Communications and Network Computing影響因子(影響力)學(xué)科排名
書目名稱Ubiquitous Communications and Network Computing網(wǎng)絡(luò)公開度
書目名稱Ubiquitous Communications and Network Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Ubiquitous Communications and Network Computing被引頻次
書目名稱Ubiquitous Communications and Network Computing被引頻次學(xué)科排名
書目名稱Ubiquitous Communications and Network Computing年度引用
書目名稱Ubiquitous Communications and Network Computing年度引用學(xué)科排名
書目名稱Ubiquitous Communications and Network Computing讀者反饋
書目名稱Ubiquitous Communications and Network Computing讀者反饋學(xué)科排名
作者: 套索 時間: 2025-3-21 20:37 作者: 尾巴 時間: 2025-3-22 02:49
S. Pournamy,Navin Kumarf quantum observable.Introduction to the “noncommutative” maThis book is devoted to aspects of the foundations of quantum mechanics in which probabilistic and statistical concepts play an essential role. The main part of the book concerns the quantitative statistical theory of quantum measurement, b作者: 木質(zhì) 時間: 2025-3-22 05:48
Soma Pandey,Govind Kadambi,Vijay Pandeerns has been a constant concern since the beginning of automatic speech recognition research. In template methods [Sakoe and Chiba, 1978], the acoustic variability modeling of vocabulary consisted in storing several references for the same lexical unit, or in deriving typical sequences of acoustic 作者: Visual-Field 時間: 2025-3-22 11:02 作者: fringe 時間: 2025-3-22 14:53
Anurag Chollangi,Nikhil Ravi Krishnan,Kaustav Bhowmick a matter of great practical importance for both economic and safety reasons. In practice this integrity must be assured by careful attention to many aspects of design, materials, manufacture, inspection, modes of operation and so forth. In the present chapter we are concerned with the pressure vess作者: maverick 時間: 2025-3-22 19:05 作者: 招致 時間: 2025-3-23 00:14 作者: alleviate 時間: 2025-3-23 02:13 作者: RUPT 時間: 2025-3-23 07:15 作者: 舊石器時代 時間: 2025-3-23 10:24
S. Sumithra,R. Vadivelthe De Moivre-Laplace theorem, which can fairly be called the origin of a genuine theory of probability and, in particular, which led the way to numerous investigations that clarified the conditions for the validity of the central limit theorem. Poisson’s theorem on the approximation of the binomial作者: 小教堂 時間: 2025-3-23 15:10 作者: 審問 時間: 2025-3-23 20:14 作者: 神圣將軍 時間: 2025-3-23 23:14 作者: 小畫像 時間: 2025-3-24 05:07 作者: FLIRT 時間: 2025-3-24 06:42 作者: Irksome 時間: 2025-3-24 12:47 作者: 固定某物 時間: 2025-3-24 17:53
Performance Analysis of Femtocell on Channel Allocation,G so that performance remains the highest. The results show that the increase in offered traffic increases the blocking probability. Also, as the base stations increase, BER decreases and the capacity increases.作者: 我正派 時間: 2025-3-24 19:14 作者: ACTIN 時間: 2025-3-25 02:56 作者: 易發(fā)怒 時間: 2025-3-25 03:53
Implementation of Trilateration Based Localization Approach for Tree Monitoring in IoT,consumes more energy. Hence, we require energy efficient routing protocol. To fulfill the purpose we used (RPL) Routing Protocol for Low-Power and Lossy Networks routing protocol which is developed specially for low power and lossy networks. Simulation of the whole system is carried out In Contiki-OS with the help of built-in COOJA simulator.作者: Heresy 時間: 2025-3-25 09:30 作者: Eosinophils 時間: 2025-3-25 15:17
A Comparative Study on Load Balancing Algorithms in Software Defined Networking,e effective management of resources as per client’s request. Based on these parameters i.e. throughput, transaction rate, & response time the qualitative comparison between the load balancing algorithms of SDN is done to generate the best results.作者: 駁船 時間: 2025-3-25 18:37
Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs,in sharing the secret among the sensor nodes in the network and provides efficient security even when the keys are compromised by an attacker node. Simulation results shows that the proposed light weight scheme provides less overhead along with less energy consumption as compared to existing method namely Group Key Management Scheme (GKMS).作者: 痛得哭了 時間: 2025-3-25 20:10
Improving Transition Probability for Detecting Hardware Trojan Using Weighted Random Patterns,dom patterns is proposed. The improvement in the transition probability can accelerate the detection of HTs. This paper implements weighted random number generator techniques to improve the transition probability. This technique is evaluated on ISCAS 85’ benchmark circuit using PYTHON and SYNOPSYS TETRAMAX tool.作者: 使服水土 時間: 2025-3-26 03:37 作者: concubine 時間: 2025-3-26 06:46 作者: MANIA 時間: 2025-3-26 08:58
Optimizing Multi Gateway Wireless Mesh Networks for Throughput Improvement,dition for improving the throughput of Wi-Fi mesh network (WMN) is proposed in the paper. A holistic approach of optimizing the mesh topology by fair distribution of gateways (GW) is developed. Subnets (partitions) are created within the mesh such that each partition has one GW and approximately equ作者: 溝通 時間: 2025-3-26 15:12
Direction Finding Capability in Bluetooth 5.1 Standard,rable with all devices as it consumes a very small amount of energy. The Bluetooth Core Specification provided by Bluetooth Special Interest Group (SIG) will be adding direction finding feature in the Low Energy (LE) standard. This feature will enable a tracker to find the target by estimating the r作者: Indebted 時間: 2025-3-26 20:46
An Investigation of Transmission Properties of Double-Exponential Pulses in Core-Clad Optical Fibers has been presented. The present study has taken the non-linear propagation parameters from Schrodinger’s equation and for silica fiber into consideration. The analysis has been carried out for single-mode and multi-mode fibers, to study the effects of variation in pulse parameters and it has been 作者: 出汗 時間: 2025-3-26 23:50
Hybrid Energy Efficient and QoS Aware Algorithm to Prolong IoT Network Lifetime,dustrial applications. It is very much essential to bring down the energy utilization of every device deployed in IoT network without compromising the quality of service (QoS). Here, the difficulty of providing the operation between the QoS allocation and the energy competence for the industrial IoT作者: Analogy 時間: 2025-3-27 04:22 作者: dapper 時間: 2025-3-27 07:23 作者: Anterior 時間: 2025-3-27 13:18 作者: Accommodation 時間: 2025-3-27 14:46 作者: Graduated 時間: 2025-3-27 18:58 作者: macrophage 時間: 2025-3-27 22:09 作者: accrete 時間: 2025-3-28 04:18
NB-FTBM Model for Entity Trust Evaluation in Vehicular Ad Hoc Network Security, vehicle which is sending data. Trustworthiness could be achieved based on two methods. The first method is creating entity trust and the second one is data trust. This research focuses on evaluating the trustworthiness of the sender entity (vehicle). This paper proposes NB-FTBM: Naive Bayesian Fuzz作者: 平項(xiàng)山 時間: 2025-3-28 09:44
Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs,tworks with limited resources such as energy, transmission range, and processing. The amount of network overhead needs to be reduced to improve the network performance. The size of the secret key to be communicated among the sensor nodes is also contributing in network performance. The Proposed Ligh作者: brachial-plexus 時間: 2025-3-28 11:23
Denoising Epigraphical Estampages Using Nested Run Length Count,the presence of stone texture as a complex background in input samples. In this paper, a nested run length counting with varying block size of 3?*?3, 5?*?5 and 7?*?7 are applied. Computation is carried out on neighboring pixels of the point of interest and discloses whether it is part of the script 作者: GENUS 時間: 2025-3-28 14:41 作者: 巧思 時間: 2025-3-28 22:05 作者: LAVE 時間: 2025-3-28 23:17 作者: Sad570 時間: 2025-3-29 03:15
Time Bound Robot Mission Planning for Priority Machine Using Linear Temporal Logic for Multi Goals,ing solves the problem of moving a robot from a source to a goal configuration while avoiding obstacles. This problem of motion planning gets complicated when the robot is asked to solve a complex goal specification incorporating boolean and temporal constraints between the atomic goals. This proble作者: 佛刊 時間: 2025-3-29 09:21 作者: Outmoded 時間: 2025-3-29 14:11 作者: Credence 時間: 2025-3-29 15:39 作者: Hiatal-Hernia 時間: 2025-3-29 22:00
Ubiquitous Communications and Network Computing978-3-030-20615-4Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 他姓手中拿著 時間: 2025-3-30 03:22 作者: 標(biāo)準(zhǔn) 時間: 2025-3-30 05:51
https://doi.org/10.1007/978-3-030-20615-4advanced communications,; artificial intelligence; cloud computing; cognitive radio, software defined n作者: 把手 時間: 2025-3-30 10:50 作者: 一罵死割除 時間: 2025-3-30 12:54
S. Pournamy,Navin Kumarrning the accuracy of quantum measurements, are discussed in this book in an accessible yet rigorous way. Compared to the first edition, there is a new Supplement devoted to the hidden variable issue. Comments and the bibliography have also been extended and updated.978-88-7642-378-9Series ISSN 2239-1460 Series E-ISSN 2532-1668 作者: 巨碩 時間: 2025-3-30 20:27 作者: glamor 時間: 2025-3-30 21:17
Soumya Nandan Mishra,Suchismita Chinaran Schaltelementen für den Selbsttest mit optimierten Zufallsmustern ist mit dem herk?mmlichen Zufallstest vergleichbar. Aufgrund der behandelten Verfahren kann daher die Klasse der Schaltungen vergr??ert werden, die mit Zufallsmustern selbsttestbar sind, ohne da? signifikante Mehrkosten anfallen.作者: hermetic 時間: 2025-3-31 01:26
Neha Joshi,Deepak Guptaich is quite deliberately incomplete, globally and locally. Many topics, including at least one of everyone‘s favorites, are omitted, among them, infinite divisibility, interchangeability, large devia- tions, ergodic theory and the Markov property. These can be supplied at the discretion and taste o作者: ODIUM 時間: 2025-3-31 06:15 作者: 減去 時間: 2025-3-31 09:33 作者: 身心疲憊 時間: 2025-3-31 13:33
Supriya Movva,Saketh Prata,Sai Sampath,R. G. Gayathrioad you will see during a long journey? If you take a large i. i. d. sample from a 2-dimensional rotationally-invariant distribution, what is the maximum over all half-spaces of the deviation between the empirical and true distributions? These questions cover a wide cross-section of theoretical and