Axillary 发表于 2025-3-23 12:49:07
Stable Multi-agent Clustering Method to Improve the Security in VANET,e life of the cluster and reduces the losses of the routing. Group maintenance is handed over to cluster head vehicles after cluster maintenance has been established. The proposed approach is generated in Network Simulator-2 by using some of the performance evaluation such as vehicle rate, vehicle s称赞 发表于 2025-3-23 16:54:25
http://reply.papertrans.cn/17/1622/162144/162144_12.pngGUEER 发表于 2025-3-23 19:08:11
Railway Wagon Health Monitoring System Using E-BMA Protocol in Wireless Sensor Networks,. In order to boost the energy potency more, DED clustering algorithm is implemented. Using this formula a node with higher residual energy, higher degree, and nearer to the base station is more possible elected as a cluster head which saves energy compared to exiting LEACH protocol. Proposed approa使显得不重要 发表于 2025-3-24 00:37:23
An Interactive Virtual E-Learning Framework Using Crowdsourced Analytics,tment score that considers both individual movement and comparability of participation, consequently enables restorative moves to be made when not engaged learners or gatherings are distinguished. The stage enables learners to get to micro lecture videos and other excellent micro lecture assets wher发芽 发表于 2025-3-24 04:18:12
Security for Data in IOT Using a New APS Elliptic Curve Light Weight Cryptography Algorithm,cipher text using his public key and can read the message. This is actually done in the case of a Elliptic Curve Cryptography. The lightweight cipher text is mainly to handle the low resource device on the IOT chain. By considering the naturality of all the devices over the IOT chain and to satisfy持续 发表于 2025-3-24 10:10:51
Advanced Accident Avoiding, Tracking and SOS Alert System Using GPS Module and Raspberry Pi,ill be sent to the authorities with the images of the inside environment of the bus along with GPS location of the bus. The complete system uses RPi build around using ARMII76JZF-S Microprocessor. This has interface devices such as camera, GPS, speakers to microprocessor. This basic goal of this is金盘是高原 发表于 2025-3-24 12:34:56
Review on Traffic Engineering and Load Balancing Techniques in Software Defined Networking,done through the modern age of networking SDN (Software Defined Networking), as it makes optimum use of resources in the network. We can have a quick glance where the techniques of traffic engineering (TE) perform for the traditional networks and even the new concept of networking known as SDN.OVER 发表于 2025-3-24 17:18:54
http://reply.papertrans.cn/17/1622/162144/162144_18.pngCOMMA 发表于 2025-3-24 22:49:35
http://reply.papertrans.cn/17/1622/162144/162144_19.png宠爱 发表于 2025-3-25 02:23:29
Conference proceedings 20210), held at the SRM Institute of Science and Technology, Chennai, India, on 23–24 January 2020. It covers the areas of computational intelligence, artificial intelligence, machine learning, deep learning, big data, and applications of artificial intelligence in networking, IoT and bioinformatics.