有机体 发表于 2025-3-25 05:21:47

Rechtsextremismus und Neue Rechte in Europa,parison. The computational complexities of 2D DCT and 3D DCT are presented. The quality metrics of the reconstructed images are also presented. It is shown that images that are transformed using 3D DCT have quality close to that of 2D DCT transformed images and it results in higher compression ratios.

BROTH 发表于 2025-3-25 07:55:13

http://reply.papertrans.cn/31/3084/308355/308355_22.png

受伤 发表于 2025-3-25 12:18:29

Adaptive Exponential Trust-Based Algorithm in Wireless Sensor Network to Detect Black Hole and Gray hole nodes, also reducing power consumption. Moreover, the adaptive threshold strategy caters the low false positive rate. The simulation results prove the betterment of proposed method adaptive exponential trust-based algorithm (AETBA) over the established exponential trust-based algorithm (ETBA).

斑驳 发表于 2025-3-25 18:06:48

http://reply.papertrans.cn/31/3084/308355/308355_24.png

antipsychotic 发表于 2025-3-25 21:58:23

http://reply.papertrans.cn/31/3084/308355/308355_25.png

grenade 发表于 2025-3-26 00:43:52

http://reply.papertrans.cn/31/3084/308355/308355_26.png

游行 发表于 2025-3-26 04:36:46

http://reply.papertrans.cn/31/3084/308355/308355_27.png

Instinctive 发表于 2025-3-26 09:37:43

Durchhangslinie des bewegten Riemens,nt parameters. The traffic conditions used in this paper are CBR and FTP which are based on TCP and UDP agents. The instantaneous delay, throughput, and normalized routing load are common measure parameters used to carry out the performance analysis of the AODV routing protocol with and without black hole attack.

ambivalence 发表于 2025-3-26 16:29:51

http://reply.papertrans.cn/31/3084/308355/308355_29.png

拒绝 发表于 2025-3-26 19:27:54

http://reply.papertrans.cn/31/3084/308355/308355_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Emerging Research in Computing, Information, Communication and Applications; ERCICA 2015, Volume N. R. Shetty,N Hamsavath Prasad,N. Nalini