水土 发表于 2025-3-26 21:43:18

Tamoghna Sarkar,Anith Patel,Sridhar P. Arjunans. These ones, in turn, strongly depend upon both the dam failure mechanisms and the characteristics of the areas potentially subjected to inundation (i.e. topography, presence of infrastructures, …). Specifically, referring to the embankment dam on Sciaguana River (Sicily, Italy), 2D unsteady flow

乐章 发表于 2025-3-27 02:39:26

Mobility Aware Bandwidth Aggregation Scheme for Heterogeneous Links of Multi-Interface Mobile Nodeerface is upper bounded by its maximum theoretical bandwidth in a given frequency band. Therefore, a need arises to look for alternative solutions to use more bandwidth than the maximum limit of bandwidth of currently in-use interface of mobile node while accessing the Internet. Specifically, more b

遗传学 发表于 2025-3-27 08:28:46

Time Series Missing Value Prediction: Algorithms and Applications Unfortunately, in practice, the missing values in the collected data occur frequently and it yields a major challenge to precise the data analysis. The requirement of complete data of the observation becomes important for performing analysis. A series of techniques have been implemented for predict

整洁漂亮 发表于 2025-3-27 11:38:21

http://reply.papertrans.cn/47/4661/466001/466001_34.png

为现场 发表于 2025-3-27 14:16:55

A Survey of Network Attacks in Wireless Sensor Networkscommunication due to its large number of advantages over traditional wired networks. WSN consists of thousands of sensor nodes which are connected to each other in a network. However, WSN are more prone to security threats and attacks because WSN have very low memory, power and computation capabilit

notice 发表于 2025-3-27 21:24:02

LiFi Based Scheme for Handover in VANET: A Proposed Approachonally VANET has been exploited for safety of drivers and pedestrians on the road, but now is been also utilized as an infrastructure for intelligent transport systems (ITS). Communication in VANET has always led to frequent handoffs as it is dependent on the vehicular speed along with the number of

pantomime 发表于 2025-3-28 00:11:25

http://reply.papertrans.cn/47/4661/466001/466001_37.png

惰性气体 发表于 2025-3-28 05:07:09

A Novel Energy Aware Resource Allocation Algorithm into a P2P Based Fog Computing Environmentd. Efficient resource allocation signifies proper scheduling of the user jobs as per resource requirements that lead to fast completion of tasks, which in turn saves energy and time. Resource allocation is a procedure by which the available proficient resources are allocated to the user devices. In

overreach 发表于 2025-3-28 09:47:16

Network Steganography Using Extension Headers in IPv6to secure data over the networks is through information hiding. The art of hiding data in media files to make it secure from interception is termed as Steganography. Image, Audio, Video, Document, Network packets are different types of medium that are used to hide data within them. On the other hand

感情脆弱 发表于 2025-3-28 12:33:55

Partial Migration for Re-architecting a Cloud Native Monolithic Application into Microservices and Fon as a single large unit of scale is a threat for its agility, testability and maintainability. Complete migration of a monolithic application to microservice or serverless architecture poses additional challenges. Design and development of microservices is complex and cumbersome in comparison to m
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information, Communication and Computing Technology; 5th International Co Costin Badica,Panos Liatsis,Deepak Chahal Conference proceedings