pericardium 发表于 2025-3-26 21:37:38

Integration of IEC 61850 MMS and IEEE 802.22 for Smart Grid Communicationve Radio based IEEE 802.22 is next generation standard for Wireless Regional Area Network (WRAN) that can support long distance wireless communication for low-latency, high-volume, reliable and secure communication. This paper shows the potential to integrate IEC 61850 MMS with IEEE 802.22 for long distance Smart Grid communication.

Statins 发表于 2025-3-27 02:15:56

Attribute Reduction Method Using the Combination of Entropy and Fuzzy Entropy is examined on standard datasets such as Sonar, Spambase and Tick-tack-Toe. Experimental results performed on various datasets show that proposed method gives significant improvement in attribute reduction. In this work, nearest neighbor classifier is used to examine the classification accuracy on original and reduced dataset.

炸坏 发表于 2025-3-27 07:40:08

2367-4512 ive the advances of next generation computer and communicati.Data science, data engineering and knowledge engineering requires networking and communication as a backbone and have wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insight

大雨 发表于 2025-3-27 12:23:08

Wired LAN and Wireless LAN Attack Detection Using Signature Based and Machine Learning Tools take care of Deauthentication attack, Disassociation attack and Access point (AP) spoofing attack. Signature based tools detect these types of the attacks based on the stored signature and timing threshold. But machine learning tools take several different feature to detect these types of attacks with more accuracy and low false positive rate.

vibrant 发表于 2025-3-27 17:01:54

KRUSH-D Approach for the Solution to Node Mobility Issue in Underwater Sensor Network (UWSN)time. It brings in use the Euclidean 3D distance calculation and the famous KRUSKAL algorithm for path selection. The main objective here is to provide a solution for maintaining reliable communication in UWSN. The proposed work is examined using example(s) in order to provide readers clarity.

图表证明 发表于 2025-3-27 21:20:28

http://reply.papertrans.cn/67/6630/662963/662963_36.png

myriad 发表于 2025-3-28 01:52:30

Conference proceedings 2018 engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the advances in these fields from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of ‘International Conference on Recent Advancement

myalgia 发表于 2025-3-28 03:26:22

IP Traceback Schemes for DDoS Attack IP traceback is a way used to catch the real path of web packets in such scenario. This paper provides a schematized investigation of various IP traceback approaches with their fruitful domain and doorway for forthcoming research in this thrust expanse of IP traceback.

打火石 发表于 2025-3-28 08:46:28

NS2 Based Structured Network Attack Scrutiny in MANET. Various attackers use numerous approaches to degrade the network performance. The paper proposes classification to network attacks on MANET by distinguishing them in a structured way with NS2 simulated results. The objective of this paper is to know various attacks and their respective measures to be taken to detect and prevent these attacks.

狼群 发表于 2025-3-28 14:26:43

EKMT-k-Means Clustering Algorithmic Solution for Low Energy Consumption for Wireless Sensor Networksheads and base station. In the proposed protocol the effort was made to improve the energy efficiency of the protocol by re-selecting the cluster head among the most possible cluster heads on the basis of the least distance between new selected cluster head and the base station thus improves throughput and delay.
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Networking Communication and Data Knowledge Engineering; Volume 1 Gregorio Martinez Perez,Krishn K. Mishra,Munesh C. Conference proceedings