收到 发表于 2025-3-23 12:58:46

http://reply.papertrans.cn/83/8235/823409/823409_11.png

deactivate 发表于 2025-3-23 16:03:17

A Dynamic Threshold-Based Cognitive Radio Energy Detection Algorithm for Multi-carrier Waveforms,eform. The presented ED is compared with the conventional ED and Match Filter (MF). The results show that the proposed ED outclasses the conventional ED and MF algorithms and obtains significant throughput with low computational complexity.

ANIM 发表于 2025-3-23 21:13:15

Conference proceedings 2023ommunications, and electronics and communications in general. Featuring work by leading researchers and technocrats, the book serves as a valuable reference resource for young researchers and academics as well as practitioners in industry.

Euthyroid 发表于 2025-3-24 00:17:46

http://reply.papertrans.cn/83/8235/823409/823409_14.png

mettlesome 发表于 2025-3-24 06:12:42

http://reply.papertrans.cn/83/8235/823409/823409_15.png

jettison 发表于 2025-3-24 08:28:10

http://reply.papertrans.cn/83/8235/823409/823409_16.png

寡头政治 发表于 2025-3-24 11:52:36

ABC Algorithm for Evaluating the Performance of the SVC and Optimal Power Flow, systems through the utilisation of a static VAR compensator (SVC). By utilising SVC devices and making use of ABC, the system is able to bring down the overall generating costs of a power system, hence saving money, Also, it helps keep the voltage steady. The ABC is established predicated mostly on

enterprise 发表于 2025-3-24 18:50:06

http://reply.papertrans.cn/83/8235/823409/823409_18.png

一致性 发表于 2025-3-24 21:34:33

JAYA-Based Task Scheduling Algorithm in Fog-Cloud Environment,d increases delay, cost, and energy usage. As a result, fog and other related edge computing paradigms are being used as complementary to the cloud. These computing paradigms execute real-time requests with minimal latency, provide location awareness, resource sharing and mobility while preventing t

无畏 发表于 2025-3-24 23:45:54

BLOCK-FEMF: Efficient Forensic Evidence Management Framework Using Blockchain Technology,computers. It is used to secure, track, and manage digital assets, protecting the data from tampering, revision, and deletion. It provides a secure, immutable, tamper-proof ledger to store digital evidence. Blockchain technology can also track the provenance of digital evidence, ensuring that only a
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Recent Trends in Communication and Intelligent Systems; Proceedings of ICRTC Aditya Kumar Singh Pundir,Anupam Yadav,Swagatam Da Conference