找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advanced Network Technologies and Intelligent Computing; Third International Anshul Verma,Pradeepika Verma,Isaac Woungang Conference proce

[复制链接]
查看: 10599|回复: 66
发表于 2025-3-21 18:11:29 | 显示全部楼层 |阅读模式
期刊全称Advanced Network Technologies and Intelligent Computing
期刊简称Third International
影响因子2023Anshul Verma,Pradeepika Verma,Isaac Woungang
视频video
学科分类Communications in Computer and Information Science
图书封面Titlebook: Advanced Network Technologies and Intelligent Computing; Third International  Anshul Verma,Pradeepika Verma,Isaac Woungang Conference proce
影响因子.The 4-volume proceedings set CCIS 2090, 2091,2092 and 2093 constitute the refereed post-conference proceedings of the Third International Conference on Advanced Network Technologies and Intelligent Computing, ANTIC 2023, held in Varanasi, India, during December 20-22, 2023...The 87 full papers and 11 short papers included in this book were carefully reviewed and selected from 487 submissions. The conference papers are organized in topical sections on: ..Part I - Advanced Network Technologies...Part II - Advanced Network Technologies; Intelligent Computing...Part III - IV - Intelligent Computing..
Pindex Conference proceedings 2024
The information of publication is updating

书目名称Advanced Network Technologies and Intelligent Computing影响因子(影响力)




书目名称Advanced Network Technologies and Intelligent Computing影响因子(影响力)学科排名




书目名称Advanced Network Technologies and Intelligent Computing网络公开度




书目名称Advanced Network Technologies and Intelligent Computing网络公开度学科排名




书目名称Advanced Network Technologies and Intelligent Computing被引频次




书目名称Advanced Network Technologies and Intelligent Computing被引频次学科排名




书目名称Advanced Network Technologies and Intelligent Computing年度引用




书目名称Advanced Network Technologies and Intelligent Computing年度引用学科排名




书目名称Advanced Network Technologies and Intelligent Computing读者反馈




书目名称Advanced Network Technologies and Intelligent Computing读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 22:49:22 | 显示全部楼层
Performance Comparison of QoS Aware Power Allocation and Optimization Techniques for the Small-Cell age and capacity. However, the presence of co-channel cells may result in interference among the user stations and degrade the overall system capacity. Hence, resource optimization techniques are required in these scenarios to improve the system capacity and user quality. In this study, the power al
发表于 2025-3-22 00:24:49 | 显示全部楼层
Reduced Competitive Ratio of Sparse Semi-oblivious Routing Using Social Spider Algorithmapproach to tackle this is semi-oblivious routing, which incorporates adaptability to suit dynamic traffic demands with predefined paths. In comparison to other routing methodologies, semi-oblivious routing strategies display superior performance and robustness in practice..Introducing a fresh appro
发表于 2025-3-22 07:10:38 | 显示全部楼层
发表于 2025-3-22 10:35:16 | 显示全部楼层
Detection of Malicious Network Traffic Attacks Using Support Vector Machineraffic attacks is crucial. This research work focuses on the use of Support Vector Machines (SVM) algorithm as a machine learning tool for the detection of network traffic attacks. SVM is a flexible and adaptable classification algorithm that has shown its fruitfulness in multiple domains, including
发表于 2025-3-22 13:06:42 | 显示全部楼层
发表于 2025-3-22 20:16:33 | 显示全部楼层
Enhancing Network Security: A Hybrid Approach for Detection and Mitigation of Distributed Denial-of- (DoS) attack. A DDoS attack involves multiple computers working together to overwhelm a system, making it unavailable. On the other hand, a DoS attack is a one-on-one attempt to make a system or website inaccessible. Thus, it is crucial to construct an effective model for identifying various DDoS i
发表于 2025-3-22 23:04:44 | 显示全部楼层
发表于 2025-3-23 05:23:40 | 显示全部楼层
发表于 2025-3-23 09:10:01 | 显示全部楼层
Optimizing Amazon SageMaker Workloads with Predictive Compute Type Selection Strategiesdiciously. One key element in this process is predicting the most suitable “Compute Type” for various workloads, as different types exhibit varying efficiencies in handling specific tasks. The precision in selecting the appropriate compute type not only leads to enhanced performance but also contrib
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-20 22:16
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表