找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Systems Design and Intelligent Applications; Proceedings of Secon J. K. Mandal,Suresh Chandra Satapathy,Anirban Mukh Conference

[复制链接]
楼主: 代表
发表于 2025-3-26 23:04:07 | 显示全部楼层
An Efficient Cloud Network Intrusion Detection System,omer on pay-as-you-use basis. With the enormous use of Cloud, the probability of occurring intrusion also increases. Intrusion Detection System (IDS) is a stronger strategy to provide security. In this paper, we have proposed an efficient, fast and secure IDS with the collaboration of multi-threaded
发表于 2025-3-27 02:11:22 | 显示全部楼层
Mobile WiMAX Physical Layer Optimization and Performance Analysis Towards Sustainability and Ubiquiext generation mobile WiMAX is supposed to be based on IEEE 802.16 m which is still in letter ballot stage. This paper attempts to make in depth performance evaluation of Mobile WiMAX under various PHY parameters such as modulation and coding schemes (MCS), cyclic prefixes and different path-loss mo
发表于 2025-3-27 09:03:03 | 显示全部楼层
发表于 2025-3-27 11:43:48 | 显示全部楼层
发表于 2025-3-27 17:40:29 | 显示全部楼层
A Trade-off Analysis of Quality of Service (QoS) Metrics Towards Routing in Mobile Networks: MOGA Bal natures of end-to-end transmission cost and hop-count as QoS metrics are accounted in discrete domain and subsequently, the probability density functions (.) of those important factors are determined. The . of these are transformed into continuous domain to perform mathematical operation and subs
发表于 2025-3-27 20:05:40 | 显示全部楼层
Advanced Bi-directional Home Appliance Communicator with Security System,lds a wireless communication system between the owner of a house and the appliances which are connected within the house. This system intelligently controls the appliances by taking in decisions from the owner using short messaging system (SMS) and also replying with the correct required decision. T
发表于 2025-3-27 22:33:41 | 显示全部楼层
Cyber Attack and Control Techniques,ed class. This class is introduced due to the use of un-updated version of antivirus. Optimal control technique is one of the most efficient techniques to plan strategies for better implementation of resources. We have formulated the model and also developed some theoretical results supported by num
发表于 2025-3-28 03:26:07 | 显示全部楼层
发表于 2025-3-28 09:16:41 | 显示全部楼层
发表于 2025-3-28 11:29:09 | 显示全部楼层
Comparing Efficiency of Software Fault Prediction Models Developed Through Binary and Multinomial Lt. Software fault prediction technique implies a good investment in better design in future systems to avoid building an error prone modules. The study used software metrics effectiveness in developing models in 2 aspects (binary and multinomial) Logistic Regression. We are developing multivariate (
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 22:49
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表