用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information, Communication and Computing Technology; 5th International Co Costin Badica,Panos Liatsis,Deepak Chahal Conference proceedings

[复制链接]
楼主: Menthol
发表于 2025-3-26 21:43:18 | 显示全部楼层
Tamoghna Sarkar,Anith Patel,Sridhar P. Arjunans. These ones, in turn, strongly depend upon both the dam failure mechanisms and the characteristics of the areas potentially subjected to inundation (i.e. topography, presence of infrastructures, …). Specifically, referring to the embankment dam on Sciaguana River (Sicily, Italy), 2D unsteady flow
发表于 2025-3-27 02:39:26 | 显示全部楼层
Mobility Aware Bandwidth Aggregation Scheme for Heterogeneous Links of Multi-Interface Mobile Nodeerface is upper bounded by its maximum theoretical bandwidth in a given frequency band. Therefore, a need arises to look for alternative solutions to use more bandwidth than the maximum limit of bandwidth of currently in-use interface of mobile node while accessing the Internet. Specifically, more b
发表于 2025-3-27 08:28:46 | 显示全部楼层
Time Series Missing Value Prediction: Algorithms and Applications Unfortunately, in practice, the missing values in the collected data occur frequently and it yields a major challenge to precise the data analysis. The requirement of complete data of the observation becomes important for performing analysis. A series of techniques have been implemented for predict
发表于 2025-3-27 11:38:21 | 显示全部楼层
发表于 2025-3-27 14:16:55 | 显示全部楼层
A Survey of Network Attacks in Wireless Sensor Networkscommunication due to its large number of advantages over traditional wired networks. WSN consists of thousands of sensor nodes which are connected to each other in a network. However, WSN are more prone to security threats and attacks because WSN have very low memory, power and computation capabilit
发表于 2025-3-27 21:24:02 | 显示全部楼层
LiFi Based Scheme for Handover in VANET: A Proposed Approachonally VANET has been exploited for safety of drivers and pedestrians on the road, but now is been also utilized as an infrastructure for intelligent transport systems (ITS). Communication in VANET has always led to frequent handoffs as it is dependent on the vehicular speed along with the number of
发表于 2025-3-28 00:11:25 | 显示全部楼层
发表于 2025-3-28 05:07:09 | 显示全部楼层
A Novel Energy Aware Resource Allocation Algorithm into a P2P Based Fog Computing Environmentd. Efficient resource allocation signifies proper scheduling of the user jobs as per resource requirements that lead to fast completion of tasks, which in turn saves energy and time. Resource allocation is a procedure by which the available proficient resources are allocated to the user devices. In
发表于 2025-3-28 09:47:16 | 显示全部楼层
Network Steganography Using Extension Headers in IPv6to secure data over the networks is through information hiding. The art of hiding data in media files to make it secure from interception is termed as Steganography. Image, Audio, Video, Document, Network packets are different types of medium that are used to hide data within them. On the other hand
发表于 2025-3-28 12:33:55 | 显示全部楼层
Partial Migration for Re-architecting a Cloud Native Monolithic Application into Microservices and Fon as a single large unit of scale is a threat for its agility, testability and maintainability. Complete migration of a monolithic application to microservice or serverless architecture poses additional challenges. Design and development of microservices is complex and cumbersome in comparison to m
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-22 00:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表