找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Intelligent Communication Technologies and Virtual Mobile Networks; Proceedings of ICICV G. Rajakumar,Ke-Lin Du,Grigorios N. Beligiannis Co

[复制链接]
查看: 53343|回复: 64
发表于 2025-3-21 19:30:57 | 显示全部楼层 |阅读模式
书目名称Intelligent Communication Technologies and Virtual Mobile Networks
副标题Proceedings of ICICV
编辑G. Rajakumar,Ke-Lin Du,Grigorios N. Beligiannis
视频video
概述Presents recent research in intelligent communication technologies and virtual mobile networks.Discusses the outcomes of ICICV 2022, held in Tamil Nadu, India.Serves as a reference guide for researche
丛书名称Lecture Notes on Data Engineering and Communications Technologies
图书封面Titlebook: Intelligent Communication Technologies and Virtual Mobile Networks; Proceedings of ICICV G. Rajakumar,Ke-Lin Du,Grigorios N. Beligiannis Co
描述The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 10–11, 2022. The book shares knowledge and results in theory, methodology and applications of communication technology and mobile networks. The book covers innovative and cutting-edge work of researchers, developers and practitioners from academia and industry working in the area of computer networks, network protocols and wireless networks, data communication technologies and network security.
出版日期Conference proceedings 2023
关键词Communication Technology; Virtual Wireless Networks; Mobile Computing; Edge Computing; Internet of Thing
版次1
doihttps://doi.org/10.1007/978-981-19-1844-5
isbn_softcover978-981-19-1843-8
isbn_ebook978-981-19-1844-5Series ISSN 2367-4512 Series E-ISSN 2367-4520
issn_series 2367-4512
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
The information of publication is updating

书目名称Intelligent Communication Technologies and Virtual Mobile Networks影响因子(影响力)




书目名称Intelligent Communication Technologies and Virtual Mobile Networks影响因子(影响力)学科排名




书目名称Intelligent Communication Technologies and Virtual Mobile Networks网络公开度




书目名称Intelligent Communication Technologies and Virtual Mobile Networks网络公开度学科排名




书目名称Intelligent Communication Technologies and Virtual Mobile Networks被引频次




书目名称Intelligent Communication Technologies and Virtual Mobile Networks被引频次学科排名




书目名称Intelligent Communication Technologies and Virtual Mobile Networks年度引用




书目名称Intelligent Communication Technologies and Virtual Mobile Networks年度引用学科排名




书目名称Intelligent Communication Technologies and Virtual Mobile Networks读者反馈




书目名称Intelligent Communication Technologies and Virtual Mobile Networks读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:52:28 | 显示全部楼层
,Selection of a Rational Composition of İnformation Protection Means Using a Genetic Algorithm,nformation security means (ISM) quantity for sets located on the nodes of the informatization objects’ (OBI) distributed computing system (DCS). Corresponding computational experiments were carried out, during which it was shown that MGA is distinguished by a sufficiently high efficiency. The time s
发表于 2025-3-22 03:18:02 | 显示全部楼层
发表于 2025-3-22 05:15:28 | 显示全部楼层
Systematic Approach for Network Security Using Ethical Hacking Technique,omplex vulnerabilities. It refers to the security flaws in the network or weakness in the web applications. By using the exploits available, the hacker could attack our target system to steal confidential data. So, to secure the security of networks the most common and major technique used is ethica
发表于 2025-3-22 09:29:49 | 显示全部楼层
Analysis of Modulation Techniques for Short Range V2V Communication, over a few hundreds of meters, is being introduced in numerous vehicle designs to equip them with enhanced sensing capabilities. However, it can be subjected to a lot of interference due to sensitivity that can cause potential channel congestion issues. V2V can be complemented using visible light c
发表于 2025-3-22 16:38:44 | 显示全部楼层
Security Requirement Analysis of Blockchain-Based E-Voting Systems,t their vote in ballot paper-based voting systems. Most of the citizens fail to fulfill this constraint and have stayed away from their fundamental duty. . are often considered as one of the efficient alternatives in such situations. . is an emerging technology that can provide a real solution as it
发表于 2025-3-22 20:35:35 | 显示全部楼层
OTP-Based Smart Door Opening System,ake an OTP-based door opening system using Arduino and GSM. The method we have developed will generate a one-time password that helps you unlock the door. This method will enhance the security level further, which is much safer than the traditional key-based system. In the traditional key-based syst
发表于 2025-3-23 00:37:38 | 显示全部楼层
发表于 2025-3-23 01:36:46 | 显示全部楼层
Heart Disease Predictive Analysis Using Association Rule Mining,s. These factors can be used to analyse and predict if a patient is having a risk of getting heart attack. This paper presents a risk factor analysis of factors that result in heart attack and put forth the association between different factors. The analysis of the association can help doctors perso
发表于 2025-3-23 08:38:07 | 显示全部楼层
Cluster-Enabled Optimized Data Aggregation Technique for WSN,dancy is the common cause of problem while the similar data has been gathered from several sensors which require an accurate data aggregation function for providing real-time processing. Originally, the network is framed with the active nodes with groups and the cluster head is elected according to
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-7 06:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表