福建体育彩票36选七的走向图

Skip to main content

you're using an out-of-date version of internet explorer.

To browse zenjw.icu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.

Cognitive Radio Networks (CRNs) are being studied intensively. The major motivation for this is the heavily underutilized frequency spectrum. CRN has the capability to utilize the unutilized frequency spectrum. Routing in CRN is a... more
In this paper, we unified two new algorithms, i.e., to selectively Bordercast the control packets in order to reduce the network load by limiting the number of control packets when ZRP searches for a new route. The second algorithm is... more
There is a great need for having reliable and accurate positioning technique for many wireless network technologies such as the Wireless Ad Hoc Networks, Wireless Sensor Networks, Vehicular Ad Hoc Networks, and Wireless Local Area... more
Future wireless communication system have to be designed to integrate features such as high data rates, high quality of service and multimedia in the existing communication framework. Increased demand in wireless communication system has... more
This paper describes a new way of providing security for objects; the object can either be a file or an automotive like car, etc. The method used for providing security to objects is by creating a virtual fence around the object in such a... more
This manuscript summarizes the results of the geospatial analysis undertaken by means of Generic Mapping Tools (GMT). The comparative assessment of the bathymetry of the Kuril-Kamchatka hadal trench was performed for southern and northern... more
Using image enhancement algorithm for Medical image and with color and black&white ‎Medical images, by using matlab Programs.image enhancement is one of the most important and ‎default components in image research. The aim of image... more
Security remains a major challenge to most emerging technologies (ETs). Although, emerging technologies offer potential benefits which ease systems and human activities, but they also have some security issues that often affect their... more
This survey paper encapsulates the various deep learning algorithms employed on video data. Scarce of research has been conducted for classification, clustering and tagging the videos in social networks such as YouTube, Facebook. Instead... more
Blockchain technology is considered as one of the fourth industrial revolution technologies that is transforming governments. This study systematically reviews literature on research into blockchain technologies for government with the... more
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join the mobile ad hoc network, contention and congestion are more likely. The on demand routing protocols which broadcasts control... more
Grid environment is a service oriented infrastructure in which many heterogeneous resources participate to provide high performance computation. One of the bug issues in the grid environment is the uncertainty among registered resources.... more
Lane detection and tracking is one of the key features of advanced driver assistance system. Lane detection is finding the white markings on a dark road. Lane tracking use the previously detected lane markers and adjusts itself according... more
International Journal of Information Technology Convergence and services (IJITCS) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology Convergence... more
11th International Conference on Ad hoc, Sensor & Ubiquitous Computing (ASUC 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing.... more
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and... more
... Chanik Park Jeong-Uk Kang Seon-Yeong Park Jin-Soo Kim ... is hereafter referred to as mem-ory “shadowing” (Figure 1(a)). The shadowing offers the best performance possible since all the code is executed in fast SDRAM memory, but... more
Detailed human fingerprints, almost unique, are difficult to change and are permanent on an individual's life, making them suitable as long-term signs of human identity. They may be employed by the police or other authorities to identify... more
The book is available as a paperback via Amazon: ... more
福彩快3下载 山东11选五5开奖走势图 七星彩最近300期 猎鱼达人3d卖号 赢了中福在线几十万不给提现