Computer Science & IT
14,050 Followers
Recent papers in Computer Science & IT
6th International Conference on Computer Science, Engineering and Information Technology (CSITY 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer... more
In terms of identifying the attacker, the Big Data environment helps resolving cyber security problems. There are big data security concerns as well as safety issues that the analyst must understand. The security of confidential data has... more
Implementation of smart cities is going on all over India. The key focus in smart city is to automate the tasks required to monitor the management activities and effective usage of resources. One important task in the city management is... more
The mobile phones are becoming now an irreplaceable utility of every household. It serves as wall clock, alarm clock, calculator, calendar, timer and many more, but have this multi-functionality overloaded the interface of the new... more
8th International Conference on Computer Science and Information Technology (CoSIT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science,... more
Worldwide Interoperability for Microwave Access (WiMAX) networks were expected to be the main Broadband Wireless Access (BWA) technology that provided several services such as data, voice, and video services including different classes of... more
8th International Conference on Computer Science and Information Technology (CoSIT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science,... more
– Multiprotocol Label Switching (MPLS) fasten the speed of packet forwarding by forwarding the packets based on labels and reduces the use of routing table look up from all routers to label edge routers(LER) , where as the label switch... more
In this document, we look at various time domain channel estimation methods with this constraint of null carriers at spectrumborders.We showin detail howto gauge the importance of the " border effect " depending on the number of null... more
There are many software reliability models that are based on the times of occurrences of errors in the debugging of software. It is shown that it is possible to do asymptotic likelihood inference for software reliability models based on... more
11th International Conference on Advanced Computer Science and Information Technology (ICAIT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Advanced... more