標題: Titlebook: 3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication; WIDECOM 2020 Isaac Woungang,Sanjay Kum [打印本頁] 作者: TINGE 時間: 2025-3-21 16:53
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication影響因子(影響力)
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication影響因子(影響力)學科排名
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication網(wǎng)絡(luò)公開度
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication網(wǎng)絡(luò)公開度學科排名
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication被引頻次
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication被引頻次學科排名
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication年度引用
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication年度引用學科排名
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication讀者反饋
書目名稱3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication讀者反饋學科排名
作者: 笨拙的你 時間: 2025-3-21 23:54 作者: Cpap155 時間: 2025-3-22 03:40 作者: 壓倒性勝利 時間: 2025-3-22 07:57 作者: 鳥籠 時間: 2025-3-22 09:05
Angelique Montgomery,Joshua Steinations were conducted using the iFogSim tool. The comparison between one vehicle and multiple vehicle tracking was done and the results demonstrate that multiple vehicle application model achieved better performance in maintaining low latency. The new model shows inconsistency in data transfer rate 作者: Diaphragm 時間: 2025-3-22 16:27 作者: 沙漠 時間: 2025-3-22 18:53
A Reflection on the Meaning of Fashion take suitable countermeasures. We therefore proposed jamming detection and classification techniques which are based on Machine Learning. We analysed previously used jamming strategies and evaluate them with various performance metrics for jamming detection. In order to collect data, we simulated j作者: TSH582 時間: 2025-3-22 21:18
https://doi.org/10.1007/978-3-031-16773-7xible usage of licensed frequency bands for future application of smart grid can be overcome. The cognitive radio-based smart grid system can also reduce the consumption of power and interoperability among heterogeneous communication networks. This paper presents a survey of spectrum sharing techniq作者: fringe 時間: 2025-3-23 02:55 作者: Favorable 時間: 2025-3-23 08:35
Ana Claudia Alcantara,Mónica Rom?ozinhorain attenuation at different intervals within the duration of any connection’s lifetime. The proposed approach is based on Markovian channel models for three types of rain events, namely widespread, shower and drizzle, and the mitigation of the experienced attenuation by AMC. Simulation results sho作者: 新星 時間: 2025-3-23 13:42
Ana Claudia Alcantara,Mónica Rom?ozinhoith the aim to optimize makespan and energy consumption. Non-domination sorting is used to make sure that all the best solutions in the archive are saved and provides faster convergence. Further, crowding distance is used to sustain the diversity of non-dominated solution in the archive. The simulat作者: relieve 時間: 2025-3-23 17:10 作者: 手榴彈 時間: 2025-3-23 20:31 作者: 兇猛 時間: 2025-3-23 23:46
A P2P Optimistic Fair-Exchange (OFE) Scheme for Personal Health Records Using Blockchain Technologygical doses needed for therapeutic benefit even for the same neuromuscular illness. Some patients can be managed with small doses of corticosteroids whereas others require much higher doses; in addition, others exhibit multiple severe complications whereas others have relatively little adverse effec作者: 反對 時間: 2025-3-24 04:38 作者: arthroplasty 時間: 2025-3-24 09:04 作者: aerial 時間: 2025-3-24 12:01 作者: Hemoptysis 時間: 2025-3-24 15:43
Achieving QoS Upper Bounds for Various MAC Parameters in the VANET,cular diseases and AIDS (Table 1). This epidemic reflects the aging of Western societies as COPD is an age-related disease and the lack of success against the main avoidable culprit, which is smoking, causing about 80–90 % of all COPD-related deaths. Although in the United States smoking is on the d作者: 1分開 時間: 2025-3-24 22:11 作者: 相一致 時間: 2025-3-25 03:06
A Survey on Spectrum Sharing Techniques in Cognitive Radio-Based Smart Grids,ng clinician. Rodney Ledward first discussed this project with me some years ago, and it seemed to me at the time that with his background as both a pharmaceutical chemist and an obstetrician that his talents were particularly well suited to this task. In conjunction with Professor Hawkins, he has p作者: Extort 時間: 2025-3-25 06:53 作者: acclimate 時間: 2025-3-25 10:36
Efficient Resource Utilization for High-Capacity Satellite Networks,d the sociology of drug use has fallen prey to a form of chronocentricism, whereby disciplines forget their past and get caught up in a recurring cycle of new beginnings (Rock, 2005). Nowhere is this more evident than in the critique of deficit based perspectives, which attribute drug use to individ作者: 聲明 時間: 2025-3-25 13:27
Machine Learning Based Detection of Gray-Hole Attack in Mobile Ad-Hoc Networks, mother or father makes of those innate properties of infant behavior to gradually construct meaningful communicative exchanges long before the baby even understands what meaning is: all these aspects of human development are relevant to concerns regarding the effects of maternal substance abuse on 作者: 混雜人 時間: 2025-3-25 19:44 作者: 易于交談 時間: 2025-3-25 23:42
Modified RC-4 Algorithm Against FMS Attack,ician can use the information regarding the pattern of problems asso- ciated with categories of drugs as a guide while making decisions in emergency situations. Second, readers interested in treatment can reevaluate what they consider to be the most ap- propriate efforts as part of their ongoing the作者: 招致 時間: 2025-3-26 03:52
2367-4512 , Toronto, Canada, May 6-8, 2020;.Includes an array of topics networking computing, mobile/ubiquitous systems, cloud systems, and IoT systems;.Addresses issues related to protecting information security and establishing trust in the digital space..978-3-030-44374-0978-3-030-44372-6Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: 點燃 時間: 2025-3-26 07:45 作者: 橫截,橫斷 時間: 2025-3-26 11:44 作者: 改變 時間: 2025-3-26 14:15 作者: 問到了燒瓶 時間: 2025-3-26 18:51 作者: Bronchial-Tubes 時間: 2025-3-27 00:15
Performance Evaluation of SDN-WISE Against RPL-Based Ad-Hoc Wireless Sensor Network Using the Coojaes.Assessment of advantages and disadvantages of each testin.Although the specimen of choice in the US drug testing industry is urine, and serum in clinical medicine, interest has recently grown in the use of other matrices as drug testing media. Drug Testing in Alternate Biological Specimens provid作者: 細查 時間: 2025-3-27 04:54
SNR-Based Multi-Head Selection and Reception Performance for IoT Clustering,cohol testing as a method to identify employees who have used illicit drugs or misused alcohol and/or licit medications in contravention of the policy. Proponents of substance testing tie it to their concern for employee and public safety, and to the impacts that the use/misuse of these drugs could 作者: adipose-tissue 時間: 2025-3-27 07:27
Achieving QoS Upper Bounds for Various MAC Parameters in the VANET,inantly functional bronchial obstruction that is almost entirely reversible, at least at early stages; COPD exposes structural changes and deficits of the respiratory tract, including the lung tissue, that are mostly irreversible. COPD is the typical and most prevalent chronic lung disease of the el作者: CAPE 時間: 2025-3-27 12:53
Machine Learning-Based RF Jamming Classification Techniques in Wireless Ad Hoc Networks,ewborn infant. Perhaps the most spectacular manifestations of these drug interactions are those that result in teratogenic effects, but the implications of drug therapy generally in pregnancy range far wider than the hazards of inducing fetal malformation. It must also be realised that there are haz作者: palliative-care 時間: 2025-3-27 14:35 作者: 增減字母法 時間: 2025-3-27 18:32
Security- and Location-Aware Optimal Virtual Machine Management for 5G-Driven MEC Systems,so highlights what research designs have been employed to address these differences as well as suggests strategies for moving this discourse forward by identifying potential targets for prevention and intervention with minority youth...This book features essays by leading experts in the field who ha作者: 不容置疑 時間: 2025-3-27 22:50
Efficient Resource Utilization for High-Capacity Satellite Networks,minology and was largely formulated under the umbrella of the ‘new’ deviancy theories, which helped to inspire such seminal contributions as Howard Becker’s (1963) . and Jock Young’s (1971) .. Criminological preoccupations soon shifted, however, and with them interest in the sociology of drug use fa作者: FATAL 時間: 2025-3-28 04:54
Machine Learning Based Detection of Gray-Hole Attack in Mobile Ad-Hoc Networks,any extreme disruption of fetal life, childbirth, or postnatal care has deepened by an order of magnitude. We have a more comprehensive view of the effects babies, and mothers and fathers, normally have upon one another. Therefore the task of pediatricians, nurses, and psychologists concerned with h作者: figure 時間: 2025-3-28 09:47
Multi-Objective Scheduling Based on Ant Lion Optimizer in Cloud,ween drug use and regions of multiple problems has now been documented both in the USA (Chein et al., 1964; Preble and Casey, 1969; Nurco, 1972; Hughes, 1977; Nurco et al., 1984; Johnson et al., 1985) and in Britain (Haw, 1985; Parker et al., 1986; Pearson et al., 1986; Peck and Plant, 1986; Mirza e作者: 不再流行 時間: 2025-3-28 13:35 作者: 來這真柔軟 時間: 2025-3-28 17:35 作者: headlong 時間: 2025-3-28 22:11 作者: Glossy 時間: 2025-3-28 22:58
Lecture Notes on Data Engineering and Communications Technologieshttp://image.papertrans.cn/012/image/100845.jpg作者: Delectable 時間: 2025-3-29 05:38
3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication978-3-030-44372-6Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: 幸福愉悅感 時間: 2025-3-29 08:20
https://doi.org/10.1007/978-3-642-17487-2at require a digital exchange, such as banking information, insurance data, health records. In many cases, the exchange exists between unknown and untrusted parties. Therefore, it is essential to execute the data exchange over a fair non-repudiation protocol. In this paper, we propose a P2P fair non作者: ABASH 時間: 2025-3-29 11:33
Lieping Ye,Peng Feng,Qingrui Yue computing technologies has presented new challenges in simulating what a modern botnet could look like, and how effectively they can be executed with the limited resources provided by such technologies. In this short paper, we present a lightweight cross-platform botnet, called Mongoose, that commu作者: outskirts 時間: 2025-3-29 18:58
Hui Li,Guijun Xian,Bo Xiao,Jingyu Wuased on Packet Reception Ratio (PRR). Recently software defined wireless sensor networks (SD-WSN) has driven a lot of attention due to its service oriented architecture. Therefore, in this analysis, we perform simulation experiments comparing Packet Reception Ratio (PRR) for the SDN-WISE SD-WSN syst作者: allergy 時間: 2025-3-29 20:32
Durability of GFRP Reinforcement Barsise ratio (SNR) of cluster nodes for communication with the IoT gateway, those nodes with the top SNRs are selected as heads of the cluster. In the multi-head architecture, the decision for data reception is in accordance with the majority voting from multiple heads. To examine the performance of Io作者: Corroborate 時間: 2025-3-30 00:27
Angelique Montgomery,Joshua Steindes the capabilities of analyzing and evaluating the performance of applications and resource management policies in Fog/IoT environments, based on which designers can model and test their applications. This paper reports on the performance evaluation of a traffic surveillance vehicular network appl作者: 怕失去錢 時間: 2025-3-30 05:41
Brais Martinez,Michel F. Valstar in the communication range of one another. In OppNets, the information exchange among mobile nodes is achieved by exploiting the high mobility and local forwarding of these nodes. In this sense, the routing information is replicated among the mobile nodes in the network, which in turn increases the作者: artifice 時間: 2025-3-30 10:05 作者: sterilization 時間: 2025-3-30 13:28
Bárbara Pino Ahumada,Q’ala Blacker Polancoand primary network with multiple antennas. The main aim is to find the exact secrecy outage of the system. Moreover, each link present in this system suffers from path loss as well as small scale fading. The simulation is performed to check the findings of the result. This present paper reveals the作者: PURG 時間: 2025-3-30 19:51 作者: 去世 時間: 2025-3-30 23:04
https://doi.org/10.1007/978-3-031-16773-7energy or power is distributed from the power plants to the consumers via long-range transmission and distribution networks in the traditional grid networks. In these networks, information monitoring and management are limited to the distribution networks that distribute the electric power within a 作者: 低能兒 時間: 2025-3-31 04:01
Advances in Fashion and Design Research IIven mobile computing applications which can meet virtual computing, storage, and networking resources one-hop away from their locations. In this context, the design of virtual machine (VM) management mechanisms comes out as key issue in cloud orchestration process given the need to provide these app作者: 賠償 時間: 2025-3-31 05:58
Ana Claudia Alcantara,Mónica Rom?ozinhoies in the Ka, Q and V bands. But transmitted signals at these frequencies may experience moderate to severe deterioration due to rain attenuation. Radio Resource Management (RRM) techniques such as Adaptive Modulation and Coding (AMC) and Connection Admission Control (CAC) are usually employed to m作者: abduction 時間: 2025-3-31 11:32
Advances in Fashion and Design Research II of a base system makes substantial security an issue. The ad-hoc networks communication is based on a cooperative environment, which is prone to many network-based attacks. One such attack is Distributed Denial of Service (DDoS) attack. Therefore there is a need to develop an Intrusion Detection Sy