標(biāo)題: Titlebook: Wireless Internet; 16th EAI Internation Leandros A. Maglaras,Christos Douligeris Conference proceedings 2024 ICST Institute for Computer Sc [打印本頁] 作者: 法庭 時(shí)間: 2025-3-21 17:50
書目名稱Wireless Internet影響因子(影響力)
書目名稱Wireless Internet影響因子(影響力)學(xué)科排名
書目名稱Wireless Internet網(wǎng)絡(luò)公開度
書目名稱Wireless Internet網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Wireless Internet被引頻次
書目名稱Wireless Internet被引頻次學(xué)科排名
書目名稱Wireless Internet年度引用
書目名稱Wireless Internet年度引用學(xué)科排名
書目名稱Wireless Internet讀者反饋
書目名稱Wireless Internet讀者反饋學(xué)科排名
作者: Gleason-score 時(shí)間: 2025-3-21 20:21 作者: Rodent 時(shí)間: 2025-3-22 00:38 作者: 委屈 時(shí)間: 2025-3-22 08:30
Advanced Digital Services in Health: Global Insights on Security and Privacy Issuespproach that can lead to the implementation of robust solutions. Furthermore, this paper discusses the obstacles both developed and developing countries face regarding digital health, underscoring the need for a unified and international viewpoint.作者: 可商量 時(shí)間: 2025-3-22 11:14
1867-8211 in Athens, Greece, in December 15-16, 2023...?..The 14 full papers were selected from 35 submissions and are grouped into the following topics: Wireless networks; AI/ML systems; 5G/6G networks; and Digital services..978-3-031-58052-9978-3-031-58053-6Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: BRAVE 時(shí)間: 2025-3-22 13:46 作者: 思想 時(shí)間: 2025-3-22 17:17 作者: Ethics 時(shí)間: 2025-3-23 00:59
Proximity-Driven, Load-Balancing Task Offloading Algorithm for?Enhanced Performance in?Satellite-Enaa management horizons. Our research focuses on the emerging challenge of efficiently managing heavy computing tasks in satellite-based mist computing environments. These tasks, crucial in fields ranging from satellite communication optimization to blockchain-based IoT processes, demand significant c作者: 1分開 時(shí)間: 2025-3-23 03:22 作者: 搏斗 時(shí)間: 2025-3-23 07:53
ACSIS: Αn Intelligent Medical System for Improving the Pre-hospital Healthcare Processcal care system. The proposed system effectively dispatches the available ambulances when an incident occurs and provides high quality medical services to the patients as well as transportation to the appropriate hospital. The evaluation of the proposed system, benchmarked via the paired t-test stat作者: Nostalgia 時(shí)間: 2025-3-23 10:49 作者: 蚊子 時(shí)間: 2025-3-23 13:50
Supervised Machine Learning Algorithms for the Analysis of Ship Engine Dataing supervised ML algorithms is performed. In particular, the algorithms that are studied comprehend the Linear Regression (LR), the Ridge Regression (RR), the Decision Tree (DT), as well as Ensemble algorithms. Subsequently, a comparative analysis of the algorithms is performed using a dataset cont作者: SIT 時(shí)間: 2025-3-23 19:16 作者: tolerance 時(shí)間: 2025-3-23 22:51
Comparative Analysis of?Terahertz MAC Protocols for?Wireless Data Centerd through the data centers (DC), therefore bandwidth requirement for DC is increasing. Although, wired technologies are being used, but at the cost of high maintenance, limited flexibility, and high energy consumption. Wireless Terahertz (THz) links can help to overcome these challenges of wired tec作者: Aggregate 時(shí)間: 2025-3-24 03:42 作者: BOGUS 時(shí)間: 2025-3-24 09:32 作者: jeopardize 時(shí)間: 2025-3-24 13:58
Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computingnt of extended reality technology and Internet of Things technology, Metaverse will also usher in greater breakthroughs. However, in the development of the extended reality metaverse under edge computing, many security issues will arise. This paper focuses on data security, considering that data wil作者: 易怒 時(shí)間: 2025-3-24 16:57 作者: 標(biāo)準(zhǔn) 時(shí)間: 2025-3-24 20:28
An Ethereum Based e-Voting Systemlockchain technology could provide some guarantees for voting platforms, such as transparency, immutability, and confidentiality. In most research works, secure and reliable electronic voting systems are required to address known security, anonymity, and fraud issues. This paper presents a secure de作者: BADGE 時(shí)間: 2025-3-24 23:53
Conference proceedings 2024 Greece, in December 15-16, 2023...?..The 14 full papers were selected from 35 submissions and are grouped into the following topics: Wireless networks; AI/ML systems; 5G/6G networks; and Digital services..作者: 保全 時(shí)間: 2025-3-25 06:37
Optimization of Energy Distribution with Demand Response Control in 6G Next Generation Smart GridsSDN technology coupled with network slicing. As a way to achieve power balancing between power generation and demands, this study offers a unique architecture for a smart grid that makes full use of optimization techniques to rationalize the distribution of energy resources. Performance evaluation shows the optimization of resource consumption.作者: 口訣 時(shí)間: 2025-3-25 10:18 作者: 模范 時(shí)間: 2025-3-25 13:34 作者: 上釉彩 時(shí)間: 2025-3-25 18:45
978-3-031-58052-9ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024作者: CRACY 時(shí)間: 2025-3-25 23:27
Wireless Internet978-3-031-58053-6Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: Sad570 時(shí)間: 2025-3-26 03:21
Machine Learning and Explainable Artificial Intelligence in Education and Training - Status and Tren complex. The research field of eXplainable Artificial Intelligence (XAI) tries to fulfill this need. XAI provides a way to help humans understand how an AI’s predictions and decisions come. The scope of this work is to examine the role of XAI in the field of Education, especially in Educational Data Mining in Vocational Education and Training.作者: 可觸知 時(shí)間: 2025-3-26 05:48 作者: 松馳 時(shí)間: 2025-3-26 08:36 作者: ineffectual 時(shí)間: 2025-3-26 12:59
s by the requirement that certain subpictures must be cycles or elementary cycles. We investigate basic properties of context-free cycle and elementary cycle grammars with emphasis on the complexity of the recognition problem. In particular, it is shown that the description complexity is polynomial 作者: 遣返回國 時(shí)間: 2025-3-26 18:10
Mohamed Darqaoui,Moussa Coulibaly,Ahmed Erramiond these two methods that focus on the coarse-grained compatibility modeling, we then devised an unsupervised disentangled graph learning method to uncover the hidden factors affecting the overall compatibility and fulfill the fine-grained compatibility modeling. Moreover, to fully utilize item-att作者: 神刊 時(shí)間: 2025-3-26 21:01 作者: 收集 時(shí)間: 2025-3-27 04:45
hniques to overcome these limitations, such as injecting random attributes, injecting deterministic distance attributes, and building higher-order GNNs. We will present the key insights of these techniques and highlight their advantages and disadvantages.作者: 憤慨一下 時(shí)間: 2025-3-27 08:03 作者: 褲子 時(shí)間: 2025-3-27 10:35
Theodoros Dimitriou,Emmanouil Skondras,Christos Hitiris,Cleopatra Gkola,Ioannis S. Papapanagiotou,Dits. So, several representations by graphs have been proposed for the study of constraint hypergraphs to extend the known results to the binary case. Another approach, finer, is interested in the study of the microstructure of CSP, which is defined by graphs. This helped, offering a new theoretical f作者: 叫喊 時(shí)間: 2025-3-27 16:33 作者: FLIP 時(shí)間: 2025-3-27 19:25
Muhammad Absaruddin,Saim Ghafoor,Mubashir Husain Rehmaniaugmented patterns. A single finite set of augmented patterns can also describe the class of instances such that each instance has a weak near-unanimity polymorphism of arity . (thus covering all tractable language classes).We investigate the power of forbidding augmented patterns and discuss their 作者: 易于出錯(cuò) 時(shí)間: 2025-3-27 22:13 作者: 躺下殘殺 時(shí)間: 2025-3-28 02:48 作者: 加花粗鄙人 時(shí)間: 2025-3-28 08:02
e original proof, via reduction from ., is due to Dom, Lokshtanov and Saurabh..We extend our analysis by showing that, unless ., there do not exist polynomial kernels for ., . and . in .-degenerate graphs for .?≥?2. On the other hand, we show a polynomial kernel for . in graphs that do not contain t作者: 與野獸博斗者 時(shí)間: 2025-3-28 13:44
Jinrong Fu,Yiwen Liu,Haobo Yan,Yahui Yang,Ling Peng,Yuanquan Shi,Tao Feng) and hydrogen bonding interactions affect the behavior of solute in the solvent and partitioning of molecules between different phases. Such consequences of reactivity on the properties of chemical species may be termed .. On the other hand, for many physiologically active molecules, the primary ef作者: 注意到 時(shí)間: 2025-3-28 17:22
x analogue of eulerian graphs are the . graphs. These are graphs that have a cycle that passes through each vertex exactly once and are named after Sir William Rowan Hamilton who devised the Icosian Game for two players. One of the problems in the game required the first player to select a path of f作者: Legion 時(shí)間: 2025-3-28 19:27
Cellular-V2X and?VANET(DSRC) Based End-to-End Guidance for?Smart Parkingt Parking System (SPS). SPS is a technology-driven approach to managing parking spaces more efficiently. In This paper, integration of a Smart Parking System with C-V2X and VANET(DSRC) is proposed, we suggest a new C-V2X and VANET (DSRC) based End-to-End guidance scheme for smart parking. The C-V2X 作者: 不感興趣 時(shí)間: 2025-3-29 00:48
Proximity-Driven, Load-Balancing Task Offloading Algorithm for?Enhanced Performance in?Satellite-Enamenting a round-robin principle for equitable task distribution. The results showed promising outcomes in terms of energy consumption, end-to-end delay, and network usage times, highlighting the algorithm’s effectiveness in specific scenarios. However, it also highlighted areas for future improvemen作者: 合唱隊(duì) 時(shí)間: 2025-3-29 05:35 作者: Congeal 時(shí)間: 2025-3-29 09:48
Comparative Analysis of?Terahertz MAC Protocols for?Wireless Data Centeratterns. With these factors communication in DC can become challenging, so to ensure reliable and efficient communication it is necessary to understand the effect of these factors in the existing THz Medium Access Control (MAC) protocols. In this paper, we compare the existing THz MAC protocols, con作者: 陶醉 時(shí)間: 2025-3-29 13:54
Intelligent Logistics Service Quality Assurance Mechanism Based on Federated Collaborative Cache in a update, and gives the corresponding algorithms and processes. Finally, this paper verifies the effectiveness and performance of the proposed mechanism through simulation experiments. Compared with the traditional centralized cache and distributed cache, the proposed mechanism can reduce the data t作者: 機(jī)構(gòu) 時(shí)間: 2025-3-29 16:08
Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computinglutions, while analyzing other problems that will arise during the development of the extended reality metaverse. Aiming at the security problem on the edge side, a signature authentication scheme is designed based on Elliptic Curve Cryptography (ECC) integrated blockchain encryption technology and 作者: 不足的東西 時(shí)間: 2025-3-29 20:30 作者: 拖債 時(shí)間: 2025-3-30 01:24
An Ethereum Based e-Voting Systemlections with numerous participants, and simplicity. The system is tested and evaluated, vulnerabilities and possible attacks are exposed, and a discussion examines opportunities for enhancing the proposed e-voting system.作者: 媒介 時(shí)間: 2025-3-30 07:56
Messaoud Babaghayou,Noureddine Chaib,Leandros Maglaras,Yagmur Yigit,Mohamed Amine Ferrag,Carol Marsh作者: LVAD360 時(shí)間: 2025-3-30 08:44
Petros Valacheas,Sarandis Mitropoulos,Christos Douligeris