派博傳思國際中心

標題: Titlebook: Wireless Internet; 12th EAI Internation Der-Jiunn Deng,Ai-Chun Pang,Chun-Cheng Lin Conference proceedings 2020 ICST Institute for Computer [打印本頁]

作者: Lipase    時間: 2025-3-21 19:09
書目名稱Wireless Internet影響因子(影響力)




書目名稱Wireless Internet影響因子(影響力)學科排名




書目名稱Wireless Internet網絡公開度




書目名稱Wireless Internet網絡公開度學科排名




書目名稱Wireless Internet被引頻次




書目名稱Wireless Internet被引頻次學科排名




書目名稱Wireless Internet年度引用




書目名稱Wireless Internet年度引用學科排名




書目名稱Wireless Internet讀者反饋




書目名稱Wireless Internet讀者反饋學科排名





作者: 未成熟    時間: 2025-3-21 21:08
Debby Cintia Ganesha Putri,Jenq-Shiou Leucombining demands of morality and rationality, that he employed for the representative case of British rule in India: the British treatment of India was simultaneously a colonial crime and an instrument of history, for, by breaking down the native social structure and relations, it produced “the onl
作者: EXULT    時間: 2025-3-22 04:26

作者: cravat    時間: 2025-3-22 07:21
Che-Hsuan Yu,Hung-Yuan Chen,Fang-Yie Leu,Yao-Chung Fan
作者: frivolous    時間: 2025-3-22 12:35

作者: CYN    時間: 2025-3-22 14:04

作者: esthetician    時間: 2025-3-22 19:35
A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensorithm of machine learning K-Nearest Neighbors (KNN). Through our a thorough simulation-based performance analysis, we demonstrate that our model DRL-IDS returns superior performance in terms of improved detection rate and enhancement the production of accuracy with reduced number of false alarms com
作者: 和藹    時間: 2025-3-22 21:11

作者: 終止    時間: 2025-3-23 01:38

作者: 不朽中國    時間: 2025-3-23 09:07
Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony rtificial bee colony algorithm to monitor the state of the sensor nodes in the software-defined network through the controller and take the best decision dynamically. Artificial bee colony algorithms are used to optimize wireless sensor networks and improve sensor node energy usage and data packets
作者: G-spot    時間: 2025-3-23 11:56
978-3-030-52987-1ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020
作者: Insubordinate    時間: 2025-3-23 17:36

作者: 點燃    時間: 2025-3-23 21:35
Conference proceedings 2020ung, Taiwan, in November 2019.. The 39 full papers were selected from 79 submissions and are grouped into the following topics: Ad hoc and sensor network, artificial intelligence, security and blockchain, internet of things, wireless internet, services and applications..
作者: 尖    時間: 2025-3-24 01:48

作者: saturated-fat    時間: 2025-3-24 02:23

作者: 人造    時間: 2025-3-24 06:37
acturers feel daunted by the task set them. How do they make their products stand out from the crowd — especially among that most demanding and volatile audience of children? Indeed, accepted wisdom is that the child audience (in this context 6–12 years old) is wildly unpredictable. What’s ‘in’ one
作者: 共同確定為確    時間: 2025-3-24 12:07
Debby Cintia Ganesha Putri,Jenq-Shiou Leutically influential concepts of traditional China deserve our special attention. Marx and Engels adopted the language of “Oriental society” from Europe’s worldly thinkers. Along with it they inherited some of the main assumptions and categories of (early) modern European imaginations of Asia, most o
作者: AGATE    時間: 2025-3-24 16:56

作者: AVANT    時間: 2025-3-24 20:53
Efficient Deployment Based on?Congestion Control Delivery in?Multi-hop Wireless Sensor Networkrategy, and this is suitable for minimum access-delay prediction. Finally, the delivery with high efficiency using optimized routing. The experimental results are implemented on the Windows platform, and the performances outperform average throughput, average packet loss, packet delivery ratio, energy-consuming, and system reliability.
作者: induct    時間: 2025-3-25 03:04

作者: Type-1-Diabetes    時間: 2025-3-25 05:32

作者: muscle-fibers    時間: 2025-3-25 09:38

作者: Ganglion    時間: 2025-3-25 13:18

作者: Fibrin    時間: 2025-3-25 15:52

作者: blister    時間: 2025-3-25 21:38
BatTalk: Monitoring Asian Parti-Colored Bats Through the IoT Technologythe baby bats born and raised there would return to their original habitat in the coming year. Also, we proposed an inexpensive manner to identify the bat habitats and bat movement paths by identifying the bat’s ultrasonic signal strength and GPS position, and then show the information in a map.
作者: 全能    時間: 2025-3-26 00:13

作者: SSRIS    時間: 2025-3-26 08:03
A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Net number of paths between the communication nodes on the invulnerability of the path. Through simulation comparison, it is found that this algorithm improves the sensitivity of network invulnerability to the number of paths, and is suitable for communication networks in the case of multiple routing paths.
作者: 不滿分子    時間: 2025-3-26 10:36
A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks the trained convolutional neural network (CNN) for identification. The result of the research shows that the accuracy of the model identification is 94%, and it can be used to identify more than one coin.
作者: mitten    時間: 2025-3-26 14:44
Design and Implementation of Automatic Following Technology for Mobile Deviceshicle applied in manufacturing plants. Vehicles vary with pattern of goods to be moved. If it moves along magnetic tapes, it would lose its flexibility in moving directions. To make vehicles more dynamic and convenient, this study designs and implements automatic following technology of vehicles. Th
作者: ALERT    時間: 2025-3-26 19:25
Efficient Deployment Based on?Congestion Control Delivery in?Multi-hop Wireless Sensor Networkon between linked nodes. For efficient transmission with minimum energy, our proposed work introduces a novel optimized method based on the congestion management algorithm. In our approach based congestion control algorithm was based on the cluster-based routing, since the energy consumption was eff
作者: 半球    時間: 2025-3-26 22:50
A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Netlgorithm lies in two levels, comprehensive consideration of the influencing factors of network to point-to-line network invulnerability. The algorithm considers the influence of the proportion of important nodes of the network on the invulnerability of the network, and considers the influence of the
作者: 結果    時間: 2025-3-27 02:26

作者: foreign    時間: 2025-3-27 05:43
Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNsapplications. In this paper, we propose to address a novel task called . which attempts to capture user intents based on smartphone usage log. The goal of Intention2Text is to learn a deep learning model taking mobile context logs as input and generate sentences as output for describing mobile user
作者: 帶子    時間: 2025-3-27 11:16

作者: Contracture    時間: 2025-3-27 17:32

作者: STEER    時間: 2025-3-27 20:10

作者: 聯(lián)邦    時間: 2025-3-28 00:24
Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemeon system as information for customers in selecting films according to features. The recommendation system can be performed with several algorithms as a grouping such as K-Means, K-Means Mini Batch, Birch Algorithm, Affinity Propagation Algorithm and Mean Shift Algorithm. We recommend methods to opt
作者: POLYP    時間: 2025-3-28 03:19
A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computingmputing resources of devices in the mobile blockchain environment while ensuring the distributed deployment of computing resources and the traceable of transaction data. However, some consensus-level security threats exist in the mobile blockchain environment, i.e., double-spend attacks, long-range
作者: 誘導    時間: 2025-3-28 09:35

作者: exhibit    時間: 2025-3-28 12:57

作者: 保存    時間: 2025-3-28 15:36

作者: 萬花筒    時間: 2025-3-28 19:09

作者: Lucubrate    時間: 2025-3-29 02:14

作者: FLASK    時間: 2025-3-29 04:29
Conference proceedings 2020ung, Taiwan, in November 2019.. The 39 full papers were selected from 79 submissions and are grouped into the following topics: Ad hoc and sensor network, artificial intelligence, security and blockchain, internet of things, wireless internet, services and applications..
作者: covert    時間: 2025-3-29 09:37

作者: aesthetic    時間: 2025-3-29 11:46
1867-8211 ensor network, artificial intelligence, security and blockchain, internet of things, wireless internet, services and applications..978-3-030-52987-1978-3-030-52988-8Series ISSN 1867-8211 Series E-ISSN 1867-822X
作者: 兒童    時間: 2025-3-29 19:35
Management and Minimisation of Uncertainties and Errors in Numerical AerodynamicsResults of the Germa
作者: semble    時間: 2025-3-29 20:59

作者: 公式    時間: 2025-3-30 00:41
Introduction to Molecular Genetics and Recombinant DNA Technologyant DNA methods combine advances in enzymology, nucleic acid biochemistry, and microbial genetics in ways that allow one to ‘cut and paste’ DNA molecules from diverse sources together to form novel DNA molecules and to introduce this DNA into new host cells, where it can be propagated and expressed.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
渑池县| 云龙县| 静海县| 桦甸市| 大埔县| 新乡市| 盐山县| 津市市| 周至县| 海城市| 古浪县| 吴江市| 墨脱县| 石河子市| 元江| 班玛县| 离岛区| 凤翔县| 龙南县| 襄城县| 民和| 泾阳县| 荆门市| 铜陵市| 万源市| 仁怀市| 襄城县| 普定县| 张北县| 亚东县| 农安县| 双峰县| 乐东| 绩溪县| 鄂州市| 思茅市| 额济纳旗| 垫江县| 中方县| 慈利县| 璧山县|