標題: Titlebook: Wireless Internet; 12th EAI Internation Der-Jiunn Deng,Ai-Chun Pang,Chun-Cheng Lin Conference proceedings 2020 ICST Institute for Computer [打印本頁] 作者: Lipase 時間: 2025-3-21 19:09
書目名稱Wireless Internet影響因子(影響力)
書目名稱Wireless Internet影響因子(影響力)學科排名
書目名稱Wireless Internet網絡公開度
書目名稱Wireless Internet網絡公開度學科排名
書目名稱Wireless Internet被引頻次
書目名稱Wireless Internet被引頻次學科排名
書目名稱Wireless Internet年度引用
書目名稱Wireless Internet年度引用學科排名
書目名稱Wireless Internet讀者反饋
書目名稱Wireless Internet讀者反饋學科排名
作者: 未成熟 時間: 2025-3-21 21:08
Debby Cintia Ganesha Putri,Jenq-Shiou Leucombining demands of morality and rationality, that he employed for the representative case of British rule in India: the British treatment of India was simultaneously a colonial crime and an instrument of history, for, by breaking down the native social structure and relations, it produced “the onl作者: EXULT 時間: 2025-3-22 04:26 作者: cravat 時間: 2025-3-22 07:21
Che-Hsuan Yu,Hung-Yuan Chen,Fang-Yie Leu,Yao-Chung Fan作者: frivolous 時間: 2025-3-22 12:35 作者: CYN 時間: 2025-3-22 14:04 作者: esthetician 時間: 2025-3-22 19:35
A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensorithm of machine learning K-Nearest Neighbors (KNN). Through our a thorough simulation-based performance analysis, we demonstrate that our model DRL-IDS returns superior performance in terms of improved detection rate and enhancement the production of accuracy with reduced number of false alarms com作者: 和藹 時間: 2025-3-22 21:11 作者: 終止 時間: 2025-3-23 01:38 作者: 不朽中國 時間: 2025-3-23 09:07
Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony rtificial bee colony algorithm to monitor the state of the sensor nodes in the software-defined network through the controller and take the best decision dynamically. Artificial bee colony algorithms are used to optimize wireless sensor networks and improve sensor node energy usage and data packets 作者: G-spot 時間: 2025-3-23 11:56
978-3-030-52987-1ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020作者: Insubordinate 時間: 2025-3-23 17:36 作者: 點燃 時間: 2025-3-23 21:35
Conference proceedings 2020ung, Taiwan, in November 2019.. The 39 full papers were selected from 79 submissions and are grouped into the following topics: Ad hoc and sensor network, artificial intelligence, security and blockchain, internet of things, wireless internet, services and applications..作者: 尖 時間: 2025-3-24 01:48 作者: saturated-fat 時間: 2025-3-24 02:23 作者: 人造 時間: 2025-3-24 06:37
acturers feel daunted by the task set them. How do they make their products stand out from the crowd — especially among that most demanding and volatile audience of children? Indeed, accepted wisdom is that the child audience (in this context 6–12 years old) is wildly unpredictable. What’s ‘in’ one 作者: 共同確定為確 時間: 2025-3-24 12:07
Debby Cintia Ganesha Putri,Jenq-Shiou Leutically influential concepts of traditional China deserve our special attention. Marx and Engels adopted the language of “Oriental society” from Europe’s worldly thinkers. Along with it they inherited some of the main assumptions and categories of (early) modern European imaginations of Asia, most o作者: AGATE 時間: 2025-3-24 16:56 作者: AVANT 時間: 2025-3-24 20:53
Efficient Deployment Based on?Congestion Control Delivery in?Multi-hop Wireless Sensor Networkrategy, and this is suitable for minimum access-delay prediction. Finally, the delivery with high efficiency using optimized routing. The experimental results are implemented on the Windows platform, and the performances outperform average throughput, average packet loss, packet delivery ratio, energy-consuming, and system reliability.作者: induct 時間: 2025-3-25 03:04 作者: Type-1-Diabetes 時間: 2025-3-25 05:32 作者: muscle-fibers 時間: 2025-3-25 09:38 作者: Ganglion 時間: 2025-3-25 13:18 作者: Fibrin 時間: 2025-3-25 15:52 作者: blister 時間: 2025-3-25 21:38
BatTalk: Monitoring Asian Parti-Colored Bats Through the IoT Technologythe baby bats born and raised there would return to their original habitat in the coming year. Also, we proposed an inexpensive manner to identify the bat habitats and bat movement paths by identifying the bat’s ultrasonic signal strength and GPS position, and then show the information in a map.作者: 全能 時間: 2025-3-26 00:13 作者: SSRIS 時間: 2025-3-26 08:03
A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Net number of paths between the communication nodes on the invulnerability of the path. Through simulation comparison, it is found that this algorithm improves the sensitivity of network invulnerability to the number of paths, and is suitable for communication networks in the case of multiple routing paths.作者: 不滿分子 時間: 2025-3-26 10:36
A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks the trained convolutional neural network (CNN) for identification. The result of the research shows that the accuracy of the model identification is 94%, and it can be used to identify more than one coin.作者: mitten 時間: 2025-3-26 14:44
Design and Implementation of Automatic Following Technology for Mobile Deviceshicle applied in manufacturing plants. Vehicles vary with pattern of goods to be moved. If it moves along magnetic tapes, it would lose its flexibility in moving directions. To make vehicles more dynamic and convenient, this study designs and implements automatic following technology of vehicles. Th作者: ALERT 時間: 2025-3-26 19:25
Efficient Deployment Based on?Congestion Control Delivery in?Multi-hop Wireless Sensor Networkon between linked nodes. For efficient transmission with minimum energy, our proposed work introduces a novel optimized method based on the congestion management algorithm. In our approach based congestion control algorithm was based on the cluster-based routing, since the energy consumption was eff作者: 半球 時間: 2025-3-26 22:50
A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Netlgorithm lies in two levels, comprehensive consideration of the influencing factors of network to point-to-line network invulnerability. The algorithm considers the influence of the proportion of important nodes of the network on the invulnerability of the network, and considers the influence of the作者: 結果 時間: 2025-3-27 02:26 作者: foreign 時間: 2025-3-27 05:43
Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNsapplications. In this paper, we propose to address a novel task called . which attempts to capture user intents based on smartphone usage log. The goal of Intention2Text is to learn a deep learning model taking mobile context logs as input and generate sentences as output for describing mobile user 作者: 帶子 時間: 2025-3-27 11:16 作者: Contracture 時間: 2025-3-27 17:32 作者: STEER 時間: 2025-3-27 20:10 作者: 聯(lián)邦 時間: 2025-3-28 00:24
Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemeon system as information for customers in selecting films according to features. The recommendation system can be performed with several algorithms as a grouping such as K-Means, K-Means Mini Batch, Birch Algorithm, Affinity Propagation Algorithm and Mean Shift Algorithm. We recommend methods to opt作者: POLYP 時間: 2025-3-28 03:19
A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computingmputing resources of devices in the mobile blockchain environment while ensuring the distributed deployment of computing resources and the traceable of transaction data. However, some consensus-level security threats exist in the mobile blockchain environment, i.e., double-spend attacks, long-range 作者: 誘導 時間: 2025-3-28 09:35 作者: exhibit 時間: 2025-3-28 12:57 作者: 保存 時間: 2025-3-28 15:36 作者: 萬花筒 時間: 2025-3-28 19:09 作者: Lucubrate 時間: 2025-3-29 02:14 作者: FLASK 時間: 2025-3-29 04:29
Conference proceedings 2020ung, Taiwan, in November 2019.. The 39 full papers were selected from 79 submissions and are grouped into the following topics: Ad hoc and sensor network, artificial intelligence, security and blockchain, internet of things, wireless internet, services and applications..作者: covert 時間: 2025-3-29 09:37 作者: aesthetic 時間: 2025-3-29 11:46
1867-8211 ensor network, artificial intelligence, security and blockchain, internet of things, wireless internet, services and applications..978-3-030-52987-1978-3-030-52988-8Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 兒童 時間: 2025-3-29 19:35
Management and Minimisation of Uncertainties and Errors in Numerical AerodynamicsResults of the Germa作者: semble 時間: 2025-3-29 20:59 作者: 公式 時間: 2025-3-30 00:41
Introduction to Molecular Genetics and Recombinant DNA Technologyant DNA methods combine advances in enzymology, nucleic acid biochemistry, and microbial genetics in ways that allow one to ‘cut and paste’ DNA molecules from diverse sources together to form novel DNA molecules and to introduce this DNA into new host cells, where it can be propagated and expressed.