派博傳思國(guó)際中心

標(biāo)題: Titlebook: Wireless Internet; 11th EAI Internation Jiann-Liang‘Chen,Ai-Chun Pang,Chun-Cheng Lin Conference proceedings 2019 ICST Institute for Compute [打印本頁]

作者: 投射技術(shù)    時(shí)間: 2025-3-21 19:54
書目名稱Wireless Internet影響因子(影響力)




書目名稱Wireless Internet影響因子(影響力)學(xué)科排名




書目名稱Wireless Internet網(wǎng)絡(luò)公開度




書目名稱Wireless Internet網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Wireless Internet被引頻次




書目名稱Wireless Internet被引頻次學(xué)科排名




書目名稱Wireless Internet年度引用




書目名稱Wireless Internet年度引用學(xué)科排名




書目名稱Wireless Internet讀者反饋




書目名稱Wireless Internet讀者反饋學(xué)科排名





作者: 攝取    時(shí)間: 2025-3-22 00:00
Shaoqian Wang,Bo Li,Mao Yang,Zhongjiang Yanappeared in the literature.In this chapter, we present some of the more recent developments related to the Ostrowski’sinequality (7), not covered in [50,80]. Applications are discussed to illustrate the usefulnessof certain inequalities.
作者: 不知疲倦    時(shí)間: 2025-3-22 02:07
Cheng-yong Liu,Cheng Chenuations. The chemical structure of these polymers is discussed in this Chapter, according to recent studies involving the use of colorimetric evaluations, ultraviolet–visible spectrophotometry, Fourier-transform infrared spectroscopy, thermal decomposition, capillary zone electrophoresis, and chromatographic procedures.
作者: congenial    時(shí)間: 2025-3-22 06:32
Fractional Backoff Algorithm for the Next Generation WLAN their backoff process faster. Simulation results indicate that the area throughput of the eat-B algorithm outperforms the binary exponential backoff (BEB) algorithm adopted by the traditional IEEE 802.11, especially under dense deployment scenarios.
作者: irritation    時(shí)間: 2025-3-22 09:45

作者: SMART    時(shí)間: 2025-3-22 14:51

作者: 善于    時(shí)間: 2025-3-22 17:07
Intrusion Detection for WiFi Network: A Deep Learning Approacheriments, we classified the network records into 4 types: normal record, injection attack, impersonation attack and flooding attack. The classification accuracies we achieved of these 4 types of records are 98.4619., 99.9940., 98.3936. and 73.1200., respectively.
作者: patella    時(shí)間: 2025-3-23 01:03

作者: Debate    時(shí)間: 2025-3-23 04:41
1867-8211 ld in Taipei, Taiwan, in October 2018. The 36 full papers were selected from 79 submissions and are grouped into the following topics: wireless network, artificial intelligence, security, IoT, location-based services, financial applicatiosn, vehicular ad hoc network, services and applications..978-3
作者: Aids209    時(shí)間: 2025-3-23 08:03
Chih-Cheng Tseng,Hwang-Cheng Wang,Ling-Han Wang divergence delay problem is formulated and its hardness is explained. We then propose a solution based on discrete abstraction. Moreover, the proposed framework is applied to a scheduling problem of intermittent androgen suppression to delay the relapse of prostate cancer.
作者: 稱贊    時(shí)間: 2025-3-23 12:37

作者: 吼叫    時(shí)間: 2025-3-23 17:12
variety of networking environments is one of the primary reasons for its large scale deployment. In this chapter we provide an overview of the TCP along with brief description of its internal mechanisms like reliable delivery and congestion control that that are key to our understanding of the Incast phenomena.
作者: FAWN    時(shí)間: 2025-3-23 19:07
Chia-Ming Hsu,He-Yen Hsieh,Setya Widyawan Prakosa,Muhammad Zulfan Azhari,Jenq-Shiou Leucs along with some examples and explain the necessity of adopting the so-called .-decomposition idea. Furthermore, the current bottleneck is briefly discussed. Finally, we outline the methodology proposed in this book.
作者: extemporaneous    時(shí)間: 2025-3-24 00:34

作者: 中古    時(shí)間: 2025-3-24 02:36
Hsing-Chung Chenthe breakdown voltage is calculated for DG- and SG-GNRFETs and the trends and profiles are discussed. Table?. shows default values for all the parameters which can be used for repeating the experiments.
作者: ungainly    時(shí)間: 2025-3-24 08:07
Improving Uplink Resource Batch Utilization in LTE Licensed-Assisted Accesso the case when all resource batches are under random or scheduled access by all UEs, the numerical results show that the proposed approach is a viable solution in the design of LAA under different degrees of interference from Wi-Fi.
作者: Tdd526    時(shí)間: 2025-3-24 11:55
Improving Uplink Resource Batch Utilization in LTE Licensed-Assisted Accessechnology that can be applied to deliver services in the 5?GHz unlicensed spectrum. In general, there are two schemes to access the unlicensed spectrum, namely, random access and scheduled access. Two types of UEs, basic and premium, with two different preferences are considered. Without violating t
作者: AORTA    時(shí)間: 2025-3-24 17:48

作者: murmur    時(shí)間: 2025-3-24 23:03

作者: Phenothiazines    時(shí)間: 2025-3-25 02:43
A60?GHz UWB-MIMO Antenna with Defected Ground for WPAN Applicationsour folded L-shaped strips patch which has very compact size of 2, 2?×?2, 2 mm.. A line-slot is etched on the ground to reduce the mutual coupling on the 60?GHz band. Four other no-ended slots are etched on subtract to improve the impedance matching and to enlarge the bandwidth. Proposed antenna is
作者: 谷物    時(shí)間: 2025-3-25 07:11
Research and Performance Evaluation of Spatial Reuse Technology for Next Generation WLANlogy to improve the spectrum utilization, manage the multi-BSSs interferences and increase the possibility of simultaneous transmissions. This paper firstly introduces the SR technologies of IEEE 802.11ax in detail. After that, to fully verify the performance, we build a system & link level integrat
作者: 使糾纏    時(shí)間: 2025-3-25 07:49

作者: 不理會(huì)    時(shí)間: 2025-3-25 12:10

作者: 值得尊敬    時(shí)間: 2025-3-25 17:23
An Efficient MapReduce-Based Apriori-Like Algorithm for Mining Frequent Itemsets from Big Datatitiveness. Apriori is a classic algorithm for mining frequent itemsets. Recently, with rapid growth of the Internet as well as fast development of information and communications technology, the amount of data is augmented in an explosive fashion at a speed of tens of petabytes per day. These rapidl
作者: ARENA    時(shí)間: 2025-3-25 21:52
Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detectioncritical obstacles behind this massive development. Security becomes the hottest issue among the researchers. In this study, we focus on intrusion detection system (IDS) which is one of the solutions for security problems on network administration. Since intrusion detection system is a kind of class
作者: Obligatory    時(shí)間: 2025-3-26 02:58
Intrusion Detection for WiFi Network: A Deep Learning Approach intrusion activities are growing rapidly. Therefore, the continuous improvement of Intrusion Detection Systems (IDS) is necessary. In this paper, we analyse different types of network attacks in wireless networks and utilize Stacked Autoencoder (SAE) and Deep Neural Network (DNN) to perform network
作者: 前奏曲    時(shí)間: 2025-3-26 04:57
Audio Event Detection Using Wireless Sensor Networks Based on Deep Learningsification system helps its users, especially elderly, on their everyday needs. In this paper, we propose using convolutional neural networks (CNN) for classifying audio streams. In contrast to AAL systems using traditional machine learning, our solution is capable of learning and inferring activiti
作者: Supplement    時(shí)間: 2025-3-26 11:07
A Robust Remote Authentication Scheme for M-Commerce Environmentsmited devices over insecure networks has become an important issue. In this paper, we present a robust authentication scheme for the mobile device (a non-tamper-resistant device in which the secret authentication information stored in it could be retrieved) to solve the challenging lost device probl
作者: libertine    時(shí)間: 2025-3-26 13:05
MIH-Based eNB Selection for Untrusted Networksent which comprises networks of different technologies. Also, during a User Equipment’s (UE’s) handover, it would be better if we can choose a suitable eNB as the next eNB (NeNB) to serve this UE. Generally, this can be achieved with the help of Common Radio Resource Management (CRRM). In this study
作者: foliage    時(shí)間: 2025-3-26 17:42
Using Instant Messaging for Collaboration: A Study of the Relationships Among Organizational Trust, terprise’s most important assets, and it is important for administrators to grasp the psychology of their staff. Modern technology provided by mobile instant messaging (IM) has created a communication revolution, creating a culture of “texting rather than talking” through the use of smart phone mobi
作者: 致命    時(shí)間: 2025-3-26 21:47

作者: FAST    時(shí)間: 2025-3-27 02:02

作者: Graphite    時(shí)間: 2025-3-27 07:09

作者: invert    時(shí)間: 2025-3-27 11:19
Yu-Sun Liu,Shingchern D. You,Zong-Ru Jhan,Meng-Fan Li deduced from the motion of islands and rods. Here, we show that unstable periodic orbits can also act as ghost rods, as long as material lines can “fold” around the orbit, which requires the orbit to be parabolic. We investigate the factors that determine the effective size of ghost rods, that is, the magnitude of their impact on material lines.
作者: 謊言    時(shí)間: 2025-3-27 14:55
Syrine Lahmadi,Jamel Bel Hadj Taharmount of plasticity prior to the occurrence of gross fracture. It is also a prerequisite to the success of these processes that workpiece materials have lower shear strength or wear resistance than that of the tool materials.
作者: 長(zhǎng)矛    時(shí)間: 2025-3-27 21:15

作者: 發(fā)起    時(shí)間: 2025-3-28 01:42

作者: 解凍    時(shí)間: 2025-3-28 04:35
Comparative Study of Two Signal-to-Noise Ratio Calculation Methods in LTE Downlink Simulationser BER than using ensemble-average SNR, but also reverses the ordering of BER performance among the channel models. We thus suggest that in order to fully disclose their implications on performance, the BERs measured against the two SNRs should be presented side by side in LTE downlink simulation studies.
作者: 致敬    時(shí)間: 2025-3-28 08:40

作者: thyroid-hormone    時(shí)間: 2025-3-28 13:58
A Trust Evaluation Gateway for Distributed Blockchain IoT Networkway is first proposed for distributed BC IoT network. Finally, the three types of trust evaluation functionfor Machine to Individual (M2I), Machine to Machine (M2M), and Individual to Individual (I2I), selectively, are proposed and provided an appropriate solution for solving the online authentication problem in distributed BC IoT network.
作者: 善辯    時(shí)間: 2025-3-28 15:43
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/w/image/1028979.jpg
作者: STENT    時(shí)間: 2025-3-28 20:07
https://doi.org/10.1007/978-3-030-06158-6artificial intelligence; computer networks; congestion control (communication); data communication syst
作者: 跟隨    時(shí)間: 2025-3-29 00:18
978-3-030-06157-9ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019
作者: ferment    時(shí)間: 2025-3-29 03:59
Wireless Internet978-3-030-06158-6Series ISSN 1867-8211 Series E-ISSN 1867-822X
作者: LURE    時(shí)間: 2025-3-29 08:10
Es gibt unz?hlige psychologische Ratgeber, wie man sich am besten auf Prüfungen vorbereiten kann. Auch wenn es darunter nützliche Hinweise geben mag, zielen sie oft eher auf Aspekte wie Nervosit?t oder Prüfungsangst ab, die man nicht oder nur sehr schwer beeinflussen kann.
作者: TOXIN    時(shí)間: 2025-3-29 11:52
Peng Tan,Ding Wang,Mao Yang,Zhongjiang Yan,Bo Litric likelihood methods, and semi-parametric likelihood methods developed under a variety of copula models. All these approaches employ an ., a copula function that is completely specified including its parameter value to avoid the non-identifiability.
作者: reserve    時(shí)間: 2025-3-29 16:39
Ching-Ming Chao,Po-Zung Chen,Shih-Yang Yang,Cheng-Hung Yenms, in which the usual Lebesgue measure is replaced by a reflection-invariant weighted measure. The authors’ focus is on the analysis side of both h-harmonics and Dunkl transforms.Graduate students and researchers working in approximation theory, harmonic analysis, and functional analysis will benefit from this book.
作者: 好開玩笑    時(shí)間: 2025-3-29 22:17

作者: reaching    時(shí)間: 2025-3-29 23:54
Fang-Yie Leu,Kun-Lin Tsai,Rui-Ting Hungrent conditions and configurations, starting with transient slip flow and steady, transient, and periodic convection, also in the slip flow regime, for simple parallel plates and circular capillary tube geometries.
作者: squander    時(shí)間: 2025-3-30 05:20

作者: 取之不竭    時(shí)間: 2025-3-30 10:47
Deep Learning for Smartphone-Based Human Activity Recognition Using Multi-sensor Fusion challenges in smartphone-based HAR, such as device location and subject dependency, and manual feature extraction. We showed that the CNN model accomplished location- and subject-independent recognition with overall accuracy of 98.38% and 90.61%, respectively. The LSTM model also performed location
作者: 智力高    時(shí)間: 2025-3-30 14:31
An Efficient MapReduce-Based Apriori-Like Algorithm for Mining Frequent Itemsets from Big Dataset mining algorithm called Apriori-MapReduce (abbreviated as AMR). The salient feature of AMR is that it deletes the items of itemsets lower than the minimum support from the transaction database. In such a way, it can greatly reduce the generation of candidate itemsets to avoid a memory shortage a
作者: Credence    時(shí)間: 2025-3-30 18:25
Using Long-Short-Term Memory Based Convolutional Neural Networks for Network Intrusion Detectionffers the solution to overcome this issue. We propose two deep learning models which are long-short-term memory only (LSTM-only) and the combination of convolutional neural networks and LSTM (CNN-LSTM) for intrusion detection system. Both proposed methods achieve better accuracy than that of the exi
作者: PALL    時(shí)間: 2025-3-30 23:30
A Robust Remote Authentication Scheme for M-Commerce Environments problem. However, the computation of the quadratic congruence is very efficient. It only needs one squaring and one modular operations in the mobile device end, which is much cheaper than the expensive modular exponentiation used in those schemes based on the discrete logarithm problem. Thus, using
作者: contradict    時(shí)間: 2025-3-31 03:18

作者: Deject    時(shí)間: 2025-3-31 07:34
Using Instant Messaging for Collaboration: A Study of the Relationships Among Organizational Trust, rganizational trust and organizational justice. The findings suggested that organizations should utilize the benefits of IM, create an organizational justice strategy, offer better human resource management, and create an environment in which employees’ organizational spirituality can be enhanced.
作者: Chivalrous    時(shí)間: 2025-3-31 09:32

作者: 小說    時(shí)間: 2025-3-31 15:48
s. Thisbookisthe?rstvolumeofathreevolumeintroductiontoanalysis.It- veloped from courses that the authors have taught over the last twenty six years at theUniversitiesofBochum,Kiel,Zurich,BaselandKassel.Sinceweh978-3-7643-7153-1978-3-7643-7323-8
作者: 脫水    時(shí)間: 2025-3-31 21:34
Zhao Shen,Bo Li,Mao Yang,Zhongjiang Yan,Xiaobo Li,Yi Jinion step because of the relatively high cost of the stationary phases. Table 4-1 summarizes some of the HPLC systems used in the separation of sterols and some related compounds (3-oxo steroids, triterpene alcohols). Because of the similarity of many of these separations, only representative example
作者: 單純    時(shí)間: 2025-3-31 22:18
Huang Neng-Tang,Lee Hui-Lin 2008) that occurred during this phase played havoc in terms of their impact on India’s trade relation. Though, in absolute terms, advanced nations with freely floating exchange rate system trade more with India, a proportional impact of the nations with fixed exchange peg or exchange rate arrangeme
作者: TRACE    時(shí)間: 2025-4-1 04:39
rial.Suitable for self-study, as preparation for advanced stLogical thinking, the analysis of complex relationships, the recognition of und- lying simple structures which are common to a multitude of problems — these are the skills which are needed to do mathematics, and their development is the mai
作者: 大看臺(tái)    時(shí)間: 2025-4-1 09:45





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
延安市| 漳平市| 汉阴县| 连云港市| 土默特左旗| 万载县| 定南县| 横山县| 文山县| 泸定县| 留坝县| 临清市| 武乡县| 石嘴山市| 台东市| 秭归县| 固原市| 平南县| 福州市| 贡嘎县| 喀喇沁旗| 类乌齐县| 新化县| 泸西县| 高邮市| 冕宁县| 庆阳市| 凉城县| 界首市| 青田县| 河北省| 玛纳斯县| 新昌县| 赤水市| 通辽市| 柞水县| 阳城县| 霍林郭勒市| 罗城| 牡丹江市| 巴青县|