派博傳思國際中心

標題: Titlebook: Advances on Broad-Band Wireless Computing, Communication and Applications; Proceedings of the 1 Leonard Barolli Conference proceedings 2023 [打印本頁]

作者: 搖尾乞憐    時間: 2025-3-21 17:11
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications影響因子(影響力)




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications影響因子(影響力)學科排名




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications網(wǎng)絡公開度




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications網(wǎng)絡公開度學科排名




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications被引頻次




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications被引頻次學科排名




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications年度引用




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications年度引用學科排名




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications讀者反饋




書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications讀者反饋學科排名





作者: 合群    時間: 2025-3-21 23:36
,Performance Comparison of?Roulette Wheel and?Random Selection Methods by?WMN-PSODGA Simulation Systhigh robustness. However, designing a robust WMN at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of mesh routers over the area of interest is a problem that entails thorough planning. In our previous w
作者: 羽毛長成    時間: 2025-3-22 04:18

作者: 思鄉(xiāng)病    時間: 2025-3-22 05:38
,A Simulated Annealing Based Simulation System for?Optimization of?Wild Deer Damage Prevention Devicld deer damages. Therefore, wild deer damage prevention measures using ultrasonic waves are attracting attention. The . (.) using ultrasonic waves can be a good approach. In this paper, we propose a Simulated Annealing (SA) based . placement optimization system for preventing wild deer damages. In t
作者: Brochure    時間: 2025-3-22 10:57

作者: aneurysm    時間: 2025-3-22 15:32

作者: Glutinous    時間: 2025-3-22 19:11

作者: Ardent    時間: 2025-3-22 23:55
,A Study of Network Attack Strategy Using AS?Topology Map,ions. This paper focuses on the activities of it that targets AS and BGP. We analyze possible methods of it and propose a method to localize attack effectiveness. We derive a topology map of AS from BGP logs and analyze its characteristics of it. Focusing on strategies that change it and its charact
作者: 同音    時間: 2025-3-23 02:19

作者: 改正    時間: 2025-3-23 06:40
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition,ic information in a contactless manner using only a smartphone’s camera in everybody’s hands. It is highly convenient because it does not require an ID and uses only biometric information. Furthermore, it is highly user-friendly because the mental load on the user due to the presentation of biometri
作者: 不能妥協(xié)    時間: 2025-3-23 11:39
Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle,ontrol Area Network (CAN) protocol in data exchange via an in-vehicle network. Since CAN message uses broadcast transmission, it becomes hinder to detect the intrusion. Thus, building an intrusion detection system (IDS) and intrusion prevention system (IPS) to IVN is essential, and most effective me
作者: 單純    時間: 2025-3-23 15:14

作者: 好忠告人    時間: 2025-3-23 18:40

作者: Compassionate    時間: 2025-3-23 23:13
,A Fuzzy-Based System for?Estimation of?Landslide Disasters Risk Considering Digital Elevation Modele characteristics of the mountain topography in addition to rainfalls. Fuzzy inference is a good approach for estimation of disaster risk considering rainfalls and topography parameters. Detecting landslide disasters before they happen requires data collection on the wide area. However, monitoring t
作者: Kidney-Failure    時間: 2025-3-24 02:45

作者: 面包屑    時間: 2025-3-24 06:31

作者: 粗俗人    時間: 2025-3-24 12:31

作者: Decrepit    時間: 2025-3-24 18:46
,Evaluation of?the?Information Flow Control in?the?Fog Computing Model,he amount of data kept by entities monotonically increases through manipulating objects in the protocols. Therefore, reduction of the number of operations interrupted is important. For this aim, an FC (Fog Computing) model of the IoT where data from devices are processed in a fog layer and the proce
作者: 厚顏    時間: 2025-3-24 20:00
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition,palmprint region extracted (referred to as the region quality) are important. However, the existing methods studied only extraction stability and had not been evaluated with regard to the region quality. Herein, we propose a palmprint-region estimation method using skeletal information obtained by M
作者: 淡紫色花    時間: 2025-3-25 02:09
,A Study on?Increasing Simultaneous Transmissions After Extended RTS/CTS Handshake on?Full-duplex Wirequired..In this paper, we propose a method to improve communication throughput by selecting multiple secondary senders from primary sender’s neighbors that never interfere with the other primary transmissions. In addition, our proposal make new transmission immediately after the extended RTS/CTS h
作者: Immobilize    時間: 2025-3-25 03:45
,Energy-Consumption Evaluation of?the?Tree-Based Fog Computing (TBFC) Model,
作者: 終端    時間: 2025-3-25 10:23

作者: hermitage    時間: 2025-3-25 14:57

作者: Opponent    時間: 2025-3-25 18:13
Conference proceedings 2023 world. The progress of electronic integration and wireless communications is going to pavethe way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary..
作者: 懶鬼才會衰弱    時間: 2025-3-25 22:34
https://doi.org/10.1007/978-94-007-7244-1he amount of data kept by entities monotonically increases through manipulating objects in the protocols. Therefore, reduction of the number of operations interrupted is important. For this aim, an FC (Fog Computing) model of the IoT where data from devices are processed in a fog layer and the proce
作者: output    時間: 2025-3-26 03:13
https://doi.org/10.1007/978-0-387-76522-8palmprint region extracted (referred to as the region quality) are important. However, the existing methods studied only extraction stability and had not been evaluated with regard to the region quality. Herein, we propose a palmprint-region estimation method using skeletal information obtained by M
作者: noxious    時間: 2025-3-26 04:48

作者: Venules    時間: 2025-3-26 11:51

作者: 過時    時間: 2025-3-26 15:54

作者: 輕快來事    時間: 2025-3-26 19:40
,A Simulated Annealing Based Simulation System for?Optimization of?Wild Deer Damage Prevention Deviche proposed system, we use the OpenStreetMap (OSM) data of the Ogaya, Nishiawakurason, Okayama Prefecture, Japan as the target to be covered by .. The simulation results show that the proposed system makes a good placement of . that maximizes network connectivity and the number of . (.) covered by ..
作者: 審問,審訊    時間: 2025-3-27 00:57

作者: FAR    時間: 2025-3-27 04:07

作者: d-limonene    時間: 2025-3-27 05:42

作者: Hippocampus    時間: 2025-3-27 12:05
Contemporary Sociological Theoryuired huge amount of data of normal state and during the attack. Consequently, there is a high demand for an accurate normal and attack dataset for IVN protection. Therefore, we propose accurate environment configuration for attack data collection from the vehicle.
作者: effrontery    時間: 2025-3-27 17:10

作者: hegemony    時間: 2025-3-27 19:59
https://doi.org/10.1007/978-0-387-76522-8(LDR) considering Digital Elevation Model (DEM). The evaluation results show that the proposed system can estimate LDR according to the rainfall and topography parameter using the real data collected on wide areas by a Wireless Sensor Network (WSN).
作者: 皺痕    時間: 2025-3-27 23:31

作者: Needlework    時間: 2025-3-28 03:10
,A Fuzzy-Based System for?Handover in?5G Wireless Networks Considering Different Network Slicing Cone conclude that the considered parameters have different effects on the Handover Decision (HD). When SD is increased, the HD parameter is increased. But when SB, SS and SR are increasing, the HD parameter is decreased.
作者: 脫落    時間: 2025-3-28 10:00
,An Integrated Fog-VDTN Architecture for?Data Dissemination,d in the vicinity where the vehicles move. Fog nodes will disseminate different data like advertisements or flyers with information to other nodes. Usage of this integrated architecture of fog nodes and VDTNs reduces the cost for data transmission and saves communication resources.
作者: 體貼    時間: 2025-3-28 13:52

作者: stroke    時間: 2025-3-28 18:07

作者: 包裹    時間: 2025-3-28 22:21
,A Fuzzy-Based System for?Estimation of?Landslide Disasters Risk Considering Digital Elevation Model(LDR) considering Digital Elevation Model (DEM). The evaluation results show that the proposed system can estimate LDR according to the rainfall and topography parameter using the real data collected on wide areas by a Wireless Sensor Network (WSN).
作者: DAMN    時間: 2025-3-28 23:01

作者: rectocele    時間: 2025-3-29 04:46

作者: Limpid    時間: 2025-3-29 09:32

作者: 賄賂    時間: 2025-3-29 12:28

作者: Allergic    時間: 2025-3-29 15:50

作者: ANNUL    時間: 2025-3-29 19:44

作者: Fillet,Filet    時間: 2025-3-30 03:47
Contemporary Sociological Theoryance of the HARQ-applied method is compared to the performance of the existing transmission method. As a result of comparative analysis, in the case of 256QAM, the HARQ-applied method at saturation of ?6 dB increased by about 61% compared to the existing method.
作者: 槍支    時間: 2025-3-30 06:06
Contemporary Sociological Theoryt performing meaningless read methods in addition to meaningless write methods. The evaluation results show the total electric energy consumption of servers can be more reduced in the IEEMVTO algorithm than the EEMVTO algorithm.
作者: 考古學    時間: 2025-3-30 09:39
,A Comparison Study of?UNDX and?UNDX-m Methods for?LDVM and?RDVM Router Replacement Methods by?WMN-PX) and Multi-parental UNDX (UNDX-m) methods for two router replacement methods: Linearly Decreasing Vmax Method (LDVM) and Rational Decrement of Vmax Method (RDVM). The simulation results show that the use of UNDX with RDVM achieves full client coverage, better connectivity and improved load balance.
作者: ATP861    時間: 2025-3-30 15:37
,Techno-Economic Analysis of?Cloud Computing Supported by?5G: A Cloud vs on?Premise Based Solutions 5G helps scale all these processes is analyzed. Finally, this article analyzes the conclusions of the work, as well as the result of the techno-economic study that was carried out, to explain to the reader the overall benefits provided to users by exploiting the Cloud Computing technology.
作者: Little    時間: 2025-3-30 19:30

作者: Aspiration    時間: 2025-3-30 21:42

作者: faddish    時間: 2025-3-31 02:38

作者: Libido    時間: 2025-3-31 07:05
,Multi-Version Concurrency Control to?Reduce the?Electric Energy Consumption of?Servers,t performing meaningless read methods in addition to meaningless write methods. The evaluation results show the total electric energy consumption of servers can be more reduced in the IEEMVTO algorithm than the EEMVTO algorithm.
作者: beta-carotene    時間: 2025-3-31 09:57

作者: reception    時間: 2025-3-31 14:17
Contemporary Sociological Theory be used in creation new security applications oriented on application of personal features in security solutions. Human-centered information management allow to facilitate data distribution in cloud infrastructure and distributed systems. Such techniques also allow to increase security of data management procedures.
作者: dearth    時間: 2025-3-31 21:27
Mary S. Corcoran,Samantha K. Westonhigh robustness. However, designing a robust WMN at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of mesh routers over the area of interest is a problem that entails thorough planning. In our previous w
作者: Gentry    時間: 2025-4-1 00:11
L. Ashmore-Hills,A. Burrell,M. Tonkinhigh robustness. However, designing a robust WMN at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of mesh routers over the area of interest is a problem that entails thorough planning. In our previous w




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
西城区| 津南区| 阳曲县| 且末县| 乐山市| 乳源| 大渡口区| 岳普湖县| 收藏| 正定县| 淮北市| 织金县| 娄烦县| 溧水县| 璧山县| 佛冈县| 雅江县| 磐安县| 潢川县| 银川市| 长丰县| 凤翔县| 萨迦县| 兰考县| 甘孜县| 报价| 南岸区| 宜川县| 夏河县| 灵山县| 金湖县| 秦安县| 金门县| 高台县| 通化县| 蒙山县| 囊谦县| 冀州市| 徐州市| 天镇县| 岢岚县|