標題: Titlebook: Advances on Broad-Band Wireless Computing, Communication and Applications; Proceedings of the 1 Leonard Barolli Conference proceedings 2023 [打印本頁] 作者: 搖尾乞憐 時間: 2025-3-21 17:11
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications影響因子(影響力)
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications影響因子(影響力)學科排名
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications網(wǎng)絡公開度
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications網(wǎng)絡公開度學科排名
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications被引頻次
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications被引頻次學科排名
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications年度引用
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications年度引用學科排名
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications讀者反饋
書目名稱Advances on Broad-Band Wireless Computing, Communication and Applications讀者反饋學科排名
作者: 合群 時間: 2025-3-21 23:36
,Performance Comparison of?Roulette Wheel and?Random Selection Methods by?WMN-PSODGA Simulation Systhigh robustness. However, designing a robust WMN at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of mesh routers over the area of interest is a problem that entails thorough planning. In our previous w作者: 羽毛長成 時間: 2025-3-22 04:18 作者: 思鄉(xiāng)病 時間: 2025-3-22 05:38
,A Simulated Annealing Based Simulation System for?Optimization of?Wild Deer Damage Prevention Devicld deer damages. Therefore, wild deer damage prevention measures using ultrasonic waves are attracting attention. The . (.) using ultrasonic waves can be a good approach. In this paper, we propose a Simulated Annealing (SA) based . placement optimization system for preventing wild deer damages. In t作者: Brochure 時間: 2025-3-22 10:57 作者: aneurysm 時間: 2025-3-22 15:32 作者: Glutinous 時間: 2025-3-22 19:11 作者: Ardent 時間: 2025-3-22 23:55
,A Study of Network Attack Strategy Using AS?Topology Map,ions. This paper focuses on the activities of it that targets AS and BGP. We analyze possible methods of it and propose a method to localize attack effectiveness. We derive a topology map of AS from BGP logs and analyze its characteristics of it. Focusing on strategies that change it and its charact作者: 同音 時間: 2025-3-23 02:19 作者: 改正 時間: 2025-3-23 06:40
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition,ic information in a contactless manner using only a smartphone’s camera in everybody’s hands. It is highly convenient because it does not require an ID and uses only biometric information. Furthermore, it is highly user-friendly because the mental load on the user due to the presentation of biometri作者: 不能妥協(xié) 時間: 2025-3-23 11:39
Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle,ontrol Area Network (CAN) protocol in data exchange via an in-vehicle network. Since CAN message uses broadcast transmission, it becomes hinder to detect the intrusion. Thus, building an intrusion detection system (IDS) and intrusion prevention system (IPS) to IVN is essential, and most effective me作者: 單純 時間: 2025-3-23 15:14 作者: 好忠告人 時間: 2025-3-23 18:40 作者: Compassionate 時間: 2025-3-23 23:13
,A Fuzzy-Based System for?Estimation of?Landslide Disasters Risk Considering Digital Elevation Modele characteristics of the mountain topography in addition to rainfalls. Fuzzy inference is a good approach for estimation of disaster risk considering rainfalls and topography parameters. Detecting landslide disasters before they happen requires data collection on the wide area. However, monitoring t作者: Kidney-Failure 時間: 2025-3-24 02:45 作者: 面包屑 時間: 2025-3-24 06:31 作者: 粗俗人 時間: 2025-3-24 12:31 作者: Decrepit 時間: 2025-3-24 18:46
,Evaluation of?the?Information Flow Control in?the?Fog Computing Model,he amount of data kept by entities monotonically increases through manipulating objects in the protocols. Therefore, reduction of the number of operations interrupted is important. For this aim, an FC (Fog Computing) model of the IoT where data from devices are processed in a fog layer and the proce作者: 厚顏 時間: 2025-3-24 20:00
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition,palmprint region extracted (referred to as the region quality) are important. However, the existing methods studied only extraction stability and had not been evaluated with regard to the region quality. Herein, we propose a palmprint-region estimation method using skeletal information obtained by M作者: 淡紫色花 時間: 2025-3-25 02:09
,A Study on?Increasing Simultaneous Transmissions After Extended RTS/CTS Handshake on?Full-duplex Wirequired..In this paper, we propose a method to improve communication throughput by selecting multiple secondary senders from primary sender’s neighbors that never interfere with the other primary transmissions. In addition, our proposal make new transmission immediately after the extended RTS/CTS h作者: Immobilize 時間: 2025-3-25 03:45
,Energy-Consumption Evaluation of?the?Tree-Based Fog Computing (TBFC) Model,作者: 終端 時間: 2025-3-25 10:23 作者: hermitage 時間: 2025-3-25 14:57 作者: Opponent 時間: 2025-3-25 18:13
Conference proceedings 2023 world. The progress of electronic integration and wireless communications is going to pavethe way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary..作者: 懶鬼才會衰弱 時間: 2025-3-25 22:34
https://doi.org/10.1007/978-94-007-7244-1he amount of data kept by entities monotonically increases through manipulating objects in the protocols. Therefore, reduction of the number of operations interrupted is important. For this aim, an FC (Fog Computing) model of the IoT where data from devices are processed in a fog layer and the proce作者: output 時間: 2025-3-26 03:13
https://doi.org/10.1007/978-0-387-76522-8palmprint region extracted (referred to as the region quality) are important. However, the existing methods studied only extraction stability and had not been evaluated with regard to the region quality. Herein, we propose a palmprint-region estimation method using skeletal information obtained by M作者: noxious 時間: 2025-3-26 04:48 作者: Venules 時間: 2025-3-26 11:51 作者: 過時 時間: 2025-3-26 15:54 作者: 輕快來事 時間: 2025-3-26 19:40
,A Simulated Annealing Based Simulation System for?Optimization of?Wild Deer Damage Prevention Deviche proposed system, we use the OpenStreetMap (OSM) data of the Ogaya, Nishiawakurason, Okayama Prefecture, Japan as the target to be covered by .. The simulation results show that the proposed system makes a good placement of . that maximizes network connectivity and the number of . (.) covered by ..作者: 審問,審訊 時間: 2025-3-27 00:57 作者: FAR 時間: 2025-3-27 04:07 作者: d-limonene 時間: 2025-3-27 05:42 作者: Hippocampus 時間: 2025-3-27 12:05
Contemporary Sociological Theoryuired huge amount of data of normal state and during the attack. Consequently, there is a high demand for an accurate normal and attack dataset for IVN protection. Therefore, we propose accurate environment configuration for attack data collection from the vehicle.作者: effrontery 時間: 2025-3-27 17:10 作者: hegemony 時間: 2025-3-27 19:59
https://doi.org/10.1007/978-0-387-76522-8(LDR) considering Digital Elevation Model (DEM). The evaluation results show that the proposed system can estimate LDR according to the rainfall and topography parameter using the real data collected on wide areas by a Wireless Sensor Network (WSN).作者: 皺痕 時間: 2025-3-27 23:31 作者: Needlework 時間: 2025-3-28 03:10
,A Fuzzy-Based System for?Handover in?5G Wireless Networks Considering Different Network Slicing Cone conclude that the considered parameters have different effects on the Handover Decision (HD). When SD is increased, the HD parameter is increased. But when SB, SS and SR are increasing, the HD parameter is decreased.作者: 脫落 時間: 2025-3-28 10:00
,An Integrated Fog-VDTN Architecture for?Data Dissemination,d in the vicinity where the vehicles move. Fog nodes will disseminate different data like advertisements or flyers with information to other nodes. Usage of this integrated architecture of fog nodes and VDTNs reduces the cost for data transmission and saves communication resources.作者: 體貼 時間: 2025-3-28 13:52 作者: stroke 時間: 2025-3-28 18:07 作者: 包裹 時間: 2025-3-28 22:21
,A Fuzzy-Based System for?Estimation of?Landslide Disasters Risk Considering Digital Elevation Model(LDR) considering Digital Elevation Model (DEM). The evaluation results show that the proposed system can estimate LDR according to the rainfall and topography parameter using the real data collected on wide areas by a Wireless Sensor Network (WSN).作者: DAMN 時間: 2025-3-28 23:01 作者: rectocele 時間: 2025-3-29 04:46 作者: Limpid 時間: 2025-3-29 09:32 作者: 賄賂 時間: 2025-3-29 12:28 作者: Allergic 時間: 2025-3-29 15:50 作者: ANNUL 時間: 2025-3-29 19:44 作者: Fillet,Filet 時間: 2025-3-30 03:47
Contemporary Sociological Theoryance of the HARQ-applied method is compared to the performance of the existing transmission method. As a result of comparative analysis, in the case of 256QAM, the HARQ-applied method at saturation of ?6 dB increased by about 61% compared to the existing method.作者: 槍支 時間: 2025-3-30 06:06
Contemporary Sociological Theoryt performing meaningless read methods in addition to meaningless write methods. The evaluation results show the total electric energy consumption of servers can be more reduced in the IEEMVTO algorithm than the EEMVTO algorithm.作者: 考古學 時間: 2025-3-30 09:39
,A Comparison Study of?UNDX and?UNDX-m Methods for?LDVM and?RDVM Router Replacement Methods by?WMN-PX) and Multi-parental UNDX (UNDX-m) methods for two router replacement methods: Linearly Decreasing Vmax Method (LDVM) and Rational Decrement of Vmax Method (RDVM). The simulation results show that the use of UNDX with RDVM achieves full client coverage, better connectivity and improved load balance.作者: ATP861 時間: 2025-3-30 15:37
,Techno-Economic Analysis of?Cloud Computing Supported by?5G: A Cloud vs on?Premise Based Solutions 5G helps scale all these processes is analyzed. Finally, this article analyzes the conclusions of the work, as well as the result of the techno-economic study that was carried out, to explain to the reader the overall benefits provided to users by exploiting the Cloud Computing technology.作者: Little 時間: 2025-3-30 19:30 作者: Aspiration 時間: 2025-3-30 21:42 作者: faddish 時間: 2025-3-31 02:38 作者: Libido 時間: 2025-3-31 07:05
,Multi-Version Concurrency Control to?Reduce the?Electric Energy Consumption of?Servers,t performing meaningless read methods in addition to meaningless write methods. The evaluation results show the total electric energy consumption of servers can be more reduced in the IEEMVTO algorithm than the EEMVTO algorithm.作者: beta-carotene 時間: 2025-3-31 09:57 作者: reception 時間: 2025-3-31 14:17
Contemporary Sociological Theory be used in creation new security applications oriented on application of personal features in security solutions. Human-centered information management allow to facilitate data distribution in cloud infrastructure and distributed systems. Such techniques also allow to increase security of data management procedures.作者: dearth 時間: 2025-3-31 21:27
Mary S. Corcoran,Samantha K. Westonhigh robustness. However, designing a robust WMN at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of mesh routers over the area of interest is a problem that entails thorough planning. In our previous w作者: Gentry 時間: 2025-4-1 00:11
L. Ashmore-Hills,A. Burrell,M. Tonkinhigh robustness. However, designing a robust WMN at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of mesh routers over the area of interest is a problem that entails thorough planning. In our previous w