標題: Titlebook: Applied Informatics and Communication, Part V; Intternational Confe Jun Zhang Conference proceedings 2011 Springer-Verlag GmbH Berlin Heide [打印本頁] 作者: 鳴叫大步走 時間: 2025-3-21 16:49
書目名稱Applied Informatics and Communication, Part V影響因子(影響力)
書目名稱Applied Informatics and Communication, Part V影響因子(影響力)學科排名
書目名稱Applied Informatics and Communication, Part V網(wǎng)絡公開度
書目名稱Applied Informatics and Communication, Part V網(wǎng)絡公開度學科排名
書目名稱Applied Informatics and Communication, Part V被引頻次
書目名稱Applied Informatics and Communication, Part V被引頻次學科排名
書目名稱Applied Informatics and Communication, Part V年度引用
書目名稱Applied Informatics and Communication, Part V年度引用學科排名
書目名稱Applied Informatics and Communication, Part V讀者反饋
書目名稱Applied Informatics and Communication, Part V讀者反饋學科排名
作者: 江湖郎中 時間: 2025-3-21 23:12
Practical OFDM Synchronization Algorithm Based on Special Preamble Structured on special preamble structure which includes timing synchronization, fraction frequency offset estimation and integer frequency offset estimation. All synchronization procedure can be completed in time domain, so the algorithm is simple and practical. Simulation results show that the timing synchr作者: 流利圓滑 時間: 2025-3-22 04:07
Crime Location Prediction Based on the Maximum-Likelihood Theoryological analysis of offenders. Then we construct a mathematical model based on the maximum-likelihood theory to make accurate predictions about the anchor point and next crime locations. Then we choose an actual crime cases to test the reliability and utility of our model. Finally, a conclusion tha作者: contradict 時間: 2025-3-22 04:58 作者: 開花期女 時間: 2025-3-22 11:53
Study on the Application of RFID Technology in the Management System of Paper Machine’s Disassembly application of RFID. Then it establishes basic information management of paper machine, marking information management, installation information management, serial communication and other functional modules. The monitoring system adopts VC6.0 and SQL as the original developing tools. At first, it ne作者: Directed 時間: 2025-3-22 13:39
A Fast and Accurate Approach to the Computation of Zernike Momentshese fixed exact coefficients. The digital image is transformed to be inside the unit circle, where the transformed image is divided into eight parts. Based on the specific symmetry or anti-symmetry about the x-axis, the y-axis, the origin, and the straight line y = x, we can generate the Zernike ba作者: NOT 時間: 2025-3-22 19:46 作者: modest 時間: 2025-3-22 21:20
A Three-Dimensional Modeling Method for Irregular Columnar Joints Based on Voronoi Graphics Theoryl engineering, water conservancy and Hydro Power Station. Geometrical characteristics of columnar jointed structures are described and simulated by introducing the Voronoi graphics theory. Based on geometric transformation method, the visualization model of AutoCAD and numerical model of discrete el作者: 故意 時間: 2025-3-23 01:54 作者: 格子架 時間: 2025-3-23 05:38 作者: 假裝是你 時間: 2025-3-23 13:14 作者: ethereal 時間: 2025-3-23 17:36
Access Control Using Trusted Virtual Machine Based on Xen impressive performance and easy to connect to LAN..This paper proposes a method of access control using trusted virtual machine based on Xen. Combined with trusted computing technique and virtualization technique, this model is mainly concerned about safe data access. The key idea is using the isol作者: forebear 時間: 2025-3-23 18:05 作者: 面包屑 時間: 2025-3-23 23:03
Fragile Watermarking Scheme with Pixel-Level Localizationare combined in our schem. A block-wise mechanism is exploited so as to obtain a high detection probability, while a pixel-wise mechanism is used to achieve accurate tamper localization. Both mechanisms can be adjusted and optimized based on application requirements. Meanwhile, forgery of watermark 作者: neutralize 時間: 2025-3-24 04:36
Study on Simulation Software of Personnel Safety Evacuation in Large Public Building Fireftware was developed in this paper. Four occupant types were considered in the model, which have there own personnel characters and can reflect their influence on evacuation. Behavior rules was established in the model, which can describe the normal purposeful movement of the people and can reflect 作者: 任意 時間: 2025-3-24 09:33
Short Term Load Forecasting with Least Square Support Vector Regression and PSOn electricity market. In this paper, an approach based on least square support vector regression (LSSVR) is proposed to short term load forecasting. An effective forecasting model can only be built under optimal parameters. The algorithm of particle swarm optimization is applied to search optimal pa作者: 點燃 時間: 2025-3-24 11:21
GIS-Based Emergency Management on Abrupt Air Pollution Accidents in Counties, Chinaair pollution accidents have occurred and seriously influenced the ecological security. It is important to make systematic studies on the emergency management of abrupt air pollution caused by industrial accidents in counties. Limited researches have been made on it in China and it is almost impossi作者: STALE 時間: 2025-3-24 18:16
A New Granular Computing Model Based on Qualitative Criterion Topological Spaceition operations, during the course of granular information processing. Although it is conducive for the establishment of classical logic to emphasize the certainty of judgment while excluding uncertain identification from the logical category, from the objective point of view, such practice cut off作者: ANIM 時間: 2025-3-24 22:31 作者: 文件夾 時間: 2025-3-25 01:46 作者: 槍支 時間: 2025-3-25 05:01
,Entre Mécanique et Architecture,d on special preamble structure which includes timing synchronization, fraction frequency offset estimation and integer frequency offset estimation. All synchronization procedure can be completed in time domain, so the algorithm is simple and practical. Simulation results show that the timing synchr作者: 作繭自縛 時間: 2025-3-25 10:01 作者: 天空 時間: 2025-3-25 15:42
Living in the House of Nepantlak is set up on factor analysis and gray relational analysis. The innovation lies in four aspects. First, the gray relational clustering is used to remove highly relevant indicators. Second, it uses factor analysis to determine index weight, avoiding more subjective weakness of former research. Third作者: 種類 時間: 2025-3-25 19:30
Living in the House of Nepantlaapplication of RFID. Then it establishes basic information management of paper machine, marking information management, installation information management, serial communication and other functional modules. The monitoring system adopts VC6.0 and SQL as the original developing tools. At first, it ne作者: infringe 時間: 2025-3-25 23:38 作者: 輕而薄 時間: 2025-3-26 03:22
Living in the House of Nepantlang the systems leads to no synchronous sharing of map symbols when sharing geographic data. Taking map symbols as a breakth-rough, the paper analyzes and compares the ArcGIS symbol model with the SLD and provides the mapping mechanism between ArcGIS symbols and SLD symbols to study the symbol sharin作者: 領導權 時間: 2025-3-26 05:40 作者: 紋章 時間: 2025-3-26 09:51 作者: 野蠻 時間: 2025-3-26 13:07 作者: HAVOC 時間: 2025-3-26 17:53
https://doi.org/10.1007/978-3-030-77753-1bjects’ presentation, areal feature matching becomes a key technology in GIS application. This paper proposes a different scale areal feature matching method considering overlapping and adjacent relation. Regarding the polygons as whole entities, a primary matching is proceed due to overlapping rela作者: 商議 時間: 2025-3-27 00:26
Entrepreneurial Activity in Malaysia impressive performance and easy to connect to LAN..This paper proposes a method of access control using trusted virtual machine based on Xen. Combined with trusted computing technique and virtualization technique, this model is mainly concerned about safe data access. The key idea is using the isol作者: Anthology 時間: 2025-3-27 03:33 作者: epidermis 時間: 2025-3-27 07:40
https://doi.org/10.1007/978-3-642-31098-0are combined in our schem. A block-wise mechanism is exploited so as to obtain a high detection probability, while a pixel-wise mechanism is used to achieve accurate tamper localization. Both mechanisms can be adjusted and optimized based on application requirements. Meanwhile, forgery of watermark 作者: 冬眠 時間: 2025-3-27 11:28
Thomas M. Cooney,Michelle Licciardiftware was developed in this paper. Four occupant types were considered in the model, which have there own personnel characters and can reflect their influence on evacuation. Behavior rules was established in the model, which can describe the normal purposeful movement of the people and can reflect 作者: 補助 時間: 2025-3-27 17:28 作者: 預防注射 時間: 2025-3-27 20:29
Eric Clinton,Jordan Robert Gambleair pollution accidents have occurred and seriously influenced the ecological security. It is important to make systematic studies on the emergency management of abrupt air pollution caused by industrial accidents in counties. Limited researches have been made on it in China and it is almost impossi作者: visceral-fat 時間: 2025-3-27 22:44
Maura McAdam,James A. Cunninghamition operations, during the course of granular information processing. Although it is conducive for the establishment of classical logic to emphasize the certainty of judgment while excluding uncertain identification from the logical category, from the objective point of view, such practice cut off作者: dearth 時間: 2025-3-28 02:28
https://doi.org/10.1007/978-3-030-04402-2nal Brownian Motion model, paper proposed a self-similar traffic sequence generation method of RMD algorithm. RMD algorithm is one of the self-similar statistic models. Furthermore, simulation and modeling for Ad-hoc tactic network was implemented based on this kind of traffic model. According to th作者: 舊石器 時間: 2025-3-28 09:30
Applied Informatics and Communication, Part V978-3-642-23223-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 使糾纏 時間: 2025-3-28 13:46 作者: HARD 時間: 2025-3-28 16:03
Characterization of Attributes in Consistent Decision Formal Contextscharacterizations of three different types of attribute sets in consistent decision formal contex. Characteristics of three different types of attribute are examined, and the necessary and sufficient conditions to judge them are also obtained.作者: 乳白光 時間: 2025-3-28 21:25 作者: Tracheotomy 時間: 2025-3-29 01:40
Communications in Computer and Information Sciencehttp://image.papertrans.cn/a/image/159874.jpg作者: BROW 時間: 2025-3-29 04:26
https://doi.org/10.1007/978-3-642-23223-7applied computer science; applied computing; communications; data processing; information processing; int作者: 注意到 時間: 2025-3-29 07:34
978-3-642-23222-0Springer-Verlag GmbH Berlin Heidelberg 2011作者: Bravado 時間: 2025-3-29 12:19
Introduction shifting worlds, una entradao make a preliminary analysis of the temporal and spatial distribution regularity of atmospheric concentrations of methane so as to provide groundwork for further research and development of real time and high sensitive monitoring method of the atmosphere environment in mine areas.作者: Debate 時間: 2025-3-29 18:38
Eric Clinton,Jordan Robert Gamblet air pollution caused by industrial accidents, make effective emergency response measures, guarantee the public security and develop emergency management and prevention systems on abrupt air pollution accidents in counties of China.作者: locus-ceruleus 時間: 2025-3-29 23:37 作者: cyanosis 時間: 2025-3-30 03:20 作者: 勉強 時間: 2025-3-30 07:33 作者: Jocose 時間: 2025-3-30 08:25 作者: 乞討 時間: 2025-3-30 12:29
Conference proceedings 2011s cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing..作者: arsenal 時間: 2025-3-30 18:20 作者: Muffle 時間: 2025-3-30 23:49 作者: 漸變 時間: 2025-3-31 02:53 作者: 嚴重傷害 時間: 2025-3-31 06:21
https://doi.org/10.1057/9781403977137ement method are built with AutoLISP and Fish languages. The three-dimensional modeling method for columnar joints is applied for the Baihetan Hydro Power Station in China. The simulation results show that, Voronoi graphic has great significance for studying the nonlinear mechanical properties of irregular columnar jointed basalt.作者: 消音器 時間: 2025-3-31 09:27
Susan Marlow,Samantha Hicks,Lorna Treanorrameters of the above forecasting model. The experimental results based on above model for a sample load series are shown that the model proposed in this paper outperforms the BP neural network approaches and the simple LSSVR methods on the mean absolute percent error criterion.作者: 無法破譯 時間: 2025-3-31 16:13 作者: 招致 時間: 2025-3-31 21:08
,Entre Mécanique et Architecture,ll synchronization procedure can be completed in time domain, so the algorithm is simple and practical. Simulation results show that the timing synchronization has a high performance even at low SNR in multipath channel and the frequency offset synchronization have a dynamical estimation range and a satisfactory performance.作者: FEIGN 時間: 2025-4-1 00:08 作者: 食品室 時間: 2025-4-1 02:05
Living in the House of Nepantlaove highly relevant indicators. Second, it uses factor analysis to determine index weight, avoiding more subjective weakness of former research. Third, asset risk, liquidity risk, capital risk and profitability risk are considered in the index system.作者: 只有 時間: 2025-4-1 09:38 作者: 鴕鳥 時間: 2025-4-1 11:58