標(biāo)題: Titlebook: Artificial Intelligence for Communications and Networks; First EAI Internatio Shuai Han,Liang Ye,Weixiao Meng Conference proceedings 2019 I [打印本頁(yè)] 作者: 詞源法 時(shí)間: 2025-3-21 18:05
書(shū)目名稱Artificial Intelligence for Communications and Networks影響因子(影響力)
書(shū)目名稱Artificial Intelligence for Communications and Networks影響因子(影響力)學(xué)科排名
書(shū)目名稱Artificial Intelligence for Communications and Networks網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Artificial Intelligence for Communications and Networks網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Artificial Intelligence for Communications and Networks被引頻次
書(shū)目名稱Artificial Intelligence for Communications and Networks被引頻次學(xué)科排名
書(shū)目名稱Artificial Intelligence for Communications and Networks年度引用
書(shū)目名稱Artificial Intelligence for Communications and Networks年度引用學(xué)科排名
書(shū)目名稱Artificial Intelligence for Communications and Networks讀者反饋
書(shū)目名稱Artificial Intelligence for Communications and Networks讀者反饋學(xué)科排名
作者: 混沌 時(shí)間: 2025-3-21 20:53
978-3-030-22970-2ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019作者: Enrage 時(shí)間: 2025-3-22 03:25
https://doi.org/10.1007/978-3-322-93854-1perform “shallow learning” and cannot perform deep mining of data features. Aiming at this problem, we use the stacked denoising auto-encoder (SDAE) to superimpose into deep neural network. First, the deep network model was built through the stacked layers of denoising auto-encoder (DAE), then the u作者: paragon 時(shí)間: 2025-3-22 04:33
https://doi.org/10.1007/978-3-663-14126-6terference with enemy radars is of great importance for taking the lead in the battlefield. The evaluation of the synergistic interference effect is an important indicator to measure the performance of the interference equipment. According to the evaluation result, the interference strategy can be c作者: INCH 時(shí)間: 2025-3-22 12:15
https://doi.org/10.1007/978-3-663-14126-6tion methods, ACE-BOC & TD-AltBOC have been brought forward by scholars. The navigation performances of them are aimed to be compared in this paper. Based on analyzing of the power spectrum density function of these two modulation methods, their main navigation performances of code tracking precisio作者: HAWK 時(shí)間: 2025-3-22 16:22
https://doi.org/10.1007/978-3-663-14126-6world and forms a network with everything. In recent years, smart home gradually enters into our life. Smart home uses the Internet of things technology to connect all kinds of devices in the home, to achieve a smart home environment. Although the development of smart home has brought a qualitative 作者: cacophony 時(shí)間: 2025-3-22 18:47 作者: Innocence 時(shí)間: 2025-3-22 21:27 作者: 地牢 時(shí)間: 2025-3-23 04:53
https://doi.org/10.1007/978-3-663-14126-6 time, it has brought about a lot of challenges. Personal information security is one of them. In the big data era, massive amounts of personal information are continuously input, simultaneously, the means of illegally acquiring, disseminating, and applying personal information are emerging in endle作者: biosphere 時(shí)間: 2025-3-23 09:35 作者: fibroblast 時(shí)間: 2025-3-23 13:21
Grundlagen der Rolldynamik von Luftreifenmany ways to solve these problems, the existing technology represented by encryption cannot effectively deal with traffic analysis attacks, and there are also key management problems. For this reason, we propose a privacy protection method for SDN data transmission based on multipath, including path作者: 河流 時(shí)間: 2025-3-23 14:11 作者: 食道 時(shí)間: 2025-3-23 18:40 作者: Hemoptysis 時(shí)間: 2025-3-24 02:15 作者: 打折 時(shí)間: 2025-3-24 03:37
https://doi.org/10.1007/978-3-662-02128-6evel crossing in ultra-high voltage grid, based on immune algorithm, a planning algorithm is proposed in this paper to lower the network operational risk by ensuring the voltage level balance degree and main-backup route similarity are both as small as possible. Firstly, the risk of node and link is作者: 混沌 時(shí)間: 2025-3-24 10:06 作者: peptic-ulcer 時(shí)間: 2025-3-24 12:42 作者: IRATE 時(shí)間: 2025-3-24 16:11
Artificial Intelligence for Communications and Networks978-3-030-22971-9Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: Cpr951 時(shí)間: 2025-3-24 22:15
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/b/image/162352.jpg作者: HALO 時(shí)間: 2025-3-24 23:26 作者: Iniquitous 時(shí)間: 2025-3-25 07:02
https://doi.org/10.1007/978-3-663-14126-6, and the distributed algorithm can converge faster than the centralized algorithm. Moreover, both the proposed Q-learning algorithms outperform the random power control algorithm in terms of the system throughput and satisfaction ratio.作者: 領(lǐng)先 時(shí)間: 2025-3-25 07:39
https://doi.org/10.1007/978-3-663-14126-6ess of implantation, dissemination and application. Secondly, it discusses the existing problems and solutions in China. Finally, the application difficulties and coping strategies of information security technology are analyzed, which provides theoretical support for personal information security in the era of big data.作者: 柏樹(shù) 時(shí)間: 2025-3-25 11:45
Grundlagen der Rolldynamik von Luftreifenxperiment results show that our method is more effective, less similarity of traffic compared with Multipath-Floyd method and single-path method, respectively. Moreover, it is difficult for attackers to capture the traffic feature and do not need key management, which reduces the cost of the controller.作者: Carcinogen 時(shí)間: 2025-3-25 17:38
https://doi.org/10.1007/978-3-662-02128-6l result shows that the planning algorithm proposed in this paper can lower the network risk, station voltage level balance degree and the route similarity effectively, which provides a useful reference while planning service routing.作者: Infect 時(shí)間: 2025-3-25 22:03
A Multi-agent Reinforcement Learning Based Power Control Algorithm for D2D Communication Underlaying, and the distributed algorithm can converge faster than the centralized algorithm. Moreover, both the proposed Q-learning algorithms outperform the random power control algorithm in terms of the system throughput and satisfaction ratio.作者: 減弱不好 時(shí)間: 2025-3-26 00:19 作者: overrule 時(shí)間: 2025-3-26 08:11 作者: 江湖郎中 時(shí)間: 2025-3-26 08:56 作者: Metastasis 時(shí)間: 2025-3-26 15:59 作者: 自戀 時(shí)間: 2025-3-26 19:28 作者: Ataxia 時(shí)間: 2025-3-27 00:45 作者: menopause 時(shí)間: 2025-3-27 01:16
1867-8211 lligence for Communications and Networks, AICON 2019, held in Harbin, China, in May 2019. The 93 full papers were carefully reviewed and selected from 152 submissions. The papers are organized in topical sections on artificial intelligence, mobile network, deep learning, machine learning, wireless c作者: Conjuction 時(shí)間: 2025-3-27 08:31
Der aerodynamische Entwicklungsprozess,rmance and lifetime. A transparent encryption is proposed to guarantee high security storage, that is, connecting an AES-256 core and a RAID core with DMA engine in series. Performance evaluation of physical hardware shows that writing speed can exceed 100 MiB/sec for every logical channel which combines 8 NAND Flash chips.作者: 不能逃避 時(shí)間: 2025-3-27 11:30
https://doi.org/10.1007/978-3-322-93854-1ropagation (BP) neural network and the whole net was optimized by using error back propagation. Simulation experiments prove that the prediction accuracy of our SDAE model is significantly improved compared with the traditional SVM and KNN prediction model.作者: 小木槌 時(shí)間: 2025-3-27 14:55 作者: Encumber 時(shí)間: 2025-3-27 21:30 作者: 無(wú)可爭(zhēng)辯 時(shí)間: 2025-3-28 01:56 作者: STELL 時(shí)間: 2025-3-28 04:07 作者: DENT 時(shí)間: 2025-3-28 06:42 作者: FECK 時(shí)間: 2025-3-28 14:03
Navigation Performance Comparison of ACE-BOC Signal and TD-AltBOC Signallation signal is 1.0?dB–2.1?dB prior to that of the TD-AltBOC modulation signal. This is because of the difference of their power spectrum density function figures and that of the 1.2?dB distributed power level. The study production can be referred to choose the better one between these two new modulation methods.作者: pellagra 時(shí)間: 2025-3-28 17:31 作者: Oratory 時(shí)間: 2025-3-28 21:10 作者: Axillary 時(shí)間: 2025-3-29 02:36
Joint BP and RNN for Resilient GPS Timing Against Spoofing Attacks spoofing-induced errors across the antennas within the GPS receiving system. Having applied a proper training stage, simulation results show that the proposed joint BP-RNN algorithms can quickly detect the spoofed receiving system comparing with existing work.作者: musicologist 時(shí)間: 2025-3-29 04:44
Research on Evaluation Method of Cooperative Jamming Effect in Cognitive Confrontationnd different interference strategies are studied. The simulation shows that proper false alarm probability, closer distance and proper interference strategy can improve the interference benefit and provide a theoretical basis for obtaining the best interference effect in the actual battlefield.作者: Melatonin 時(shí)間: 2025-3-29 08:49 作者: 極大的痛苦 時(shí)間: 2025-3-29 12:31
An Adaptive Window Time-Frequency Analysis Method Based on Short-Time Fourier Transformcy domain characteristics of input signal, and uses this information to determine the length of local window. The obtained time-frequency distribution is purified by setting a reasonable threshold, and the purified time-frequency distribution is used to extract information and estimate the main para作者: DALLY 時(shí)間: 2025-3-29 18:08 作者: NICHE 時(shí)間: 2025-3-29 21:15 作者: Vital-Signs 時(shí)間: 2025-3-30 03:08
https://doi.org/10.1007/978-3-663-14126-6nd different interference strategies are studied. The simulation shows that proper false alarm probability, closer distance and proper interference strategy can improve the interference benefit and provide a theoretical basis for obtaining the best interference effect in the actual battlefield.作者: 對(duì)待 時(shí)間: 2025-3-30 04:12 作者: 姑姑在炫耀 時(shí)間: 2025-3-30 11:56 作者: 相互影響 時(shí)間: 2025-3-30 13:30 作者: 名字 時(shí)間: 2025-3-30 18:05 作者: 甜食 時(shí)間: 2025-3-30 22:06 作者: 和音 時(shí)間: 2025-3-31 04:49
Artificial Intelligence for Communications and NetworksFirst EAI Internatio作者: Triglyceride 時(shí)間: 2025-3-31 07:40
Software Defect Prediction Model Based on Stacked Denoising Auto-Encoderperform “shallow learning” and cannot perform deep mining of data features. Aiming at this problem, we use the stacked denoising auto-encoder (SDAE) to superimpose into deep neural network. First, the deep network model was built through the stacked layers of denoising auto-encoder (DAE), then the u作者: 歌曲 時(shí)間: 2025-3-31 12:32
Research on Evaluation Method of Cooperative Jamming Effect in Cognitive Confrontationterference with enemy radars is of great importance for taking the lead in the battlefield. The evaluation of the synergistic interference effect is an important indicator to measure the performance of the interference equipment. According to the evaluation result, the interference strategy can be c