標題: Titlebook: Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health; International 2019 C Huansheng Ning Conference proceedings 2019 S [打印本頁] 作者: 萌芽的心 時間: 2025-3-21 18:56
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health影響因子(影響力)
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health影響因子(影響力)學(xué)科排名
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health網(wǎng)絡(luò)公開度
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health被引頻次
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health被引頻次學(xué)科排名
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health年度引用
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health年度引用學(xué)科排名
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health讀者反饋
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health讀者反饋學(xué)科排名
作者: 群居男女 時間: 2025-3-21 23:44
Non-orthogonal Multiple Access in Coordinated LEO Satellite Networks supported by two satellites. By exploiting the difference of the equivalent downlink channel gains, users located both at the beam-center and beam-edge can be served simultaneously using NOMA. It is shown that the NOMA-based cooperative method is capable of providing a higher system capacity while guarantee the rate quality of the beam-edge user.作者: –LOUS 時間: 2025-3-22 02:18 作者: prick-test 時間: 2025-3-22 04:48 作者: Fibrillation 時間: 2025-3-22 08:46 作者: Soliloquy 時間: 2025-3-22 13:09
https://doi.org/10.1057/9780230603585ivity recognition of the elderly, so as to prepare for the construction of smart medical care. The specific research process is to process the sensor data collected from the smart environment, identify different activities using RNN, LSTM and GRU models with strong ability to process time series data, realize the target of activity recognition.作者: Soliloquy 時間: 2025-3-22 18:32 作者: Deceit 時間: 2025-3-22 22:59
1865-0929 lligence, Cyber DI 2019, and the International Conference on Cyber-Living, Cyber-Syndrome, and Cyber-Health, CyberLife 2019, held under the umbrella of the 2019 Cyberspace Congress, held in Beijing, China, in December 2019...The 64 full papers presented together with 18 short papers were carefully r作者: Deference 時間: 2025-3-23 04:05 作者: pester 時間: 2025-3-23 06:36 作者: Amylase 時間: 2025-3-23 12:47 作者: CRUC 時間: 2025-3-23 15:40
1865-0929 led intelligence; communication and computing; cyber philosophy, cyberlogic and cyber science; and cyber health and smart healthcare.?.978-981-15-1924-6978-981-15-1925-3Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 粘 時間: 2025-3-23 21:32
Samuel Schlicht,Dietmar Drummerthm proposed in this paper based on the Markov approximation framework can make the system converge to an approximate optimal solution with only linear level complexity. The simulation results show that the proposed algorithm is able to generate near-optimal solutions and outperform other benchmark algorithms.作者: 華而不實 時間: 2025-3-23 23:30
Anzahlfunktion, Kompositionen, Partitionen,aS). The relationship of different kinds of services in a testbed is modeled, based on the Lotka-Volterra model. The testbed implementation is demonstrated, based on cloud computing, using a typical video test as an example. It is proved that our testbed for service testing and data process is practicable and effective.作者: BINGE 時間: 2025-3-24 03:54 作者: Inculcate 時間: 2025-3-24 10:19 作者: radiograph 時間: 2025-3-24 14:27
A Testbed for Service Testing: A Cloud Computing Based ApproachaS). The relationship of different kinds of services in a testbed is modeled, based on the Lotka-Volterra model. The testbed implementation is demonstrated, based on cloud computing, using a typical video test as an example. It is proved that our testbed for service testing and data process is practicable and effective.作者: 飲料 時間: 2025-3-24 15:09
PAM: An Efficient Hybrid Dimension Reduction Algorithm for High-Dimensional Bayesian Network we propose a method, PAM, which is applied to Bayesian Network learning to constrain the search space of high-dimensional network. Several Experiments are performed in order to confirm our hypothesis.作者: Console 時間: 2025-3-24 22:17
An Efficient Concurrent System Networking Protocol Specification and Verification Using Linear Tempo an effective manner. The existence of a cycle in a conflict graph means that the schedule of such concurrent transactions cannot be serialized. We use temporal logic in the representation of this protocol model to ensure the safety of systems. Administrative routing protocols benefit significantly from this protocol model.作者: 疏忽 時間: 2025-3-25 02:14 作者: 六邊形 時間: 2025-3-25 06:38 作者: Microgram 時間: 2025-3-25 10:07
Conference proceedings 2019d selected from 160 submissions. The papers are grouped in the following topics: cyber data, information and knowledge; cyber and cyber-enabled intelligence; communication and computing; cyber philosophy, cyberlogic and cyber science; and cyber health and smart healthcare.?.作者: GRAIN 時間: 2025-3-25 14:02
A Markov Approximation Algorithm for Computation Offloading and Resource Scheduling in Mobile Edge Cwork to realize the flexible use of computing and storage resources. While most existing research focuses on network optimization in small-scale scenes, this paper jointly considers the resources scheduling of servers, channels and powers for mobile users to minimize the system energy consumption. I作者: 腐敗 時間: 2025-3-25 19:53
A Geographic Routing Protocol Based on Trunk Line in VANETs in this paper. This protocol aims to solve the problem of data acquisition in traditional trunk coordinated control system. Considering the actual physical characteristics of trunk lines, it makes full use of the traffic flow of the trunk lines and the surrounding road network, provides a real-time作者: assent 時間: 2025-3-25 23:43
Sub-array Based Antenna Selection Scheme for Massive MIMO in 5Gon network. Developments in technology enables advanced antenna system to be scalable across 5G and future wireless networks. Massive MIMO based advance antenna selection techniques provide powerful and affordable methods that are effective approaches for coverage and capacity of consumers. Prerequi作者: FILTH 時間: 2025-3-26 01:50
A Green SWIPT Enhanced Cell-Free Massive MIMO System for IoT Networksltiple-input multiple-output (MIMO) system where the IoT devices are served by the virtual massive MIMO constituted by a large amount of distributed single antenna access points (APs). On the premise of that all the IoT devices can decode the information and harvest energy from the received signals,作者: uncertain 時間: 2025-3-26 08:02 作者: 嘮叨 時間: 2025-3-26 10:45
Multi-sensor Data Fusion Based on Weighted Credibility Intervalhods are mostly based on the similarity of attributes such as evidence distance, similarity and information entropy attribute as evidence weight correction evidence itself. Ultimately, the final weights of the evidences are applied to adjust the bodies of the evidences before using the Dempster’s co作者: 圣人 時間: 2025-3-26 16:23 作者: minimal 時間: 2025-3-26 17:14
A Testbed for Service Testing: A Cloud Computing Based Approachbility of a newly emerged network. Traditional tests have their drawback, because of the coupling of test service and test devices. The arise of new network architecture, industry 4.0 and the internet of things, also brings new challenges. Therefore, a testbed for service testing and data process ba作者: 鐵塔等 時間: 2025-3-26 23:48
Improve the Efficiency of Maintenance for Optical Communication Network: The Multi-factor Risk Analyof services is growing. It is greater to ensure that the network is functioning properly. Therefore, people are deeply concerned about the maintenance of communication networks. The nodes in the network are an important component of the network. Therefore, it is necessary to conduct the risk analysi作者: 高腳酒杯 時間: 2025-3-27 05:06 作者: FEAT 時間: 2025-3-27 08:24
Consensus Performance of Traffic Management System for Cognitive Radio Network: An Agent Control Appd efficient solutions to ensure spectrum sharing fairness in CRSNs. This paper studies the consensus performance of traffic management system in Cognitive Radio Networks (CRNs). Research focused on significant topics of spectrum management in scalable CR ad hoc networks such as mobility, sharing, an作者: HUMID 時間: 2025-3-27 12:50
An Efficient Concurrent System Networking Protocol Specification and Verification Using Linear Tempoile systems depend on, such as the emerging Internet of Things (IoT). We present a protocol to ensure safety and reliability of systems where concurrent modification of data on routers in a network is possible, by detecting cycles in the conflict graph and ensuring the system is free of any cycle in作者: Dignant 時間: 2025-3-27 14:03 作者: 皺痕 時間: 2025-3-27 18:52
PAM: An Efficient Hybrid Dimension Reduction Algorithm for High-Dimensional Bayesian NetworkBayesian Network has been playing an important role in machine learning and has been widely applied to the medical diagnosis field for its advantages in reasoning under uncertainty. But as the rise of the number of interest variables, the Bayesian Network structure search space is growing super-expo作者: Admonish 時間: 2025-3-28 01:53 作者: uveitis 時間: 2025-3-28 03:29
Petal-Image Based Flower Classification via GLCM and RBF-SVMced flower expert needs reference book to categorize a flower because of the high intra-class variation and inter-class similarity. In this study, an automatic flower recognition method was proposed based on digital image processing and artificial intelligence for petal image. Gray level co-occurren作者: 箴言 時間: 2025-3-28 10:06 作者: Buttress 時間: 2025-3-28 13:09
A Geographic Routing Protocol Based on Trunk Line in VANETsnd selection, which makes the TRGR protocol more suitable for the application of coordinated control of the main road in the urban environment. Simulation results show that the TRGR protocol has better performance in end-to-end delay, delivery rate and routing cost under the scenario of urban traffi作者: FILLY 時間: 2025-3-28 15:41 作者: 云狀 時間: 2025-3-28 21:18 作者: Aura231 時間: 2025-3-29 01:32 作者: STEER 時間: 2025-3-29 06:50 作者: 逢迎春日 時間: 2025-3-29 08:00
Improve the Efficiency of Maintenance for Optical Communication Network: The Multi-factor Risk Analydge computing server is introduced to perform the risk analysis on the node in time. So as to improve the timeliness of updating information. According to the results of simulation, maintenance personnel can get more accurate information about the nodes or aspects that need to be maintained, and bec作者: intertwine 時間: 2025-3-29 12:37
Consensus Performance of Traffic Management System for Cognitive Radio Network: An Agent Control Appd a delay margin criterion is derived to guarantee the performance of information sharing for CR users. From simulation results, the use of proposed schemes shows low complexity and effectiveness for spectrum sharing processes in randomly deployed CRSNs also shows the effectiveness of the proposed m作者: definition 時間: 2025-3-29 18:41
A Convolutional Neural Network-Based Semantic Clustering Method for ALS Point Cloudsemantic clustering goal. We evaluate our method on the public datasets provided by the 2019 IEEE GRSS Data Fusion Contest and compared with common methods for point cloud clustering. The method performs good, shows the potential of deep-learning-based methods in semantic clustering of point clouds.作者: 小卒 時間: 2025-3-29 21:22
Sohorab Hossain,Surajit Chattopadhyaynd selection, which makes the TRGR protocol more suitable for the application of coordinated control of the main road in the urban environment. Simulation results show that the TRGR protocol has better performance in end-to-end delay, delivery rate and routing cost under the scenario of urban traffi作者: 大溝 時間: 2025-3-30 01:16 作者: 壯麗的去 時間: 2025-3-30 06:02 作者: Audiometry 時間: 2025-3-30 11:56
Additive Number Theory The Classical Basesinal evidence is modified with the final weight before using the Dempster’s combination rule. The numerical fusion example has verified that the proposed method is feasible and improved, in which the basic probability assignment (BPAs) to identify the correct target is 99.21%.作者: Buttress 時間: 2025-3-30 13:51
https://doi.org/10.1007/978-1-4757-3845-2e hashing based allocating strategy called Loyal. Loyal relies on E2LSH technique to hash and encrypt the sensitive data information. In addition, Loyal is able to retrieve suitable service that can be offloaded to the ES in a short time. Finally, the performance of Loyal is presented by simulation 作者: ABIDE 時間: 2025-3-30 18:31 作者: 雪上輕舟飛過 時間: 2025-3-30 20:52 作者: 不來 時間: 2025-3-31 03:37
The Men on the Dump: A Responseemantic clustering goal. We evaluate our method on the public datasets provided by the 2019 IEEE GRSS Data Fusion Contest and compared with common methods for point cloud clustering. The method performs good, shows the potential of deep-learning-based methods in semantic clustering of point clouds.作者: 釋放 時間: 2025-3-31 07:02 作者: BUOY 時間: 2025-3-31 11:14
Samuel Schlicht,Dietmar Drummerwork to realize the flexible use of computing and storage resources. While most existing research focuses on network optimization in small-scale scenes, this paper jointly considers the resources scheduling of servers, channels and powers for mobile users to minimize the system energy consumption. I作者: infelicitous 時間: 2025-3-31 17:10 作者: 難管 時間: 2025-3-31 21:32
Light Engineering für die Praxison network. Developments in technology enables advanced antenna system to be scalable across 5G and future wireless networks. Massive MIMO based advance antenna selection techniques provide powerful and affordable methods that are effective approaches for coverage and capacity of consumers. Prerequi作者: 可行 時間: 2025-4-1 00:32
https://doi.org/10.1007/978-3-031-16221-3ltiple-input multiple-output (MIMO) system where the IoT devices are served by the virtual massive MIMO constituted by a large amount of distributed single antenna access points (APs). On the premise of that all the IoT devices can decode the information and harvest energy from the received signals,作者: LAVE 時間: 2025-4-1 05:03 作者: 鋼筆尖 時間: 2025-4-1 09:36
Additive Number Theory The Classical Baseshods are mostly based on the similarity of attributes such as evidence distance, similarity and information entropy attribute as evidence weight correction evidence itself. Ultimately, the final weights of the evidences are applied to adjust the bodies of the evidences before using the Dempster’s co