派博傳思國際中心

標(biāo)題: Titlebook: Communications and Networking; 18th EAI Internation Feifei Gao,Jun Wu,Shangguang Wang Conference proceedings 2024 ICST Institute for Comput [打印本頁]

作者: malignant    時間: 2025-3-21 18:46
書目名稱Communications and Networking影響因子(影響力)




書目名稱Communications and Networking影響因子(影響力)學(xué)科排名




書目名稱Communications and Networking網(wǎng)絡(luò)公開度




書目名稱Communications and Networking網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Communications and Networking被引頻次




書目名稱Communications and Networking被引頻次學(xué)科排名




書目名稱Communications and Networking年度引用




書目名稱Communications and Networking年度引用學(xué)科排名




書目名稱Communications and Networking讀者反饋




書目名稱Communications and Networking讀者反饋學(xué)科排名





作者: 痛苦一生    時間: 2025-3-21 23:53

作者: Fierce    時間: 2025-3-22 03:31

作者: 青石板    時間: 2025-3-22 08:27

作者: limber    時間: 2025-3-22 11:50
Dynamic Resource Allocation for?Network Slicing in?LEO Satellite Networksropose a heuristic algorithm named MMAS-RA based on max-min ant system algorithm for resource dynamic allocation. The experimental results in four typical scenarios illustrate that our method improves up to 32.26% traffic deployment success rate and 67.02% resource utilization rate compared with the
作者: 可以任性    時間: 2025-3-22 13:38
Anti-attack Trust Evaluation Algorithm Based on?Bayesian Inference in?VANEThe current and previous interaction of vehicles, to mitigate on-off attack. A dynamic driving reference set is designed based on the location information of received messages, since the forward and lateral vehicles of driving direction can provide more valuable information. Moreover, we built a VANE
作者: 可以任性    時間: 2025-3-22 20:23

作者: 極微小    時間: 2025-3-22 22:42
Analytic Hierarchy Process Based Cell Reselection for?Inactive Users in?LEO Satellite Networkselection could be determined. Furthermore, the Received Signal Strength and the Remaining Service Time of users are weighted according to various QoS requirements, which will decide the optimal reselection cell, thereby reducing cell reselection times. Simulation results demonstrate the efficiency o
作者: Surgeon    時間: 2025-3-23 02:12
Enhancing Network Intrusion Detection with?Deep Oversampling and?Convolutional Autoencoder for?Imbalnd high quality. To assess the efficacy of our approach, we performed comparison experiments using the UNSW-NB15 dataset. The experimental findings demonstrate that the proposed strategy yields a balanced dataset that can be utilized well for classification learning. Furthermore, the detection rate
作者: GRAZE    時間: 2025-3-23 09:13
Analyzing Average Age of?Information in?CRDSA Protocol with?Access-Banned Policy system is given. The analysis process considers the probabilities of successful and failed decoding and the impact of decoding on delay, thus gaining a deep understanding of the freshness of information in the CRDSA system. The research results of this paper are of great significance for optimizing
作者: ASSET    時間: 2025-3-23 11:20

作者: condescend    時間: 2025-3-23 14:13
https://doi.org/10.1007/978-4-431-55558-2weighted FL aggregation algorithm is introduced, which assigns weights to local models by evaluating their contribution and accuracy. Furthermore, DAG blockchain technology is applied in FL to bolster the security and efficiency of model sharing among FNs. Finally, simulation results show the effect
作者: 故意釣到白楊    時間: 2025-3-23 20:53

作者: chemoprevention    時間: 2025-3-23 22:44
Carmen Isabel Castillo Carrillores of knowledge modeling, extraction, fusion and representation in detail. Then, we investigate the knowledge reasoning problem in UMPSs which is of particular importance for achieving information update in the mission execution environment, and propose a graph neural network (GNN)-based knowledge
作者: 萬神殿    時間: 2025-3-24 04:18
Pablo A. Chong,Efrén Santos-Ordo?ezropose a heuristic algorithm named MMAS-RA based on max-min ant system algorithm for resource dynamic allocation. The experimental results in four typical scenarios illustrate that our method improves up to 32.26% traffic deployment success rate and 67.02% resource utilization rate compared with the
作者: 影響深遠    時間: 2025-3-24 07:35
https://doi.org/10.1007/978-981-10-5589-8he current and previous interaction of vehicles, to mitigate on-off attack. A dynamic driving reference set is designed based on the location information of received messages, since the forward and lateral vehicles of driving direction can provide more valuable information. Moreover, we built a VANE
作者: 涂掉    時間: 2025-3-24 11:18

作者: 刪減    時間: 2025-3-24 15:21

作者: SNEER    時間: 2025-3-24 22:03

作者: 終點    時間: 2025-3-25 02:26
Agriculturally Important Microorganisms system is given. The analysis process considers the probabilities of successful and failed decoding and the impact of decoding on delay, thus gaining a deep understanding of the freshness of information in the CRDSA system. The research results of this paper are of great significance for optimizing
作者: 觀察    時間: 2025-3-25 03:36
Nanoagriculture: Advantages and Drawbackstwo perspectives: allocating PRBs to users and transferring semantic symbols. Additionally, two conversion methods are proposed to compare the performance of different systems and allocation methods. The simulation results validate the proposed resource allocation method and the effectiveness of SemCom in terms of S-SE.
作者: 是突襲    時間: 2025-3-25 08:12

作者: eardrum    時間: 2025-3-25 13:27

作者: auxiliary    時間: 2025-3-25 17:52

作者: concubine    時間: 2025-3-25 22:04

作者: Evocative    時間: 2025-3-26 03:23

作者: disparage    時間: 2025-3-26 08:03
1867-8211 ChinaCom 2023, held in Sanya, China, in November 2023...The 34 full papers presented were carefully reviewed and selected from 88 submissions...The conference covers a wide range of topics, such as: advanced networking and optimization strategies; signal processing and communication optimization; de
作者: osteocytes    時間: 2025-3-26 09:44

作者: 不知疲倦    時間: 2025-3-26 16:41

作者: Fibroid    時間: 2025-3-26 17:19
https://doi.org/10.1007/978-981-19-5454-2 two-stage heuristic algorithm to solve it. The first stage employs an improved particle swarm optimization algorithm, while the second stage is a traffic routing algorithm based on Time-Evolution Graph (TEG). Finally, simulations are conducted under various system settings to validate the effectiveness of the algorithm.
作者: MORPH    時間: 2025-3-26 22:43

作者: Maximizer    時間: 2025-3-27 04:25

作者: 懲罰    時間: 2025-3-27 09:08

作者: Sputum    時間: 2025-3-27 10:51
Conference proceedings 2024023, held in Sanya, China, in November 2023...The 34 full papers presented were carefully reviewed and selected from 88 submissions...The conference covers a wide range of topics, such as: advanced networking and optimization strategies; signal processing and communication optimization; deep learnin
作者: 全國性    時間: 2025-3-27 15:44

作者: IVORY    時間: 2025-3-27 18:11

作者: 報復(fù)    時間: 2025-3-28 00:21

作者: HEW    時間: 2025-3-28 04:50
A Novel Approach on?Semantic Performance Oriented Radio Resource Allocationon under low signal-to-noise ratio (SNR) conditions. The latest technique considers the semantic spectral efficiency (S-SE) of text information and related resource allocation problems. However, in radio access network (RAN) environments, it is usually necessary to allocate physical resource blocks
作者: 運動性    時間: 2025-3-28 07:58
A Two-Stage Heuristic SFC Deployment Approach in?Software Defined Satellite Networksong predetermined virtual network functions (VNFs), thus effectively coordinating resource allocation in software-defined satellite networks (SDSNs). However, the deployment of SFC in satellite networks is more complex than in terrestrial networks due to certain characteristics of satellites, such a
作者: Shuttle    時間: 2025-3-28 12:43
Blockchain-Based Federated Learning with?Malicious Attacks in?Fog Computing Networkso user privacy and network security. Federated Learning (FL), as an emerging distributed machine learning framework, provides a promising approach to privacy protection. However, non-independent and identically distributed (Non-IID) data and malicious attacks inevitably lead to a decrease in the per
作者: Glutinous    時間: 2025-3-28 15:08

作者: Pantry    時間: 2025-3-28 18:49

作者: Congruous    時間: 2025-3-28 23:12
A Knowledge Graph for?UAV Mission Planning Systems practical UAV application scenarios, UAV mission planning systems (UMPSs) highly rely on efficient mission planning and resource scheduling strategies in order to meet the requirement of UAV missions. However, the dynamic and complex mission environment poses challenges to mission planning in UMPSs
作者: Asseverate    時間: 2025-3-29 03:09
Dynamic Resource Allocation for?Network Slicing in?LEO Satellite Networksconnectivity. Satellite network slicing is a technology that enables the partitioning of different resources and capabilities to different service requirements and customers in LEO satellite communication networks. It can guarantee different QoS requirements according to the application scenarios an
作者: 初學(xué)者    時間: 2025-3-29 10:44
Scalable Blockchain-Based Access Control Algorithm for?Large-Scale IoT Networks with?Byzantine Nodese blockchain-based access control architecture and a reliable access control consensus algorithm. Firstly, a two-layer blockchain network architecture is constructed, which is composed of a higher-layer main cluster and lower-layer sub-clusters. A cost optimal-based clustering algorithm is proposed
作者: Digest    時間: 2025-3-29 13:41
Anti-attack Trust Evaluation Algorithm Based on?Bayesian Inference in?VANETET, trust management mechanism is implemented to defend against internal attacks in VANET. However, attacks targeting trust management mechanism, such as on-off attack, compromise trust management accuracy. In this paper, we propose the Anti-Attack Trust Evaluation Algorithm (AATEA) based on Bayesia
作者: 偽證    時間: 2025-3-29 19:12
A Dummy Query-Based User Privacy Protection Scheme in?Named Data Networkingristics also raise privacy concerns. However, the existing NDN privacy protection schemes cannot protect user’s privacy completely because they neglect the correlation among NDN contents, content names and content caches. To solve this problem, this paper proposes a dummy query-based privacy protect
作者: A簡潔的    時間: 2025-3-29 21:12

作者: 細查    時間: 2025-3-30 01:15

作者: 臆斷    時間: 2025-3-30 07:46

作者: 憤世嫉俗者    時間: 2025-3-30 11:24
Analyzing Average Age of?Information in?CRDSA Protocol with?Access-Banned Policyd on the access-banned policy in massive machine-type communication (mMTC) scenarios. The CRDSA system is modeled as a bipartite graph, and graph theory methods are used to analyze the system performance. At the same time, a comprehensive formula for calculating the packet recovery rate (PRR) in the
作者: embolus    時間: 2025-3-30 12:47

作者: 昏睡中    時間: 2025-3-30 16:33

作者: Sedative    時間: 2025-3-30 23:36

作者: Glucose    時間: 2025-3-31 02:14

作者: anthropologist    時間: 2025-3-31 07:15

作者: nascent    時間: 2025-3-31 13:09

作者: 膽大    時間: 2025-3-31 14:27





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
南澳县| 侯马市| 松阳县| 阿克陶县| 泸西县| 广宁县| 沛县| 楚雄市| 定西市| 喀喇沁旗| 贵港市| 新化县| 张家口市| 怀安县| 鄱阳县| 龙游县| 清远市| 崇仁县| 宁乡县| 仙居县| 当雄县| 叙永县| 安平县| 迭部县| 铜梁县| 开封县| 临夏县| 克山县| 北川| 陇川县| 巢湖市| 娱乐| 石首市| 清苑县| 通山县| 潮州市| 九寨沟县| 藁城市| 明光市| 邛崃市| 汶川县|