派博傳思國(guó)際中心

標(biāo)題: Titlebook: Machine Learning and Intelligent Communications; 4th International Co Xiangping Bryce Zhai,Bing Chen,Kun Zhu Conference proceedings 2019 IC [打印本頁(yè)]

作者: 壓榨機(jī)    時(shí)間: 2025-3-21 16:08
書目名稱Machine Learning and Intelligent Communications影響因子(影響力)




書目名稱Machine Learning and Intelligent Communications影響因子(影響力)學(xué)科排名




書目名稱Machine Learning and Intelligent Communications網(wǎng)絡(luò)公開度




書目名稱Machine Learning and Intelligent Communications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Machine Learning and Intelligent Communications被引頻次




書目名稱Machine Learning and Intelligent Communications被引頻次學(xué)科排名




書目名稱Machine Learning and Intelligent Communications年度引用




書目名稱Machine Learning and Intelligent Communications年度引用學(xué)科排名




書目名稱Machine Learning and Intelligent Communications讀者反饋




書目名稱Machine Learning and Intelligent Communications讀者反饋學(xué)科排名





作者: 修飾語(yǔ)    時(shí)間: 2025-3-21 20:33
A Drone Formation Transformation Approach or environmental changes. However, performing such formation transformation during formation flight will face many technical challenges. In this paper, we first present a Six-Tuple State Coherence (STSC) model for fixed-wing drone formations, and based on this model, the definition of drone formati
作者: Alveolar-Bone    時(shí)間: 2025-3-22 02:06
LTE Antenna Port Number Detection Algorithm Based on Channel Estimation and Piecewise Linear Regressem, an improved detection algorithm based on channel estimation and piecewise linear regression is proposed. This algorithm fits the phase information of channel state and determines the number of antenna ports. The problem of decision error caused by phase jump is solved by piecewise. The theoretic
作者: 娘娘腔    時(shí)間: 2025-3-22 07:16

作者: 清真寺    時(shí)間: 2025-3-22 12:11
Multi-destination Two-Hop Untrusted AF Relay Networks with Destination-Aided Cooperative Jammingonfidential information communication needs the aid of the untrusted relay over the Nakagami-. channel. Because the relay is energy-constrained, the relay needs to harvest energy from the received information and the jamming signals by applying the power splitting relaying (PSR) protocol. The confid
作者: Optometrist    時(shí)間: 2025-3-22 14:01
Secrecy Sum Rate for Two-Way Untrusted Relay in SCMA Networksf SCMA include high capacity, low time delay and high transfer rate. The information security is also very important in 5G network. Relay is essential to be used for long distance cooperative transmission. In this paper, we consider a two-way relay system that each user pair can only communicate thr
作者: ingenue    時(shí)間: 2025-3-22 18:07

作者: 苦澀    時(shí)間: 2025-3-22 22:36
Rectangular Waveguide Design Optimization by Sequential Nonlinear Programming and Genetic Algorithmng dual polarization mode, and also widely used in various resonators and wavelength meters. This paper attempts to design, simulate and optimize rectangular waveguide. By setting the length, width and height of rectangular waveguide, the required rectangular waveguide is designed. The resonant freq
作者: 委屈    時(shí)間: 2025-3-23 03:11
Noise Reduction in Network Embeddingwith rich side information such as vertex’s label and links between vertices have attracted significant interest due to its wide applications such as node classification and link prediction. It’s well known that, in real world applications, network always contains mislabeled vertices and edges, whic
作者: 不可救藥    時(shí)間: 2025-3-23 06:57
Indoor Localization Based on Centroid Constraints of AP Quadrilateral Networksology. In the current indoor scenes, due to the extensive deployment of Wireless Local Area Network (WLAN) infrastructure, indoor WLAN location method has become a research hotspot. There are a variety of WLAN Access Points (APs) in indoor environment, which can be used in indoor localization. While
作者: 神圣不可    時(shí)間: 2025-3-23 11:14
Partially Overlapping Channel Selection in Jamming Environment: A Hierarchical Learning Approachis difficult for users to obtain global information of networks, this paper realizes the coordination of channel access by the local information interaction. The channel selection with anti-jamming problem is formulated as a Stackelberg game where the jammer acts as leader and users act as followers
作者: 是突襲    時(shí)間: 2025-3-23 14:37
A Q-Learning-Based Channel Selection and Data Scheduling Approach for High-Frequency Communications ta transmission problem of how to select transmission strategy with multi-channel and different buffer states to maximize the system throughput is studied in this paper. We model the data transmission problem as a Makov decision process (MDP). Then, a modified Q-learning with additional value is pro
作者: Emmenagogue    時(shí)間: 2025-3-23 21:13

作者: CAGE    時(shí)間: 2025-3-24 02:13

作者: 蔓藤圖飾    時(shí)間: 2025-3-24 02:43

作者: Acclaim    時(shí)間: 2025-3-24 06:45

作者: Sputum    時(shí)間: 2025-3-24 11:19

作者: etiquette    時(shí)間: 2025-3-24 17:46

作者: OVERT    時(shí)間: 2025-3-24 23:01

作者: 因無(wú)茶而冷淡    時(shí)間: 2025-3-25 02:54

作者: 事先無(wú)準(zhǔn)備    時(shí)間: 2025-3-25 04:27
Cong Li,Donghai Guan,Zhiyuan Cui,Weiwei Yuan,Asad Masood Khattak,Muhammad Fahimrkung, welche zuerst am natürlichen Magneteisenstein wahrgenommen wurde, ist die Anziehung des Eisens. An jedem magnetischen Stabe sind zwei Stellen, an welchen vorzugsweise die Wirkung zu Tage tritt; diese Stellen heissen die Pole des Magneten. Die Wirksamkeit eines Magneten auf Eisen durchdringt h
作者: CHAFE    時(shí)間: 2025-3-25 07:49
Xinyue Li,Mu Zhou,Zhenya Zhang,Zhu Liurkung, welche zuerst am natürlichen Magneteisenstein wahrgenommen wurde, ist die Anziehung des Eisens. An jedem magnetischen Stabe sind zwei Stellen, an welchen vorzugsweise die Wirkung zu Tage tritt; diese Stellen heissen die Pole des Magneten. Die Wirksamkeit eines Magneten auf Eisen durchdringt h
作者: 散開    時(shí)間: 2025-3-25 15:11
Lei Zhao,Jincheng Ge,Kailing Yao,Yifan Xu,Xiaobo Zhang,Menglan Fanrkung, welche zuerst am natürlichen Magneteisenstein wahrgenommen wurde, ist die Anziehung des Eisens. An jedem magnetischen Stabe sind zwei Stellen, an welchen vorzugsweise die Wirkung zu Tage tritt; diese Stellen heissen die Pole des Magneten. Die Wirksamkeit eines Magneten auf Eisen durchdringt h
作者: 預(yù)定    時(shí)間: 2025-3-25 15:59

作者: 大吃大喝    時(shí)間: 2025-3-25 21:19

作者: 存心    時(shí)間: 2025-3-26 01:03

作者: 冰雹    時(shí)間: 2025-3-26 08:08
Conference proceedings 2019tions, MLICOM 2019, held in Nanjing, China, in August 2019. The 65 revised full papers were carefully selected from 114 submissions. The papers are organized thematically in machine learning, intelligent positioning and navigation, intelligent multimedia processing and security, wireless mobile netw
作者: 情感    時(shí)間: 2025-3-26 08:30
1867-8211 Communications, MLICOM 2019, held in Nanjing, China, in August 2019. The 65 revised full papers were carefully selected from 114 submissions. The papers are organized thematically in machine learning, intelligent positioning and navigation, intelligent multimedia processing and security, wireless m
作者: –FER    時(shí)間: 2025-3-26 14:38
Secrecy Sum Rate for Two-Way Untrusted Relay in SCMA NetworksIn order to maximize the sum security capacity, a subcarrier assignment algorithm based on matching theory is proposed in this paper. Finally, the theoretical analysis is verified by simulation. Simulation results show that security performance is improved significantly.
作者: COLON    時(shí)間: 2025-3-26 19:39
Rectangular Waveguide Design Optimization by Sequential Nonlinear Programming and Genetic Algorithmquirements, sequential nonlinear programming and genetic algorithm are used to optimize both voltage standing wave ratio and normalized impedance matching. Simulation results show that the proposed method is able to accomplish the optimal design of rectangular waveguide.
作者: PLIC    時(shí)間: 2025-3-26 21:24

作者: Ardent    時(shí)間: 2025-3-27 02:29
Topology Sensing in Wireless Networks by Leveraging Symmetrical Connectivityer, a wireless channel-oriented topology sensing method based on Hawkes process modeling is proposed for the wireless network with symmetrical connectivity. Simulation are carried out to demonstrate that how to combine wireless channel with Hawkes process and how to further process the results to improve performance.
作者: 尖牙    時(shí)間: 2025-3-27 05:36

作者: Vo2-Max    時(shí)間: 2025-3-27 09:36

作者: 重力    時(shí)間: 2025-3-27 15:36

作者: FLIC    時(shí)間: 2025-3-27 20:50

作者: Esophagus    時(shí)間: 2025-3-28 00:17

作者: hallow    時(shí)間: 2025-3-28 02:09
Beacon in the Air: Optimizing Data Delivery for Wireless Energy Powered UAVsoptimally take the actions of energy charging, and data delivery to base stations. The performance evaluation shows that the proposed MDP scheme outperforms baseline schemes in terms of lower expected overall cost and high energy efficiency.
作者: Calculus    時(shí)間: 2025-3-28 07:16

作者: Glaci冰    時(shí)間: 2025-3-28 13:25
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/m/image/620476.jpg
作者: 肉體    時(shí)間: 2025-3-28 18:15

作者: 忍受    時(shí)間: 2025-3-28 20:04
The Principle and Design of Separate Fingerprint Identification SystemSeparate fingerprint identification system (SFIS) is composed of high-speed DSP (digital signal processor), SRAM and Flash chip, whose modules include fingerprint entry, image processing, fingerprint contrasting, fingerprint searching and module storing. SFIS can be an integrated outer equipment with the help of corresponding fingerprint sensor.
作者: 存在主義    時(shí)間: 2025-3-28 23:10
978-3-030-32387-5ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019
作者: Protein    時(shí)間: 2025-3-29 06:10
Machine Learning and Intelligent Communications978-3-030-32388-2Series ISSN 1867-8211 Series E-ISSN 1867-822X
作者: critique    時(shí)間: 2025-3-29 08:14

作者: Antioxidant    時(shí)間: 2025-3-29 13:25
A Drone Formation Transformation Approachf STSC. The prototype system conforming to DFCA algorithm is implemented on OMNET++ platform, and numerous simulation experiments are carried out. The experimental results show the feasibility of the DFCA algorithm and show that it can control the drone formation transformation at a lower cost.
作者: myocardium    時(shí)間: 2025-3-29 16:24
Multi-destination Two-Hop Untrusted AF Relay Networks with Destination-Aided Cooperative Jammingcomprehensively measure the secure and reliable performance. Moreover, we also present the asymptotic analysis of EST at the high signal-to-noise ratio (SNR). The Monte Carlo simulation is applied to validate the accuracy of the derived expressions and reveals the effects of different parameters, su
作者: Pde5-Inhibitors    時(shí)間: 2025-3-29 20:12
Improving Complex Network Controllability via Link Predictionetworks are vulnerable and will cause declining of controllability. Therefore, we propose in this paper a link prediction-based method to make the network more robust to different modes of attacking. Through experiments we have validated the effectiveness of the proposed method.
作者: 你敢命令    時(shí)間: 2025-3-30 01:18

作者: reperfusion    時(shí)間: 2025-3-30 04:41
Indoor Localization Based on Centroid Constraints of AP Quadrilateral Networks applied to obtain the ultimate estimate coordinates of pending points under the condition of geometric constraints. This method enhances the robustness of indoor localization system and implements low-cost indoor localization.
作者: hypnotic    時(shí)間: 2025-3-30 11:22

作者: Promotion    時(shí)間: 2025-3-30 15:17
Pengchun Jiang,Mu Zhouegbare Hervonrragung der Haut, welche von einem, meist dunkler verf?rbten Hautring, dem ?Warzenhof“ umgeben ist (vgl. Abb. 12). Im Warzenhofe sind eine Reihe kleiner, kn?tchenf?rmiger Drüsen (?Warzenhof-Drüsen“) gelegen. Ie nach der Beschaffenheit der Warzen lossen sich flache, gut oder schlecht fa?
作者: expansive    時(shí)間: 2025-3-30 16:47
Ran Wei,Weiwei Yuan,Donghai Guan,Asad Masood Khattak,Muhammad Fahim Variationen unterzogen werden. Nur so kann die regulatorische und technologische Weiterentwicklung durch den Netzplaner sinnvoll mitgestaltet werden. Eine mehr systemorientierte Sichtweise in der Energiepolitik und in der darauf aufbauenden Regulierung der Elektrizit?tswirtschaft wird zu volkswirts
作者: vascular    時(shí)間: 2025-3-30 21:58





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
南安市| 夏河县| 遂平县| 招远市| 内丘县| 深泽县| 墨脱县| 青河县| 长武县| 游戏| 怀仁县| 政和县| 岳阳县| 凤冈县| 年辖:市辖区| 手游| 合阳县| 成都市| 天全县| 临高县| 昌乐县| 大同县| 乳源| 西畴县| 阿城市| 科尔| 台江县| 福建省| 大安市| 洞口县| 彭州市| 芷江| 长沙县| 盐边县| 长汀县| 平武县| 花垣县| 柏乡县| 赤壁市| 宁武县| 新巴尔虎左旗|