派博傳思國際中心

標(biāo)題: Titlebook: Advanced Technologies in Ad Hoc and Sensor Networks; Proceedings of the 7 Xue Wang,Li Cui,Zhongwen Guo Conference proceedings 2014 Springer [打印本頁]

作者: 戲弄    時間: 2025-3-21 18:30
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks影響因子(影響力)




書目名稱Advanced Technologies in Ad Hoc and Sensor Networks影響因子(影響力)學(xué)科排名




書目名稱Advanced Technologies in Ad Hoc and Sensor Networks網(wǎng)絡(luò)公開度




書目名稱Advanced Technologies in Ad Hoc and Sensor Networks網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Advanced Technologies in Ad Hoc and Sensor Networks被引頻次




書目名稱Advanced Technologies in Ad Hoc and Sensor Networks被引頻次學(xué)科排名




書目名稱Advanced Technologies in Ad Hoc and Sensor Networks年度引用




書目名稱Advanced Technologies in Ad Hoc and Sensor Networks年度引用學(xué)科排名




書目名稱Advanced Technologies in Ad Hoc and Sensor Networks讀者反饋




書目名稱Advanced Technologies in Ad Hoc and Sensor Networks讀者反饋學(xué)科排名





作者: Control-Group    時間: 2025-3-21 23:18

作者: CUB    時間: 2025-3-22 04:19

作者: 未完成    時間: 2025-3-22 06:13

作者: incarcerate    時間: 2025-3-22 11:45

作者: output    時間: 2025-3-22 16:26
James Eric Mason,Issa Traore,Isaac Woungangmmunication and long-distance communication. This paper studies the energy efficient multicast routing problem with delay constraint for each destination. We formulate it as an integer programming. The simulation results show that our optimal model can achieve higher energy saving than the scheme only considering the long-distance communication.
作者: Mutter    時間: 2025-3-22 20:11

作者: 谷物    時間: 2025-3-22 21:23
1876-1100 in Ad Hoc and Sensor Networks .collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of “Advances in wireless sensor networks of China”
作者: Capture    時間: 2025-3-23 04:34
Fundamentals in User Authenticationd on TinyOS, which enables reliable and efficient network reboot in WSNs. NR ensures 100?% reliability by incorporating an eventual consistency dissemination protocol. It avoids flash I/Os by storing data items on persistent RAM. Evaluation results show that NR can ensure 100?% reliability and is efficient in I/O operations.
作者: 高興一回    時間: 2025-3-23 06:27
https://doi.org/10.1007/0-387-28094-4kNN) is proposed in this paper. PT-GRkNN exploits filter-refine framework, geometric filter and probability filter are proposed to shrink the search space, the final query results can be obtained by refine phase. Experimental results show that the efficiency of PT-GRkNN is better than the existing methods.
作者: Congeal    時間: 2025-3-23 11:47
https://doi.org/10.1007/978-3-319-98734-7gned. It partitioned network into several subtrees with lower collision factor, without increasing the total value of interference around the whole network. Simulation results show that the proposed MAC protocol can significantly improve throughput, reduce end-to-end latency, and packet loss, especially in dense networks.
作者: 控訴    時間: 2025-3-23 14:05
Biometric Authentication for WearablesAlgorithm based on Small World (PCS) is proposed to reduce the network delay. The PCS algorithm adds several shortcuts into the network based on the small world theory and uses genetic algorithm to optimize the shortcuts. Simulation results demonstrate that this method can effectively shorten the average path length and reduce the network delay.
作者: hematuria    時間: 2025-3-23 21:36
Conference proceedings 2014ld in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of “Advances in wireless sensor networks of China”. The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flex
作者: 防銹    時間: 2025-3-23 22:47

作者: Strength    時間: 2025-3-24 03:14

作者: Root494    時間: 2025-3-24 07:32

作者: 方便    時間: 2025-3-24 10:44
Evaluating Handwriting Biometricsrun efficiently without collisions under high-load traffic scenarios. Extensive simulation results on Glomosim platform show that LS-MAC exhibits higher bandwidth utilization and integral throughput without sacrificing energy efficiency.
作者: GLIDE    時間: 2025-3-24 16:08
https://doi.org/10.1007/0-387-28094-4 decision. Third, we adopt the fuzzy comprehensive evaluation method to evaluate the security performance qualitatively and quantitatively. Finally, this method is proved to be reasonable and effective in simulation experiments.
作者: 薄膜    時間: 2025-3-24 22:02

作者: insurgent    時間: 2025-3-24 23:37
Mobile Anchor-Assisted Localization in 3D Wireless Sensor Networks with Hilbert Curve,lementary material: .Das Repetitorium Schmerztherapie hat sich neben den erfolgreichen Repetitorien An?sthesie und Intensivmedizin innerhalb kurzer Zeit etabliert und erscheint in seiner 2. Auflage komplett überarbeitet und aktualisiert. Orientiert an den Weiterbildungsinhalten der B?K für die Zusat
作者: exquisite    時間: 2025-3-25 05:09

作者: STAT    時間: 2025-3-25 10:31

作者: 抑制    時間: 2025-3-25 13:50

作者: 必死    時間: 2025-3-25 18:56

作者: Isthmus    時間: 2025-3-25 21:59
A Probabilistic Group Reverse k-Nearest-Neighbor Query in Sensor Networks,d. Das hei?t, das Objekt wandelt sich und mit ihm wandeln sich Umfang und Inhalt seiner Probleme, insbesondere der systembezogenen Probleme. In der . lag — wie wir bereits dargestellt haben (s. oben S. 61 ff.) — der Schwerpunkt der betriebswirtschaftlichen Problematik auf der Organisation des Innenb
作者: 長矛    時間: 2025-3-26 03:39
Partition-Based MAC Protocol for Data Gathering in Wireless Sensor Networks,?g- lichen und in Zweifelsf?llen als Nachschlagebuch zu dienen. Es soll aber auch den Lernenden, insbesondere den Autodidakten, in die Systematik der Buchhaltung einführen und ihn in leichtverst?ndlicher Darstellung mit den Grundlagen und der Technik der doppelten Buchführung vertraut machen. Die Ka
作者: Barter    時間: 2025-3-26 04:23
Energy Efficient Multicast Routing with Delay Constraint in Bus-Based DTNs,nalen Funktionen müssen wir zun?chst die Nullstellenmenge des Nennerpolynoms aus der Definitionsmenge ausgrenzen. Bei der Untersuchung der Umkehreigenschaften der Exponentialfunktion im zweiten Paragraphen sto?en wir zum erstenmal auf das Problem der Mehrdeutigkeit. Anstatt auf einer geeigneten Riem
作者: 走調(diào)    時間: 2025-3-26 10:25

作者: Jocose    時間: 2025-3-26 14:21

作者: 冰河期    時間: 2025-3-26 19:34

作者: Nonthreatening    時間: 2025-3-26 22:10

作者: Excise    時間: 2025-3-27 02:12
Front Matterschmerzen, HWS-Syndrom. Durch viele nützliche Hinweise zu Indikationen, Pharmakokinetik und Wirkmechanismen sowie konkrete Praxistipps ein wertvoller Begleiter im Klinikalltag. Darüberhinaus ist es die optimale Prüfungsvorbereitung zur Erlangung der Zusatzbezeichnung "Spezielle Schmerztherapie". .978-3-642-20024-3
作者: 好開玩笑    時間: 2025-3-27 05:29
Mobile Anchor-Assisted Localization in 3D Wireless Sensor Networks with Hilbert Curve,liche Hinweise zu Indikationen, Pharmakokinetik und Wirkmechanismen sowie konkrete Praxistipps ein wertvoller Begleiter im Klinikalltag. Darüberhinaus ist es die optimale Prüfungsvorbereitung zur Erlangung der Zusatzbezeichnung "Spezielle Schmerztherapie"..978-3-540-33301-2
作者: nonradioactive    時間: 2025-3-27 13:20
Human Tracking System Based on PIR Sensor Network and Video,h im Wesentlichen auf dynamische, aerobe Belastungen; der Fokus dieses Kapitels liegt daher auf den messbaren kardialen Parametern vor, w?hrend und nach Belastung. Weiterführende, z.?B. (sport-)orthop?dische Aspekte, werden in ? Kap.?. berücksichtigt. Auch respiratorische und metabolische Gr??en (z.
作者: Eviction    時間: 2025-3-27 14:52

作者: Explicate    時間: 2025-3-27 20:05

作者: sterilization    時間: 2025-3-28 02:01

作者: 運(yùn)動的我    時間: 2025-3-28 05:06
A Probabilistic Group Reverse k-Nearest-Neighbor Query in Sensor Networks,ehrsorganisationen. Es ist die Zeit der gro?en Kompendien, Lexika und Systeme der ?Handlung“ (damals gleichbedeutend mit ?Handel“). Im . (19. Jahrhundert) rückt die Technologie in den Mittelpunkt der Betriebswirtschaftslehre. Es beginnt die Zeit der ?Ingenieurwirtschaft“, die sich nicht nur technolo
作者: Prologue    時間: 2025-3-28 06:58
Partition-Based MAC Protocol for Data Gathering in Wireless Sensor Networks,ternehmens (Umwandlung, Fusion usw. ) erforderlichen Buchungen. Der Buchhalter mu? auch in der Lage sein, die Buchführung auszuwerten, die Wirtschaftlichkeit der Betriebsgebarung zu prüfen und zu überwachen und seine Erkenntnisse auszuwerten. Ein besonderer Abschnitt ist daher der Bilanzanalyse und Bilanzkrit978-3-663-12558-7978-3-663-13073-4
作者: Offbeat    時間: 2025-3-28 13:58

作者: CULP    時間: 2025-3-28 15:16
A Novel Skeleton Extraction Algorithm in Sensor Networks,978-3-658-00030-1
作者: 過份好問    時間: 2025-3-28 22:46
A Real-Time Information Perceived Vehicle Opportunity Route: RIPVO,978-3-322-94518-1
作者: Analogy    時間: 2025-3-28 23:52

作者: 售穴    時間: 2025-3-29 05:41

作者: 傻    時間: 2025-3-29 07:13
Security Evaluation for Wireless Sensor Networks Based on Attack Test and Fuzzy Comprehensive Judge978-3-322-94855-7
作者: 噴油井    時間: 2025-3-29 11:44
A Study on the Wireless Sensor Networks MAC Protocol for Aircraft Health Monitoring,978-3-322-96590-5
作者: Modicum    時間: 2025-3-29 19:23

作者: arcane    時間: 2025-3-29 21:31

作者: inferno    時間: 2025-3-30 00:38

作者: bromide    時間: 2025-3-30 04:50

作者: graphy    時間: 2025-3-30 09:10

作者: 煩人    時間: 2025-3-30 15:22
Advanced Technologies in Ad Hoc and Sensor NetworksProceedings of the 7
作者: beta-carotene    時間: 2025-3-30 17:12
Biometric System and Data Analysishree-dimensional (3D) networks. In this method, an anchor is equipped with global positioning system (GPS) device, and traverses the network along the Hilbert space–filling curve. The ordinary nodes estimate their positions using trigonometric method based on the characteristics of Hilbert curve. We
作者: 任意    時間: 2025-3-30 21:08

作者: cluster    時間: 2025-3-31 03:47

作者: 歹徒    時間: 2025-3-31 06:52
Herve Jarosz,Jean-Christophe Fondeur paper. First, a node executes limited and directed data flooding and then carries out feedback with modified greedy algorithm using hot area. In this strategy, nodes dynamically adjust parameters by self-learning properly. The experiment result under ONE simulator shows its promotion comparing to c
作者: opinionated    時間: 2025-3-31 10:37

作者: Infantry    時間: 2025-3-31 17:01
Fundamentals in User Authenticationb manually for Wireless Sensor Networks (WSN) is designed for different applications. Combining Embedded Remote Procedure Call (ERPC) with web service, this paper presents a new Automated Unit Testing Framework (AUTF) of unit testing for WSN. First, tester uploads source code through web service int
作者: 山頂可休息    時間: 2025-3-31 19:26

作者: 正式通知    時間: 2025-3-31 22:29
https://doi.org/10.1007/0-387-28094-4es advices to take effective security technologies, which is an important way to improve the security of the network proactively. Considering that the evaluation is a complex process and involves many factors, this paper proposes a security evaluation method for the wireless sensor networks based on
作者: GUILE    時間: 2025-4-1 04:27
https://doi.org/10.1007/0-387-28094-4tion of the entire wireless network. WIA-PA (wireless network for industrial automation-process automation) is an IEC-approved industrial wireless standard. Having taken the features and architecture of WIA-PA into consideration, we implement and analyze two approaches of time synchronization mechan
作者: tenuous    時間: 2025-4-1 06:44
Advances in Information Securitynetworks may result in poor network performance. This paper presents a link quality-based reliable routing algorithm. According to the link qualities evaluated by RSSI, neighbor nodes can be partitioned into different regions. First, based on a realistic link model and test results, an asymmetric li
作者: BOOST    時間: 2025-4-1 13:58

作者: jaunty    時間: 2025-4-1 16:20
Evaluating Handwriting Biometricsring, we propose a modified TDMA protocol and relevant cluster members time synchronization mechanism. This modified TDMA protocol can adaptively allocate time slots based on sensor nodes data traffic, so that it can improve using efficiency of the channel, reduce the loss rate of the packets, time
作者: Antagonism    時間: 2025-4-1 18:49
Evaluating Handwriting Biometricsrecent applications, such as health monitoring applications, require high throughput to transmit sensing data in a burst. Aiming to maximize the integral throughput, we propose a new scheduled multi-channel MAC protocol, named LS-MAC, which adopts a fully distributed scheduling scheme through locall




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
梓潼县| 民乐县| 靖江市| 和平区| 万山特区| 昌乐县| 达日县| 敦煌市| 油尖旺区| 衡东县| 晋中市| 西青区| 西乡县| 龙川县| 江北区| 石狮市| 麻栗坡县| 和龙市| 板桥市| 黎平县| 全州县| 孟州市| 错那县| 密云县| 土默特右旗| 白河县| 莒南县| 湘潭市| 寻乌县| 通许县| 分宜县| 古浪县| 自治县| 大田县| 景德镇市| 阿拉善右旗| 铜梁县| 枣阳市| 蒙自县| 赣州市| 和田市|