標(biāo)題: Titlebook: Advanced Technologies in Ad Hoc and Sensor Networks; Proceedings of the 7 Xue Wang,Li Cui,Zhongwen Guo Conference proceedings 2014 Springer [打印本頁] 作者: 戲弄 時間: 2025-3-21 18:30
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks影響因子(影響力)
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks影響因子(影響力)學(xué)科排名
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks網(wǎng)絡(luò)公開度
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks被引頻次
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks被引頻次學(xué)科排名
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks年度引用
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks年度引用學(xué)科排名
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks讀者反饋
書目名稱Advanced Technologies in Ad Hoc and Sensor Networks讀者反饋學(xué)科排名
作者: Control-Group 時間: 2025-3-21 23:18 作者: CUB 時間: 2025-3-22 04:19 作者: 未完成 時間: 2025-3-22 06:13 作者: incarcerate 時間: 2025-3-22 11:45 作者: output 時間: 2025-3-22 16:26
James Eric Mason,Issa Traore,Isaac Woungangmmunication and long-distance communication. This paper studies the energy efficient multicast routing problem with delay constraint for each destination. We formulate it as an integer programming. The simulation results show that our optimal model can achieve higher energy saving than the scheme only considering the long-distance communication.作者: Mutter 時間: 2025-3-22 20:11 作者: 谷物 時間: 2025-3-22 21:23
1876-1100 in Ad Hoc and Sensor Networks .collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of “Advances in wireless sensor networks of China”作者: Capture 時間: 2025-3-23 04:34
Fundamentals in User Authenticationd on TinyOS, which enables reliable and efficient network reboot in WSNs. NR ensures 100?% reliability by incorporating an eventual consistency dissemination protocol. It avoids flash I/Os by storing data items on persistent RAM. Evaluation results show that NR can ensure 100?% reliability and is efficient in I/O operations.作者: 高興一回 時間: 2025-3-23 06:27
https://doi.org/10.1007/0-387-28094-4kNN) is proposed in this paper. PT-GRkNN exploits filter-refine framework, geometric filter and probability filter are proposed to shrink the search space, the final query results can be obtained by refine phase. Experimental results show that the efficiency of PT-GRkNN is better than the existing methods.作者: Congeal 時間: 2025-3-23 11:47
https://doi.org/10.1007/978-3-319-98734-7gned. It partitioned network into several subtrees with lower collision factor, without increasing the total value of interference around the whole network. Simulation results show that the proposed MAC protocol can significantly improve throughput, reduce end-to-end latency, and packet loss, especially in dense networks.作者: 控訴 時間: 2025-3-23 14:05
Biometric Authentication for WearablesAlgorithm based on Small World (PCS) is proposed to reduce the network delay. The PCS algorithm adds several shortcuts into the network based on the small world theory and uses genetic algorithm to optimize the shortcuts. Simulation results demonstrate that this method can effectively shorten the average path length and reduce the network delay.作者: hematuria 時間: 2025-3-23 21:36
Conference proceedings 2014ld in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of “Advances in wireless sensor networks of China”. The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flex作者: 防銹 時間: 2025-3-23 22:47 作者: Strength 時間: 2025-3-24 03:14 作者: Root494 時間: 2025-3-24 07:32 作者: 方便 時間: 2025-3-24 10:44
Evaluating Handwriting Biometricsrun efficiently without collisions under high-load traffic scenarios. Extensive simulation results on Glomosim platform show that LS-MAC exhibits higher bandwidth utilization and integral throughput without sacrificing energy efficiency.作者: GLIDE 時間: 2025-3-24 16:08
https://doi.org/10.1007/0-387-28094-4 decision. Third, we adopt the fuzzy comprehensive evaluation method to evaluate the security performance qualitatively and quantitatively. Finally, this method is proved to be reasonable and effective in simulation experiments.作者: 薄膜 時間: 2025-3-24 22:02 作者: insurgent 時間: 2025-3-24 23:37
Mobile Anchor-Assisted Localization in 3D Wireless Sensor Networks with Hilbert Curve,lementary material: .Das Repetitorium Schmerztherapie hat sich neben den erfolgreichen Repetitorien An?sthesie und Intensivmedizin innerhalb kurzer Zeit etabliert und erscheint in seiner 2. Auflage komplett überarbeitet und aktualisiert. Orientiert an den Weiterbildungsinhalten der B?K für die Zusat作者: exquisite 時間: 2025-3-25 05:09 作者: STAT 時間: 2025-3-25 10:31 作者: 抑制 時間: 2025-3-25 13:50 作者: 必死 時間: 2025-3-25 18:56 作者: Isthmus 時間: 2025-3-25 21:59
A Probabilistic Group Reverse k-Nearest-Neighbor Query in Sensor Networks,d. Das hei?t, das Objekt wandelt sich und mit ihm wandeln sich Umfang und Inhalt seiner Probleme, insbesondere der systembezogenen Probleme. In der . lag — wie wir bereits dargestellt haben (s. oben S. 61 ff.) — der Schwerpunkt der betriebswirtschaftlichen Problematik auf der Organisation des Innenb作者: 長矛 時間: 2025-3-26 03:39
Partition-Based MAC Protocol for Data Gathering in Wireless Sensor Networks,?g- lichen und in Zweifelsf?llen als Nachschlagebuch zu dienen. Es soll aber auch den Lernenden, insbesondere den Autodidakten, in die Systematik der Buchhaltung einführen und ihn in leichtverst?ndlicher Darstellung mit den Grundlagen und der Technik der doppelten Buchführung vertraut machen. Die Ka作者: Barter 時間: 2025-3-26 04:23
Energy Efficient Multicast Routing with Delay Constraint in Bus-Based DTNs,nalen Funktionen müssen wir zun?chst die Nullstellenmenge des Nennerpolynoms aus der Definitionsmenge ausgrenzen. Bei der Untersuchung der Umkehreigenschaften der Exponentialfunktion im zweiten Paragraphen sto?en wir zum erstenmal auf das Problem der Mehrdeutigkeit. Anstatt auf einer geeigneten Riem作者: 走調(diào) 時間: 2025-3-26 10:25 作者: Jocose 時間: 2025-3-26 14:21 作者: 冰河期 時間: 2025-3-26 19:34 作者: Nonthreatening 時間: 2025-3-26 22:10 作者: Excise 時間: 2025-3-27 02:12
Front Matterschmerzen, HWS-Syndrom. Durch viele nützliche Hinweise zu Indikationen, Pharmakokinetik und Wirkmechanismen sowie konkrete Praxistipps ein wertvoller Begleiter im Klinikalltag. Darüberhinaus ist es die optimale Prüfungsvorbereitung zur Erlangung der Zusatzbezeichnung "Spezielle Schmerztherapie". .978-3-642-20024-3作者: 好開玩笑 時間: 2025-3-27 05:29
Mobile Anchor-Assisted Localization in 3D Wireless Sensor Networks with Hilbert Curve,liche Hinweise zu Indikationen, Pharmakokinetik und Wirkmechanismen sowie konkrete Praxistipps ein wertvoller Begleiter im Klinikalltag. Darüberhinaus ist es die optimale Prüfungsvorbereitung zur Erlangung der Zusatzbezeichnung "Spezielle Schmerztherapie"..978-3-540-33301-2作者: nonradioactive 時間: 2025-3-27 13:20
Human Tracking System Based on PIR Sensor Network and Video,h im Wesentlichen auf dynamische, aerobe Belastungen; der Fokus dieses Kapitels liegt daher auf den messbaren kardialen Parametern vor, w?hrend und nach Belastung. Weiterführende, z.?B. (sport-)orthop?dische Aspekte, werden in ? Kap.?. berücksichtigt. Auch respiratorische und metabolische Gr??en (z.作者: Eviction 時間: 2025-3-27 14:52 作者: Explicate 時間: 2025-3-27 20:05 作者: sterilization 時間: 2025-3-28 02:01 作者: 運(yùn)動的我 時間: 2025-3-28 05:06
A Probabilistic Group Reverse k-Nearest-Neighbor Query in Sensor Networks,ehrsorganisationen. Es ist die Zeit der gro?en Kompendien, Lexika und Systeme der ?Handlung“ (damals gleichbedeutend mit ?Handel“). Im . (19. Jahrhundert) rückt die Technologie in den Mittelpunkt der Betriebswirtschaftslehre. Es beginnt die Zeit der ?Ingenieurwirtschaft“, die sich nicht nur technolo作者: Prologue 時間: 2025-3-28 06:58
Partition-Based MAC Protocol for Data Gathering in Wireless Sensor Networks,ternehmens (Umwandlung, Fusion usw. ) erforderlichen Buchungen. Der Buchhalter mu? auch in der Lage sein, die Buchführung auszuwerten, die Wirtschaftlichkeit der Betriebsgebarung zu prüfen und zu überwachen und seine Erkenntnisse auszuwerten. Ein besonderer Abschnitt ist daher der Bilanzanalyse und Bilanzkrit978-3-663-12558-7978-3-663-13073-4作者: Offbeat 時間: 2025-3-28 13:58 作者: CULP 時間: 2025-3-28 15:16
A Novel Skeleton Extraction Algorithm in Sensor Networks,978-3-658-00030-1作者: 過份好問 時間: 2025-3-28 22:46
A Real-Time Information Perceived Vehicle Opportunity Route: RIPVO,978-3-322-94518-1作者: Analogy 時間: 2025-3-28 23:52 作者: 售穴 時間: 2025-3-29 05:41 作者: 傻 時間: 2025-3-29 07:13
Security Evaluation for Wireless Sensor Networks Based on Attack Test and Fuzzy Comprehensive Judge978-3-322-94855-7作者: 噴油井 時間: 2025-3-29 11:44
A Study on the Wireless Sensor Networks MAC Protocol for Aircraft Health Monitoring,978-3-322-96590-5作者: Modicum 時間: 2025-3-29 19:23 作者: arcane 時間: 2025-3-29 21:31 作者: inferno 時間: 2025-3-30 00:38 作者: bromide 時間: 2025-3-30 04:50 作者: graphy 時間: 2025-3-30 09:10 作者: 煩人 時間: 2025-3-30 15:22
Advanced Technologies in Ad Hoc and Sensor NetworksProceedings of the 7作者: beta-carotene 時間: 2025-3-30 17:12
Biometric System and Data Analysishree-dimensional (3D) networks. In this method, an anchor is equipped with global positioning system (GPS) device, and traverses the network along the Hilbert space–filling curve. The ordinary nodes estimate their positions using trigonometric method based on the characteristics of Hilbert curve. We作者: 任意 時間: 2025-3-30 21:08 作者: cluster 時間: 2025-3-31 03:47 作者: 歹徒 時間: 2025-3-31 06:52
Herve Jarosz,Jean-Christophe Fondeur paper. First, a node executes limited and directed data flooding and then carries out feedback with modified greedy algorithm using hot area. In this strategy, nodes dynamically adjust parameters by self-learning properly. The experiment result under ONE simulator shows its promotion comparing to c作者: opinionated 時間: 2025-3-31 10:37 作者: Infantry 時間: 2025-3-31 17:01
Fundamentals in User Authenticationb manually for Wireless Sensor Networks (WSN) is designed for different applications. Combining Embedded Remote Procedure Call (ERPC) with web service, this paper presents a new Automated Unit Testing Framework (AUTF) of unit testing for WSN. First, tester uploads source code through web service int作者: 山頂可休息 時間: 2025-3-31 19:26 作者: 正式通知 時間: 2025-3-31 22:29
https://doi.org/10.1007/0-387-28094-4es advices to take effective security technologies, which is an important way to improve the security of the network proactively. Considering that the evaluation is a complex process and involves many factors, this paper proposes a security evaluation method for the wireless sensor networks based on作者: GUILE 時間: 2025-4-1 04:27
https://doi.org/10.1007/0-387-28094-4tion of the entire wireless network. WIA-PA (wireless network for industrial automation-process automation) is an IEC-approved industrial wireless standard. Having taken the features and architecture of WIA-PA into consideration, we implement and analyze two approaches of time synchronization mechan作者: tenuous 時間: 2025-4-1 06:44
Advances in Information Securitynetworks may result in poor network performance. This paper presents a link quality-based reliable routing algorithm. According to the link qualities evaluated by RSSI, neighbor nodes can be partitioned into different regions. First, based on a realistic link model and test results, an asymmetric li作者: BOOST 時間: 2025-4-1 13:58 作者: jaunty 時間: 2025-4-1 16:20
Evaluating Handwriting Biometricsring, we propose a modified TDMA protocol and relevant cluster members time synchronization mechanism. This modified TDMA protocol can adaptively allocate time slots based on sensor nodes data traffic, so that it can improve using efficiency of the channel, reduce the loss rate of the packets, time 作者: Antagonism 時間: 2025-4-1 18:49
Evaluating Handwriting Biometricsrecent applications, such as health monitoring applications, require high throughput to transmit sensing data in a burst. Aiming to maximize the integral throughput, we propose a new scheduled multi-channel MAC protocol, named LS-MAC, which adopts a fully distributed scheduling scheme through locall