標(biāo)題: Titlebook: Computational Intelligence in Wireless Sensor Networks; Recent Advances and Ajith Abraham,Rafael Falcon,Mario Koeppen Book 2017 Springer I [打印本頁] 作者: 大破壞 時間: 2025-3-21 17:08
書目名稱Computational Intelligence in Wireless Sensor Networks影響因子(影響力)
書目名稱Computational Intelligence in Wireless Sensor Networks影響因子(影響力)學(xué)科排名
書目名稱Computational Intelligence in Wireless Sensor Networks網(wǎng)絡(luò)公開度
書目名稱Computational Intelligence in Wireless Sensor Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computational Intelligence in Wireless Sensor Networks被引頻次
書目名稱Computational Intelligence in Wireless Sensor Networks被引頻次學(xué)科排名
書目名稱Computational Intelligence in Wireless Sensor Networks年度引用
書目名稱Computational Intelligence in Wireless Sensor Networks年度引用學(xué)科排名
書目名稱Computational Intelligence in Wireless Sensor Networks讀者反饋
書目名稱Computational Intelligence in Wireless Sensor Networks讀者反饋學(xué)科排名
作者: Malfunction 時間: 2025-3-21 21:00 作者: 字謎游戲 時間: 2025-3-22 02:13
Book 2017er science or applied mathematics) benefit from th e spectrum of successful applications reported in this book. Senior undergraduate or graduate students may discover in this book some problems well suited for their own research endeavors..作者: 一美元 時間: 2025-3-22 06:34
Book 2017ss Sensor Networks (WSN) related problems. The book serves as a guide for surveying several state-of-the-art WSN scenarios in which CI approaches have been employed. The reader finds in this book how CI has contributed to solve a wide range of challenging problems, ranging from balancing the cost an作者: 石墨 時間: 2025-3-22 11:35
1860-949X n CI applied to challenging real-world problems in the wirel.This book emphasizes the increasingly important role that Computational Intelligence (CI) methods are playing in solving a myriad of entangled Wireless Sensor Networks (WSN) related problems. The book serves as a guide for surveying severa作者: 阻擋 時間: 2025-3-22 13:07
Physica-Schriften zur Betriebswirtschaftational intelligence (CI) based security schemes have not been properly explored. Here, we explore the CI-based approach for scientific computing problems and try to find the recent challenges and future opportunities for developing the CI-based security schemes for WSNs.作者: 阻擋 時間: 2025-3-22 17:06
Computational Intelligence Based Security in Wireless Sensor Networks: Technologies and Design Chalational intelligence (CI) based security schemes have not been properly explored. Here, we explore the CI-based approach for scientific computing problems and try to find the recent challenges and future opportunities for developing the CI-based security schemes for WSNs.作者: 西瓜 時間: 2025-3-22 23:19
1860-949X eported in this book. Senior undergraduate or graduate students may discover in this book some problems well suited for their own research endeavors..978-3-319-83804-5978-3-319-47715-2Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: Glycogen 時間: 2025-3-23 02:54
https://doi.org/10.1007/978-3-658-41149-7 based on both cost and accuracy. We compare these approaches in a setting where the available budget for sampling is considered to remain constant, and in a setting where the system is sensitive to a fluctuating budget, for example available battery power. We show that in both settings, for increas作者: exclamation 時間: 2025-3-23 08:08
https://doi.org/10.1007/978-3-658-41149-7i-objective optimization models. Thus, for the mesh router nodes placement, the bi-objective optimization problem is obtained consisting in the maximization of the size of the giant component in the mesh routers network (for measuring network connectivity) and that of user coverage. Some computation作者: 脆弱么 時間: 2025-3-23 13:11
Strategische Investitionsplanungbles are fuzzified using trapezoidal and triangular membership functions in MATLAB. In this fuzzification, a Max–Min inference engine and a Mamdani-type rule base was adopted in order to make the best decision for each situation. Thus by preventing needless irrigation, not only water demand is reduc作者: ALT 時間: 2025-3-23 14:16
https://doi.org/10.1007/978-3-322-86284-6 cellular networks provide mobile phone positioning facility with better performance accuracy and this opportunity can help to obtain accurate traffic flow information in cost effective manner on the entire road networks. The purpose of this chapter is to present our approach for real-time road traf作者: Tempor 時間: 2025-3-23 19:36
Herbert Wanner,Mireille J. Quirinabe detected and transmitted to help user at the monitoring site to take necessary action. In this chapter, particle swarm optimization (PSO) based efficient anomaly detection system (EADS) is proposed which will detect the presence of anomalies and transmit the required measurements via TelosB nodes作者: organism 時間: 2025-3-23 23:22
Katja Steinmann,Andreas Weishaarst manner to come up with these trajectories by taking into account the current energy levels of the participating passive sensors as well as the ideal locations for their deployment. We resort to multi-objective optimization (MOO) to handle the tradeoffs among the different decision objectives that作者: 噴油井 時間: 2025-3-24 03:47 作者: Scintillations 時間: 2025-3-24 08:57
A Genetic Programming Approach to Cost-Sensitive Control in Wireless Sensor Networks, based on both cost and accuracy. We compare these approaches in a setting where the available budget for sampling is considered to remain constant, and in a setting where the system is sensitive to a fluctuating budget, for example available battery power. We show that in both settings, for increas作者: 陳列 時間: 2025-3-24 12:39
A Study on Performance of Hill Climbing Heuristic Method for Router Placement in Wireless Mesh Netwi-objective optimization models. Thus, for the mesh router nodes placement, the bi-objective optimization problem is obtained consisting in the maximization of the size of the giant component in the mesh routers network (for measuring network connectivity) and that of user coverage. Some computation作者: 外露 時間: 2025-3-24 15:05 作者: headlong 時間: 2025-3-24 22:32 作者: inscribe 時間: 2025-3-25 03:01
Efficient Anomaly Detection System for Video Surveillance Application in WVSN with Particle Swarm Obe detected and transmitted to help user at the monitoring site to take necessary action. In this chapter, particle swarm optimization (PSO) based efficient anomaly detection system (EADS) is proposed which will detect the presence of anomalies and transmit the required measurements via TelosB nodes作者: meritorious 時間: 2025-3-25 04:26 作者: athlete’s-foot 時間: 2025-3-25 08:47 作者: Femine 時間: 2025-3-25 13:40 作者: COW 時間: 2025-3-25 19:42
An Automated Irrigation System Based on a Low-Cost Microcontroller for Tomato Production in South Iinvolved in agriculture. Since, substantial irrigation is necessary for better production in arid regions, reduce the water loss via evapotranspiration is a key to reach sustainable irrigation. This chapter presented a practical result on irrigation controller for the cultivation of vegetable plants作者: 多骨 時間: 2025-3-25 22:48 作者: 情節(jié)劇 時間: 2025-3-26 03:41 作者: 粗鄙的人 時間: 2025-3-26 05:15
Computational Intelligence Based Security in Wireless Sensor Networks: Technologies and Design Chalo security in WSN environments. The application of intelligent computing works efficiently for many computing and scientific problems; but, the computational intelligence (CI) based security schemes have not been properly explored. Here, we explore the CI-based approach for scientific computing prob作者: 愛了嗎 時間: 2025-3-26 08:53
Efficient Anomaly Detection System for Video Surveillance Application in WVSN with Particle Swarm Oalthcare, home automation, etc. Recent technological developments have enabled the use of wireless visual sensor networks (WVSNs) for sensitive applications such as video surveillance and monitoring applications. Limited memory, energy and bandwidth are the major constraints in WVSN that can be simp作者: Exonerate 時間: 2025-3-26 15:10 作者: 引導(dǎo) 時間: 2025-3-26 18:10
https://doi.org/10.1007/978-3-319-47715-2CI Algorithms and Architectures for WSNs; CI Solutions in WSN Applications; Computational Intelligence作者: Ballerina 時間: 2025-3-27 00:04
978-3-319-83804-5Springer International Publishing AG 2017作者: jumble 時間: 2025-3-27 05:01
Computational Intelligence in Wireless Sensor Networks978-3-319-47715-2Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: Accommodation 時間: 2025-3-27 08:05
Ajith Abraham,Rafael Falcon,Mario KoeppenPresents recent advances and future challenges of computational intelligence (CI) in wireless sensor networks.Surveys the state of the art in CI applied to challenging real-world problems in the wirel作者: libertine 時間: 2025-3-27 09:45 作者: 甜得發(fā)膩 時間: 2025-3-27 14:57
https://doi.org/10.1007/978-3-658-41149-7ple in their power requirements. This raises the problem of automatically controlling heterogeneous sensor suites in wireless sensor network applications, in a manner that balances cost and accuracy of sensors. We apply genetic programming (GP) to this problem, considering two basic approaches. Firs作者: 可忽略 時間: 2025-3-27 21:11
https://doi.org/10.1007/978-3-658-41149-7), whose topology can vary from a simple star network to an advanced multi-hop wireless mesh network. The main topological feature in this case is that nodes are organized in a mesh topology, making WMNs a reliable infrastructure through redundancy of multi-hop communications. The main issue of WMNs作者: somnambulism 時間: 2025-3-27 23:44 作者: 佛刊 時間: 2025-3-28 04:19
https://doi.org/10.1007/978-3-322-86284-6used huge waste of time, property damage and environmental pollution in recent years. To address these problems, use of information communication technology-based transport systems that can support maximum utilization of the existing road transport infrastructure has been proposed by different resea作者: 油膏 時間: 2025-3-28 08:38 作者: Presbyopia 時間: 2025-3-28 12:23
Physica-Schriften zur Betriebswirtschafto security in WSN environments. The application of intelligent computing works efficiently for many computing and scientific problems; but, the computational intelligence (CI) based security schemes have not been properly explored. Here, we explore the CI-based approach for scientific computing prob作者: Engaging 時間: 2025-3-28 15:26 作者: conceal 時間: 2025-3-28 21:53