aspect 发表于 2025-3-27 00:10:44
http://reply.papertrans.cn/24/2305/230464/230464_31.png细菌等 发表于 2025-3-27 04:53:28
Topology Control Method Using Adaptive Redundant Transmission Range in Mobile Wireless Sensor Netwod any topology control algorithms and prolong the network connectivity time in mobility environment. Simulation results show good performance not only the network connectivity but also node’s energy consumption.易于 发表于 2025-3-27 08:11:47
Timer and Sequence Based Packet Loss Detection Scheme for Efficient Selective Retransmission in DCCproposes a new packet loss detection method for efficient selective retransmission in DCCP. The proposed scheme detects packet loss by using timer and out of sequence packets. Simulation results show that the proposed method improves the performance of retransmission by detecting packet loss more quickly and accurately.颂扬国家 发表于 2025-3-27 09:55:40
Transposed UL-PUSC Subcarrier Allocation Technique for Channel Estimation in WiMAX,ols. We compare between the performance of the conventional UL-PUSC and our proposed one under different radio channel conditions. We finally propose an adaptive algorithm that selects the optimum pilot pattern based on channel conditions.Magnificent 发表于 2025-3-27 16:49:28
https://doi.org/10.1007/978-3-319-54325-3nd three for orientation relative to the world coordinate system. Our framework aims to lead AR applications in unprepared environments with multiple tracking objects regardless of the movement of real objects, lights and cameras.JAMB 发表于 2025-3-27 20:50:48
Case Study: The Billing System Projectolves above problems at the same time in a dense and large scale sensor network. The result of experiment showed that routing algorithm proposed in this study has reasonable fault-tolerance, energy efficiency, and offers its adaptability to topological changes in a dense and large scale sensor network.厚脸皮 发表于 2025-3-27 23:06:56
Case Study: The Billing System Revisitedmation Base (MIB) according to their characteristics. Then, we will define management messages and message exchange operation for each kind of MIB. The analysis result of the management overhead indicates that the proposed framework can reduce management traffic compared to polling mechanism.贪心 发表于 2025-3-28 04:54:10
Case Study: The Billing System Revisitedent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.HAVOC 发表于 2025-3-28 07:30:13
http://reply.papertrans.cn/24/2305/230464/230464_39.png流出 发表于 2025-3-28 12:45:32
http://reply.papertrans.cn/24/2305/230464/230464_40.png