rectum 发表于 2025-3-25 10:51:48

Research on OFDM Technology in 4Gces is one of the most prominent features in 3G, the technology research of the next generation mobile communication systems (Beyond 3G-after 3G) or (4G- four-generation mobile communication systems) has long been expanded. This paper is mainly researched by how to use OFDM technology as the core te

Emg827 发表于 2025-3-25 13:29:08

Network Resource Search System Based on Cluster Architecture, which can realize collection and updating maintenance of network resource. The paper focuses on describing operating principle of the system, based on which the paper proposes the design and implementation of the system. Based on hash method of vector space, the system realizes load balance of clu

男学院 发表于 2025-3-25 16:44:36

Network Sharing Mode in the University Libraries in the new era. The construction of the Information Commons of university libraries has important significance, which not only meets the needs of information on students and teachers, but also improves the educational function of the libraries. Therefore, this paper analyzes the practice of the net

先行 发表于 2025-3-25 22:03:52

http://reply.papertrans.cn/47/4651/465015/465015_25.png

babble 发表于 2025-3-26 01:34:18

Using Behavior of Social Network Sites Based on Acceptance Model study conducting in-depth interviews to discover the relevant clues and factors that may affect users’ adoption of social network website. The results indicated that attitude has a significant influence on behavioral intention, and intrinsic motivation such as perceived playfulness has a positive i

使迷醉 发表于 2025-3-26 05:15:43

Detection and Service Security Mechanism of XML Injection Attackstion attacks, the paper proposes a detection method based on SOAP message verification tree. For the characteristics of parameter-error XML injection attack, the paper proposes a method that detects if there are nodes with the same name under a node of SOAP messages. Simulation results indicate that

混合 发表于 2025-3-26 11:36:45

http://reply.papertrans.cn/47/4651/465015/465015_28.png

VERT 发表于 2025-3-26 15:22:18

Training Data of City Tunnel Traffic Situation Awarenesseo data, traffic data, environmental data, sensor data and so on. This paper discusses how to use the monitoring data to realize city tunnel traffic situation awareness. First, we need to mine a set of strong associated characteristic groups according to the association rules, and then determine the

接触 发表于 2025-3-26 20:15:46

http://reply.papertrans.cn/47/4651/465015/465015_30.png

松软无力 发表于 2025-3-27 00:29:37

http://reply.papertrans.cn/47/4651/465015/465015_31.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Computing and Applications; 4th International Co Yuhang Yang,Maode Ma,Baoxiang Liu Conference proceedings 2013 The Editor(s) (i