語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Wireless Internet = 12th EAI Interna...
~
Lin, Chun-Cheng.
Wireless Internet = 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26–27, 2019, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Wireless Internet/ edited by Der-Jiunn Deng, Ai-Chun Pang, Chun-Cheng Lin.
其他題名:
12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26–27, 2019, Proceedings /
其他作者:
Lin, Chun-Cheng.
面頁冊數:
XI, 303 p. 159 illus., 117 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data Structures and Information Theory. -
電子資源:
https://doi.org/10.1007/978-3-030-52988-8
ISBN:
9783030529888
Wireless Internet = 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26–27, 2019, Proceedings /
Wireless Internet
12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26–27, 2019, Proceedings /[electronic resource] :edited by Der-Jiunn Deng, Ai-Chun Pang, Chun-Cheng Lin. - 1st ed. 2020. - XI, 303 p. 159 illus., 117 illus. in color.online resource. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,3171867-8211 ;. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,154.
Design and Implementation of Automatic Following Technology for Mobile Devices -- Efficient Deployment Based on Congestion Control Delivery in Multi-Hop Wireless Sensor Network -- A combined routing path and node importance network invulnerability evaluating method for Ad Hoc network -- An OFDMA-based neighbor discovery and tracking protocol for directional Ad-Hoc Network -- Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs -- Relay Selection exploiting Genetic Algorithms for Multi-Hop Device-to-Device Communication -- A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) For Securing Wireless Sensor Networks and Internet of Things -- A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks -- Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemes -- A Group Signature Scheme for Securing Blockchain-based Mobile Edge Computing -- A Research on Blockchain-Based Central Bank Digital Currency -- Application of Blockchain in Smart Contracts Technology -- Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony Algorithm -- Network Protocols and Connectivity for Internet of Things -- BatTalk: Monitoring Asian Parti-colored Bats through the IoT Technology -- Using multi-channel transmission technology to construct an IoT mechanism for homecare service -- IOT Applications to the Land Acquisition Evaluation Mechanism -- An Edge Computing Architecture for Object Detection -- The Implementation of an Edge Computing Architecture with LoRaWAN for Air Quality Monitoring Applications -- Combination of OFDM and CDMA Techniques for a High Bandwidth Optimization and a Great Improve-ment of Signal Quality in OFDM Systems -- Traffic Load Perception based OFDMA MAC Protocol for the Next Generation WLAN -- Environment Sensing based Adaptive Acknowledgement and Backoff for the Next Generation WLAN -- Multi-BSS Association and Cooperation based Handoff Scheme for the Next Generation mmWave WiFi: IEEE 802.11ay -- A Plug-in Framework for Efficient Multicast Using SDN -- Cross-border E-commerce Intellectual Property Protection in China-U.S. Trade Friction -- A Framework for Big Data Analytics on Service Quality Evaluation of Online Bookstore -- Intention of online consumers to buy behavior affected by extreme weather-take the mainland Chinese Haining market as an example. .
This book constitutes the refereed post-conference proceedings of the 12th International Conference on Wireless Internet, WiCON 2019, held in TaiChung, Taiwan, in November 2019. The 39 full papers were selected from 79 submissions and are grouped into the following topics: Ad hoc and sensor network, artificial intelligence, security and blockchain, internet of things, wireless internet, services and applications.
ISBN: 9783030529888
Standard No.: 10.1007/978-3-030-52988-8doiSubjects--Topical Terms:
1211601
Data Structures and Information Theory.
LC Class. No.: QA75.5-76.95
Dewey Class. No.: 005.7
Wireless Internet = 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26–27, 2019, Proceedings /
LDR
:04435nam a22004095i 4500
001
1025758
003
DE-He213
005
20200730225639.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030529888
$9
978-3-030-52988-8
024
7
$a
10.1007/978-3-030-52988-8
$2
doi
035
$a
978-3-030-52988-8
050
4
$a
QA75.5-76.95
072
7
$a
UT
$2
bicssc
072
7
$a
COM069000
$2
bisacsh
072
7
$a
UT
$2
thema
082
0 4
$a
005.7
$2
23
245
1 0
$a
Wireless Internet
$h
[electronic resource] :
$b
12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26–27, 2019, Proceedings /
$c
edited by Der-Jiunn Deng, Ai-Chun Pang, Chun-Cheng Lin.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XI, 303 p. 159 illus., 117 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
317
505
0
$a
Design and Implementation of Automatic Following Technology for Mobile Devices -- Efficient Deployment Based on Congestion Control Delivery in Multi-Hop Wireless Sensor Network -- A combined routing path and node importance network invulnerability evaluating method for Ad Hoc network -- An OFDMA-based neighbor discovery and tracking protocol for directional Ad-Hoc Network -- Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs -- Relay Selection exploiting Genetic Algorithms for Multi-Hop Device-to-Device Communication -- A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) For Securing Wireless Sensor Networks and Internet of Things -- A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks -- Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemes -- A Group Signature Scheme for Securing Blockchain-based Mobile Edge Computing -- A Research on Blockchain-Based Central Bank Digital Currency -- Application of Blockchain in Smart Contracts Technology -- Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony Algorithm -- Network Protocols and Connectivity for Internet of Things -- BatTalk: Monitoring Asian Parti-colored Bats through the IoT Technology -- Using multi-channel transmission technology to construct an IoT mechanism for homecare service -- IOT Applications to the Land Acquisition Evaluation Mechanism -- An Edge Computing Architecture for Object Detection -- The Implementation of an Edge Computing Architecture with LoRaWAN for Air Quality Monitoring Applications -- Combination of OFDM and CDMA Techniques for a High Bandwidth Optimization and a Great Improve-ment of Signal Quality in OFDM Systems -- Traffic Load Perception based OFDMA MAC Protocol for the Next Generation WLAN -- Environment Sensing based Adaptive Acknowledgement and Backoff for the Next Generation WLAN -- Multi-BSS Association and Cooperation based Handoff Scheme for the Next Generation mmWave WiFi: IEEE 802.11ay -- A Plug-in Framework for Efficient Multicast Using SDN -- Cross-border E-commerce Intellectual Property Protection in China-U.S. Trade Friction -- A Framework for Big Data Analytics on Service Quality Evaluation of Online Bookstore -- Intention of online consumers to buy behavior affected by extreme weather-take the mainland Chinese Haining market as an example. .
520
$a
This book constitutes the refereed post-conference proceedings of the 12th International Conference on Wireless Internet, WiCON 2019, held in TaiChung, Taiwan, in November 2019. The 39 full papers were selected from 79 submissions and are grouped into the following topics: Ad hoc and sensor network, artificial intelligence, security and blockchain, internet of things, wireless internet, services and applications.
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
669780
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Computer System Implementation.
$3
669803
650
1 4
$a
Information Systems and Communication Service.
$3
669203
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Software engineering.
$3
562952
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Architecture, Computer.
$3
1255731
650
0
$a
Computers.
$3
565115
700
1
$a
Lin, Chun-Cheng.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1279561
700
1
$a
Pang, Ai-Chun.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1302702
700
1
$a
Deng, Der-Jiunn.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1279560
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030529871
776
0 8
$i
Printed edition:
$z
9783030529895
830
0
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
154
$3
1253880
856
4 0
$u
https://doi.org/10.1007/978-3-030-52988-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入