Báo cáo hóa học: " Research Article Efficient Data Association in Visual Sensor Networks with Missing Detection" ppt
... pages doi:10.1155/2011/176026 Research Article Efficient Data Association in Visual Sensor Networks with Missing Detection Jiuqing Wan and Qing yun Liu Department of Automation, Beijing University of Aeronautics ... for visual surveillance with Visual Sensor Networks (VSN) is the correct association of camera’s observations with the tracks of objects under t...
Ngày tải lên: 21/06/2014, 05:20
... P. Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, ” in Proceedings of the International Conference on Information Processing in Sensor Networks ... explaining why security is extremely challenging in routing and multicasting. In prac- tice, establishing a trusted entity referred to as a certification authority (CA) by using a...
Ngày tải lên: 21/06/2014, 11:20
... induces a current in another electromagnetic coil, producing an output signal. Spring reverberation gained popularity in the late 1950s and 1960s, in both studio applications and within instrument amplifiers, ... band, without producing any adverse effects. The Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2011, Article ID 646134, 8 pages doi:1...
Ngày tải lên: 21/06/2014, 05:20
Báo cáo hóa học: " Research Article Efficient Compensation of Transmitter and Receiver IQ Imbalance in OFDM Systems" pptx
... tot [ l ] S tot [ l ] = ⎡ ⎣ B[l]Q r diff1 [l]Q t diff1 [l]+Q r diff2 [l]B ∗ [l m ]Q ∗ t diff2 [l m ] B[l]Q r diff1 [l]Q t diff2 [l]+Q r diff2 [l]B ∗ [l m ]Q ∗ t diff1 [l m ] ⎤ ⎦ T × S [ l ] S ∗ [ l m ] , (39) Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2010, Article ID 106562, 14 pages doi:10.1155/2010/106562 Research Article Efficient C...
Ngày tải lên: 21/06/2014, 08:20
Báo cáo hóa học: " Research Article Efficient Uplink Modeling for Dynamic System-Level Simulations of Cellular and Mobile Networks" ppt
... described in Section 3.6. Once again, the reduced scheduling gain (through more QoS constraints) is considered in the throughput mapping, rather than in the scheduling proba- bilities. 3.8. Initialization ... pages doi:10.1155/2010/282465 Research Article Efficient Uplink Modeling for Dynamic System-Level Simulations of Cellular and Mobile Networks Ingo Viering, 1 Andreas L obing...
Ngày tải lên: 21/06/2014, 11:20
Báo cáo hóa học: " Research Article Efficient Public Key Certificate Management for Mobile Ad Hoc Networks" potx
... are examined in order to include in MPR(u) the vertex v. If there are remaining nodes without covering in N 2 (u), in the second stage, those vertices in N 1 (u) covering more vertices in that ... combining typical authentication elements with common ideas used in routing protocols in MANETs. In particular, the Optimised Link State Routing (OLSR) protocol from which some i...
Ngày tải lên: 21/06/2014, 11:20
báo cáo hóa học:" Research Article On Invariant Tori of Nearly Integrable Hamiltonian Systems with Quasiperiodic Perturbation" ppt
... R ◦ Φ. Hindawi Publishing Corporation Fixed Point Theory and Applications Volume 2010, Article ID 697343, 17 pages doi:10.1155/2010/697343 Research Article On Invariant Tori of Nearly Integrable ... ω 0 , ω satisfying certain Diophantine condition, we are concerned with the existence of invariant torus with ω as its frequency for Hamiltonian system 1.3. The following theorem...
Ngày tải lên: 21/06/2014, 11:20
báo cáo hóa học:" Research Article Some Identities of Bernoulli Numbers and Polynomials Associated with Bernstein Polynomials" pptx
... Bernstein polynomials. In the present paper, we introduce the Bernstein polynomials on the ring of p-adic integers Z p . We also investigate some interesting properties of the Bernstein polynomials related ... authors. Some researchers have studied the Bernstein polynomials in the area of approximation theory see 1–7. In recent years, Acikgoz and Araci 1, 2 have introduced several...
Ngày tải lên: 21/06/2014, 11:20
Báo cáo hóa học: " Research Article Modeling the Lion Attack in Cognitive Radio Networks" pptx
... probability that the instant of time t = t i does not fall within a handoff interval, given that the previous instants t = t j with j = 1 ···i − 1 do fall within a handoff interval. For example, the inactivity ... used in CRNs, in which the TCP sender is responsible for freezing itself its own parameters without the need of being warned by the receiver, as it is the case in Freeze-TCP....
Ngày tải lên: 21/06/2014, 11:20
Báo cáo hóa học: " Research Article Wireless Information-Theoretic Security in an Outdoor Topology with Obstacles: Theoretical Analysis and Experimental Measurements" docx
... Science,pp. 3–12, Springer, 2010. [19] P. C. Pinto, J. Barros, and M. Z. Win, “Physical-layer security in stochastic wireless networks, ” in Proceedings of 11th IEEE Singapore International Conference ... mathematical expressionsofWITSkeyparameters. In addition, as proven from the OLOS and NLOS topologies examined in this paper, interference from other operating networks in the s...
Ngày tải lên: 21/06/2014, 11:20