International Journal of Autonomous and Adaptive Communications Systems最新文献

筛选
英文 中文
Optimum design of distance education assistant system based on wireless network 基于无线网络的远程教育辅助系统优化设计
IF 0.4
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/ijaacs.2023.10034574
Zixiang Yan
{"title":"Optimum design of distance education assistant system based on wireless network","authors":"Zixiang Yan","doi":"10.1504/ijaacs.2023.10034574","DOIUrl":"https://doi.org/10.1504/ijaacs.2023.10034574","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"70 1","pages":"84-96"},"PeriodicalIF":0.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85827263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of RPL under various mobility models in IoT 物联网中不同移动模式下RPL性能分析
IF 0.4
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/IJAACS.2023.131621
Spoorthi P. Shetty, Udaya Kumar K. Shenoy
{"title":"Performance of RPL under various mobility models in IoT","authors":"Spoorthi P. Shetty, Udaya Kumar K. Shenoy","doi":"10.1504/IJAACS.2023.131621","DOIUrl":"https://doi.org/10.1504/IJAACS.2023.131621","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"246 1","pages":"248-269"},"PeriodicalIF":0.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82764857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible data hiding algorithm in encrypted images using adaptive total variation and cross-cyclic shift 基于自适应全变和交叉循环移位的加密图像可逆数据隐藏算法
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/ijaacs.2023.10060344
Mingfang Jiang
{"title":"Reversible data hiding algorithm in encrypted images using adaptive total variation and cross-cyclic shift","authors":"Mingfang Jiang","doi":"10.1504/ijaacs.2023.10060344","DOIUrl":"https://doi.org/10.1504/ijaacs.2023.10060344","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135610178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-rank LBP using Local Differential Polarization for Fingerprint Liveness Detection 基于局部微分偏振的低秩LBP指纹活性检测
IF 0.4
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/ijaacs.2023.10054978
Mingyu Chen, Chengsheng Yuan, Yue Wu
{"title":"A Low-rank LBP using Local Differential Polarization for Fingerprint Liveness Detection","authors":"Mingyu Chen, Chengsheng Yuan, Yue Wu","doi":"10.1504/ijaacs.2023.10054978","DOIUrl":"https://doi.org/10.1504/ijaacs.2023.10054978","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"1 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66764661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on e-business requirement information resource extraction method in network big data 网络大数据环境下电子商务需求信息资源提取方法研究
IF 0.4
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/ijaacs.2023.10049564
Yawen Li
{"title":"Research on e-business requirement information resource extraction method in network big data","authors":"Yawen Li","doi":"10.1504/ijaacs.2023.10049564","DOIUrl":"https://doi.org/10.1504/ijaacs.2023.10049564","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"14 1","pages":"188-202"},"PeriodicalIF":0.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76449364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Heuristic positioning method for intrusion nodes in sensor networks based on quantum annealing algorithm 基于量子退火算法的传感器网络入侵节点启发式定位方法
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/ijaacs.2023.10059674
Mi Zhou, Bin Qian, Tao Huang, Yun Zhao, Ziwen Cai
{"title":"Heuristic positioning method for intrusion nodes in sensor networks based on quantum annealing algorithm","authors":"Mi Zhou, Bin Qian, Tao Huang, Yun Zhao, Ziwen Cai","doi":"10.1504/ijaacs.2023.10059674","DOIUrl":"https://doi.org/10.1504/ijaacs.2023.10059674","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136208697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalised recommendation algorithm of network resources based on collaborative knowledge map 基于协同知识地图的网络资源个性化推荐算法
IF 0.4
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/ijaacs.2023.131079
Xiaofei Liu, Shaohui Zhong
{"title":"Personalised recommendation algorithm of network resources based on collaborative knowledge map","authors":"Xiaofei Liu, Shaohui Zhong","doi":"10.1504/ijaacs.2023.131079","DOIUrl":"https://doi.org/10.1504/ijaacs.2023.131079","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"1 1","pages":"159-174"},"PeriodicalIF":0.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89760440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Key Distribution Method For Wireless Sensor Networks Based On Exponential Algorithm 基于指数算法的无线传感器网络动态密钥分配方法
IF 0.4
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/ijaacs.2023.10043736
Chao Cui, Weibin Lin, Yong Xiao, Yun Zhao, Di Xu
{"title":"Dynamic Key Distribution Method For Wireless Sensor Networks Based On Exponential Algorithm","authors":"Chao Cui, Weibin Lin, Yong Xiao, Yun Zhao, Di Xu","doi":"10.1504/ijaacs.2023.10043736","DOIUrl":"https://doi.org/10.1504/ijaacs.2023.10043736","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"1 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66764444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security key distribution method of wireless sensor network based on DV-hop algorithm 基于DV-hop算法的无线传感器网络安全密钥分发方法
IF 0.4
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/ijaacs.2023.129601
Gao-lei Fei
{"title":"Security key distribution method of wireless sensor network based on DV-hop algorithm","authors":"Gao-lei Fei","doi":"10.1504/ijaacs.2023.129601","DOIUrl":"https://doi.org/10.1504/ijaacs.2023.129601","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"75 1","pages":"66-83"},"PeriodicalIF":0.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76079257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability detection of the authentication protocol in the IOT based on improved wavelet packet 基于改进小波包的物联网认证协议漏洞检测
IF 0.4
International Journal of Autonomous and Adaptive Communications Systems Pub Date : 2023-01-01 DOI: 10.1504/ijaacs.2023.10034567
Shihong Chen
{"title":"Vulnerability detection of the authentication protocol in the IOT based on improved wavelet packet","authors":"Shihong Chen","doi":"10.1504/ijaacs.2023.10034567","DOIUrl":"https://doi.org/10.1504/ijaacs.2023.10034567","url":null,"abstract":"","PeriodicalId":38798,"journal":{"name":"International Journal of Autonomous and Adaptive Communications Systems","volume":"99 1","pages":"1-16"},"PeriodicalIF":0.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73845975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信