Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • CopyLimited Flooding over Opportunistic Networks <span xss=removed>Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit <span xss=removed>communication opportunities arising from the movement of their users. For some occasions, such as < ...
  • Using the original and ‘symmetrical face’ training samples to pe... ... training samples cannot comprehensively convey these<br> possible changes, so it is hard to improve the accuracy of face recognition. In this paper, we propose to<br> exploit the symmetry of the face to generate new samples and devise a repre
  • Comparative study of f iber optic liquid level sensors based on ... ... B-Ge co-doped fibers with different dopant concentrations. We investigate the temperature sensitivities of LPGs and exploit their refractive index sensitivity to implement liquid level measurement. By controlling fiber parameters, such as the dopant ...
  • Sparse imaging for passive radar system based on digital video b... ... satellites and one receiver is established. After analyz-<br>ing in the wavenumber domain, we consider to exploit the sparsity of the target to realize high-resolution imaging from the undersampled wavenumber domain coverage. However, traditional ...
  • An Adaptive Detector with Range Estimation Capabilities for Part... ... decision scheme with range estimation capabilities for point-like targets in partially homogeneous environments. To this end, we exploit the spillover of target energy to consecutive range samples and synthesize the Generalized Likelihood Ratio Test. The ...
  • An Adaptive Detector with Range Estimation Capabilities for Part... ... decision scheme with range estimation capabilities for point-like targets in partially homogeneous environments. To this end, we exploit the spillover of target energy to consecutive range samples and synthesize the Generalized Likelihood Ratio Test. The ...
  • A Novel Local Nonlinear Preferential Attachment model for Wirele... ... radius of the sensor nodes are limited, so nodes only communicate with the nodes in local area network (LAN). We exploit this property by introducing a local nonlinear preferential attachment strategy into our model. The new model has stable degree ...
  • A Revisit to the Design of Switched Observers for Switched Linea... ... function is introduced to analyze the stability of the switched error dynamics. Compared with the existing time-invariant Lyapunov function method, the proposed time-varying Lyapunov function method is more suitable to exploit the structural characteris
  • Evaluable secure ranked keyword search scheme over encrypted clo... ... Storage Security. Based on the<br>original solution of secure ranked keyword search over<br>encrypted cloud data, we exploit the concept of evaluation for<br>relevance of index. We introduce the Index Evaluation Service<br>to build ...
  • Landmark-Centric Routing for Wireless Sensor Networks in Mobile ... ... for delay tolerant mobile sensor networks (DTMSNs). In this paper, after making an analysis about the effect of social network theory on forwarding scheme and node mobility, we exploit landmark, a new social-aware metric indicating the geographical lo