咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 77 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36 篇 工学
    • 33 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 19 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 6 篇 交通运输工程
    • 6 篇 生物工程
    • 5 篇 仪器科学与技术
    • 4 篇 机械工程
    • 4 篇 电气工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 安全科学与工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 航空宇航科学与技...
    • 2 篇 农业工程
  • 20 篇 理学
    • 12 篇 数学
    • 6 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 化学
    • 2 篇 系统科学
  • 13 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 农学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 routing
  • 4 篇 conferences
  • 4 篇 roads
  • 4 篇 blockchain
  • 4 篇 software
  • 4 篇 privacy
  • 3 篇 simulation
  • 3 篇 relays
  • 3 篇 task analysis
  • 3 篇 delays
  • 3 篇 bandwidth
  • 3 篇 data communicati...
  • 3 篇 energy consumpti...
  • 3 篇 wireless sensor ...
  • 3 篇 location awarene...
  • 3 篇 protocols
  • 3 篇 data collection
  • 3 篇 vehicular ad hoc...
  • 2 篇 scalability
  • 2 篇 automation

机构

  • 23 篇 college of compu...
  • 18 篇 inner mongolia a...
  • 11 篇 inner mongolia k...
  • 9 篇 inner mongolia k...
  • 6 篇 inner mongolia k...
  • 4 篇 engineering rese...
  • 4 篇 inner mongolia u...
  • 3 篇 inner mongolia k...
  • 3 篇 college of compu...
  • 2 篇 college of compu...
  • 2 篇 ordos dongsheng ...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia k...
  • 2 篇 inner mongolia a...
  • 2 篇 inner mongolia p...
  • 1 篇 inner mongolia a...
  • 1 篇 inner mongolia a...
  • 1 篇 jiangsu high tec...
  • 1 篇 inner mongolia u...

作者

  • 24 篇 xiangyu bai
  • 14 篇 bai xiangyu
  • 10 篇 baoqi huang
  • 8 篇 xu gang
  • 8 篇 kexin zhou
  • 8 篇 huang baoqi
  • 7 篇 bo cui
  • 7 篇 gang xu
  • 7 篇 cui bo
  • 7 篇 jia bing
  • 6 篇 zhaoran wang
  • 5 篇 wang zhaoran
  • 5 篇 bing jia
  • 4 篇 wenhan hou
  • 4 篇 hao lifei
  • 4 篇 zhou kexin
  • 3 篇 lei yao
  • 3 篇 qi zhihan
  • 3 篇 wuyungerile li
  • 3 篇 li wuyungerile

语言

  • 77 篇 英文
检索条件"机构=Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing College of Computer"
77 条 记 录,以下是51-60 订阅
排序:
On the Fine-Grained Crowd Analysis via Passive WiFi Sensing
TechRxiv
收藏 引用
TechRxiv 2023年
作者: Hao, Lifei Huang, Baoqi Jia, Bing Mao, Guoqiang The Engineering Research Center of Ecological Big Data Ministry of Education The Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing The College of Computer Science Inner Mongolia University Hohhot010021 China The Research Institute of Smart Transportation Xidian University Xi’an710071 China
Regarding the passive WiFi sensing based crowd analysis, this paper first theoretically investigates its limitations, and then proposes a deep learning based scheme targeted for returning fine-grained crowd states in ... 详细信息
来源: 评论
Research on Data Collection Mechanism of wireless Sensor Network Based on UAV
Research on Data Collection Mechanism of Wireless Sensor Net...
收藏 引用
作者: Wen Xie Xiangyu Bai Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Collece of Computer ScienceInner Mongolia University
In recent years, wireless Sensor networks(WSNs) have developed rapidly and have been widely used in various fields such as commerce, agriculture, military affairs and the environment. However,with the development of... 详细信息
来源: 评论
Counting mobile Devices With Physical Layer Measurements in the 2.4GHz ISM Band
Counting Mobile Devices With Physical Layer Measurements in ...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted computing, UIC-ATC
作者: Zhaoyan Zhang Baoqi Huang Chaowei Zhang Bing Jia Wuyungerile Li Gang Xu Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Key Laboratory of Wireless Networking and Mobile Computing Hohhot China College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Power Marketing Service and Operation Management Center
In general, the more mobile devices are operating in space, the more wireless communications are produced, leading to significant changes in the wireless spectrum, which can be utilized to infer the number of mobile d...
来源: 评论
Trajectory Privacy Protection Method based on Shadow vehicles
Trajectory Privacy Protection Method based on Shadow vehicle...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yaqiong Ma Xiangyu Bai Zhaoran Wang College of Computer Science Inner Mongolia University Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot China
Location Based Services (LBS) are widely used in VANETs to provide a variety of services for vehicles. The trajectory privacy protection has attracted wide attention. However, there are some shortcomings in the scheme... 详细信息
来源: 评论
A Channel Adaptive WiFi Indoor Localization Method based on Deep Learning
A Channel Adaptive WiFi Indoor Localization Method based on ...
收藏 引用
IEEE Conference on wireless Communications and networking
作者: Lifei Hao Baoqi Huang Hao Hong Bing Jia Wuyungerile Li Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot China College of Computer Science Inner Mongolia University Hohhot China
With the increasing demand on Indoor Location-Based Services (ILBS), various positioning technologies had emerged in the past decades, and WiFi-based approach is one of the most promising ones. However, the existing W... 详细信息
来源: 评论
Research on VANET Network Coding Strategy in Expressway Scene
Research on VANET Network Coding Strategy in Expressway Scen...
收藏 引用
International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
作者: Hua Zhang Xiangyu Bai Lei Yao Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing School of Computer Science Inner Mongolia University Hohhot Inner Mongolia Autonomous Region China
VANET is a real-time, intelligent transportation network featuring motion patterns limited by roads, diverse transmission data, and frequent topological changes. In the highway scene, the network coding and the roadsi... 详细信息
来源: 评论
key nodes recognition in opportunistic network  6th
Key nodes recognition in opportunistic network
收藏 引用
6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020
作者: Wang, Zhifei Xu, Gang Wei, Fengqi Qi, Zhihan He, Liqiang College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot China Geomechanica Inc. Toronto Canada
There are always communication fragmented regions in opportunistic networks, and Ferry nodes which can periodicity commute between different fragmented regions always be placed in opportunistic networks. At present, t... 详细信息
来源: 评论
Automation Test Tool for the Page Load Time of mobile Applications
Automation Test Tool for the Page Load Time of Mobile Applic...
收藏 引用
International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
作者: Wentao Zeng Xiangyu Bai Kexin Zhou Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing School of Computer Science Inner Mongolia University Hohhot Inner Mongolia Autonomous Region China
When users use a mobile phone application for the first time, except for functional requirements the more direct experience is the performance of the application on the phone. The main work of this article is designin... 详细信息
来源: 评论
Energy Balance and Cache Optimization Routing Algorithm Based on Communication Willingness
Energy Balance and Cache Optimization Routing Algorithm Base...
收藏 引用
IEEE Conference on wireless Communications and networking
作者: JingJian Chen Gang Xu XiaoRui Wu FengQi Wei LiQiang He College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Inner Mongolia University Hohhot China Geomechanica Inc Toronto Canada
Existing opportunistic network routing algorithms usually have two main problems: excessive calculation of key nodes leads to the uneven energy consumption of nodes, and limited remaining cache of nodes leads to the l... 详细信息
来源: 评论
Optimal WiFi APs Deployment for Localization and Coverage Based on Virtual Force
Optimal WiFi APs Deployment for Localization and Coverage Ba...
收藏 引用
IEEE Conference on wireless Communications and networking
作者: Xiangyu Li Baoqi Huang Yu Tian Zhendong Xu Xiaomeng Li Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot China College of Computer Science Inner Mongolia University Hohhot China School of Software Dalian University of Technology Dalian China
In the field of Wi-Fi-based fingerprint positioning, the relationship between localization accuracy and AP deployment location has always been a research hotspot. Obviously, Location of AP deployment affects network c... 详细信息
来源: 评论