ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب IoT as a Service: 6th EAI International Conference, IoTaaS 2020, Xi’an, China, November 19–20, 2020, Proceedings

دانلود کتاب IoT به عنوان یک سرویس: ششمین کنفرانس بین المللی EAI، IoTaaS 2020، شیان، چین، 19 تا 20 نوامبر 2020، مجموعه مقالات

IoT as a Service: 6th EAI International Conference, IoTaaS 2020, Xi’an, China, November 19–20, 2020, Proceedings

مشخصات کتاب

IoT as a Service: 6th EAI International Conference, IoTaaS 2020, Xi’an, China, November 19–20, 2020, Proceedings

ویرایش:  
نویسندگان: , , , ,   
سری:  
ISBN (شابک) : 9783030675134, 9783030675141 
ناشر:  
سال نشر: 2021 
تعداد صفحات: [804] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 95 Mb 

قیمت کتاب (تومان) : 59,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب IoT as a Service: 6th EAI International Conference, IoTaaS 2020, Xi’an, China, November 19–20, 2020, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب IoT به عنوان یک سرویس: ششمین کنفرانس بین المللی EAI، IoTaaS 2020، شیان، چین، 19 تا 20 نوامبر 2020، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب IoT به عنوان یک سرویس: ششمین کنفرانس بین المللی EAI، IoTaaS 2020، شیان، چین، 19 تا 20 نوامبر 2020، مجموعه مقالات

این کتاب مجموعه مقالات داوری پس از کنفرانس ششمین کنفرانس بین‌المللی اینترنت اشیا به عنوان یک سرویس، IoTaaS 2020 است که در نوامبر 2020 در شیان، چین برگزار شد. به دلیل همه‌گیری COVID-19 کنفرانس به صورت مجازی برگزار شد. 69 مقاله کامل اصلاح شده با دقت بررسی و از بین 136 مقاله ارسالی انتخاب شدند. این مقالات دو مسیر فنی و سه کارگاه را ارائه می‌دهند: دومین کارگاه هوش لبه و محاسبات برای ارتباطات و برنامه‌های Iot، کارگاه شبکه‌های ارتباط ماهواره‌ای برای اینترنت اشیا، کارگاه آموزشی ارتباطات ماهواره‌ای.


توضیحاتی درمورد کتاب به خارجی

This book constitutes the refereed post-conference proceedings of the 6st International Conference on IoT as a Service, IoTaaS 2020, which took place in Xi’an, China, in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 69 revised full papers were carefully reviewed and selected from 136 submissions. The papers present two technical tracks and three workshops: The Second Workshop on Edge Intelligence and Computing for Iot Communications and Applications, the Workshop on Satellite Communication Networks for Internet of Things, the Workshop on Satellite Communications



فهرست مطالب

Preface
Conference Organization
Contents
Algorithm and Information for Wireless Network
Approximation of DAC Codeword Distribution for Equiprobable Binary Sources Along Proper Decoding Paths
	1 Introduction
		1.1 Background
		1.2 Contribution
	2 Binary Distributed Arithmetic Coding
		2.1 Encoding
		2.2 Decoding
		2.3 Analysis
	3 Problem Formulation
	4 Polynomial Approximation at Low Rates
		4.1 1/2 q 0.8
		4.2 0.8 < q < 1
		4.3 Simulation Results
	5 Conclusion
	References
Research on Multi-UAV Swarm Control Based on Olfati-Saber Algorithm with Variable Speed Virtual Leader
	Abstract
	1 Introduction
	2 Multi-agent-Aware Network Model
	3 Optimized Olfati-Saber Algorithm
		3.1 Olfati-Saber Second Algorithm
		3.2 Olfati-Saber Model with Variable Speed Virtual Leader
	4 Simulation Results
		4.1 Olfati-Saber Second Algorithm
		4.2 Olfati-Saber Model Based on Variable Speed Virtual Leader
	5 Conclusion
	References
Resource Joint Allocation Scheme Based on Network Slicing Under C-RAN Architecture
	1 Introduction
	2 System Model and Problem Formulation
		2.1 The Communication Quality Standard of Network Slicing
		2.2 The Mapping of Computing Resources and Spectrum Resources
		2.3 The Problem Formulation
	3 Joint Resource Allocation Algorithm Based on Network Slice
		3.1 The Spectrum Resource Allocation Problem
		3.2 The Computational Resource Allocation Problem
		3.3 The Summary of the Proposed Algorithm
	4 Simulation Results
	5 Conclusion
	References
Optimal Thresholds for Differential Energy Detection of Ambient Backscatter Communication
	Abstract
	1 Introduction
	2 System Model
	3 Received Signal Detection
		3.1 Format of the Signal
		3.2 ML Detection
		3.3 Approximate ML Decision Region
	4 Optimal Thresholds for Detection
		4.1 Different Scenarios
		4.2 Optimal Thresholds Decision Algorithm
		4.3 BER Performance
		4.4 Improvement Analysis
	5 Simulations and Results
	6 Conclusion
	Appendix
	References
Resource Allocation for Multi-UAV Assisted Energy-Efficient IoT Communications with Co-channel Interference
	1 Introduction
	2 System Model
		2.1 Channel Model
		2.2 Interference Model
	3 Problem Formulation
	4 Proposed Solution
		4.1 Node Clustering
		4.2 Channel Assignment
		4.3 Transmit Power Control
	5 Performance Simulations
	6 Conclusion
	References
Correlation Based Secondary Users Selection for Cooperative Spectrum Sensing Network
	1 Introduction
	2 System Model
		2.1 Spectrum Sensing Hypothesis
		2.2 Energy Detector
	3 The Proposed Scheme of Improved DSCN
		3.1 Fusion Algorithm
		3.2 Correction of Shadow Fading
		3.3 Improved DSCN
	4 Simulation Results
	5 Conclusion
	References
The Design Methodology for MAC Strategies and Protocols Supporting Ultra-Low Delay Services in Next Generation IEEE 802.11 WLAN
	Abstract
	1 Introduction
	2 Related Work
		2.1 Latency Reduce Scheme
		2.2 Latency Elimination Schemes
	3 Modeling and Analysis of End-to-End Delay in Information Transmission and Processing Networks
		3.1 General System Model of an ITPN
		3.2 Modeling of End-to-End Delay
		3.3 Minimization of End-to-End Delay
	4 Basic Ideas of the Key Technologies Supporting Ultra-Low Delay Services
		4.1 Traffic Identification
		4.2 Simplification of Processing Tasks
		4.3 Instant Processing
		4.4 Resource Preemption
		4.5 Resource Reservation
		4.6 Traffic Prediction
		4.7 Flexible Reservation
		4.8 Traffic Flexibilization
		4.9 Grouping Based Scheduling for Traffic Flows
		4.10 Collaborative Reservation
		4.11 Adaptive Allocation of Processing Bandwidth
		4.12 Optimal Configuration of Processing Bandwidth
	5 Design of a MAC Protocol Framework Supporting Ultra-Low Delay Services
		5.1 Basic Access Strategies of the MAC Framework
		5.2 Basic Time-Frame Structure of the MAC Framework
	6 Conclusions
	Acknowledgement
	References
Efficient Cluster Head Selection for Multimode Sensors in Wireless Sensor Network
	Abstract
	1 Introduction
	2 Related Works
	3 Efficient Cluster Head Selection Approach
		3.1 Selection of the Optimal Number of Cluster Heads in the Network
		3.2 Selection of Cluster Heads in the Network
		3.3 The Comprehensive Evaluation Method
		3.4 Dynamic Cooperative Aware Storage Method
	4 Performance Evaluation
		4.1 Experiment Environment
		4.2 Simulation Results
	5 Conclusion
	References
Pricing Based Resource Allocation Algorithm in Wireless Aeronautics Network Virtualization
	1 Introduction
	2 Problem Modeling
		2.1 Network Model
		2.2 Pricing Model
		2.3 Problem Description
	3 Pricing Based Wireless Virtualization Resource Allocation Genetic Algorithm
	4 Simulation and Analysis of Algorithm Performance
	5 Conclusion
	References
Access Algorithm in Software-Defined Satellite Network
	Abstract
	1 Introduction
	2 Access Selection Algorithm in SDSN
		2.1 SDSN Architecture
		2.2 Access Evaluation Model
		2.3 AHP Based Access Selection Algorithm
	3 AHP-EW and PVW Based Improved Algorithm
		3.1 EW Method
		3.2 PVW Method
	4 Experimental Simulations
	5 Conclusion
	References
A Low-Loss Strategy for Network Function Virtualization Multicast Optimization
	Abstract
	1 Introduction
	2 Proposed Method
		2.1 VNF Layout Rules
		2.2 VNF Merge Rule
	3 Results and Discussions
		3.1 Comparison of Computing Resource Consumption
		3.2 Comparison of Bandwidth Consumption
	4 Conclusions
	References
A Deployment Method Based on Artificial Bee Colony Algorithm for UAV-Mounted Base Stations
	1 Introduction
	2 System Model and Problem Formulation
		2.1 System Model
		2.2 Maximum Service Radius
		2.3 Problem Formulation
	3 UAV Deployment Method
		3.1 User Clustering
		3.2 3D Deployment
	4 Simulation Results
	5 Conclusion
	References
Edge Intelligence and Computing for IoT Communications and Applications
Trajectory Optimization for UAV-Aided Data Collections
	1 Introduction
	2 System Model and Energy Minimization
		2.1 System Model
		2.2 UAV Energy Consumption Model and Energy Optimization
	3 Trajectory Design and Optimization
	4 Numerical Results
	5 Conclusion
	References
Design and Implementation of MCU-Based Reconfigurable Protocol Conversion Module for Heterogeneous Sensor Networks
	1 Introduction
	2 Design of the System Architecture
		2.1 MCU Hardware Platform Design
		2.2 Upper Computer Software Design
		2.3 Reconfigurable and Scalable Design
	3 System Implementation
		3.1 MCU Hardware Platform Implementation
		3.2 Upper Computer Software Development
	4 Experimental Results
	5 Conclusions
	References
FPGA-Based Neural Network Acceleration for Handwritten Digit Recognition
	1 Introduction
	2 Related Work
		2.1 LeNet-5
		2.2 Design Flow of the High-Level Synthesis
	3 Optimization Method
		3.1 Function and Loop Pipelining
		3.2 Arrays Partitioning
		3.3 Loop Unrolling
	4 Implementing the Lenet-5 Using HLS
		4.1 Data Quantization
		4.2 Optimization of Convolutional Layer
	5 Experiment
		5.1 MNIST
		5.2 Implementation Details
		5.3 Result
	6 Conclusion
	References
Edge Computing Based Two-Stage Emergency Braking in Autonomous Driving
	1 Introduction
	2 Two-Stage Emergency Braking
	3 Simulation Platform
		3.1 Control Principle
		3.2 Simulation Scheme
	4 Simulation Results
	5 Conclusion
	References
Cache Resource Allocation in D2D Multi-layer Social Network
	Abstract
	1 Introduction
	2 System Model
		2.1 Social Layer Model
		2.2 User Distribution Model
		2.3 Several Common Calculation Methods of Centrality
	3 Cache Storage Allocation Based on the Value of Effect Centrality
		3.1 Node Importance Metric: Effect Centrality
		3.2 Cache Storage Allocation Algorithm
	4 Simulations
	5 Conclusion
	References
Enhanced Frame Break Mechanism for ALOHA-Based RFID Anti-Collision Algorithm
	1 Introduction
	2 Related and Basic Work
		2.1 DFSA Algorithm
		2.2 SbS-DFSA Algorithm
	3 Enhanced-SbS-DFSA Algorithm
		3.1 Defects of SbS-DFSA
		3.2 Enhanced-SbS DFSA Algorithm
	4 Simulation Results
	5 Conclusions
	References
Improved Intelligent Semantics Based Chinese Sentence Similarity Computing for Natural Language Processing in IoT
	1 Introduction
	2 System Model
		2.1 Generation of Sentence Input Vectors
		2.2 Offline Training
		2.3 Sentences Similarity Calculation and Classification Model
	3 Performance Analysis
		3.1 Definitions
		3.2 Similarity Evaluation Performance Analysis
	4 Conclusions
	References
Statistical Feature Aided Intelligent Deep Learning Machine Translation in Internet of Things
	1 Introduction
	2 The Proposed Hybrid SMT-Aided NMT System
		2.1 Deep Neural Network for Hybrid MT System
		2.2 The Unigram Based Word Scoring System
		2.3 The Bigram Based Word Scoring System
		2.4 Classifier and Weighting Unit
		2.5 Offline Training and Online Deployment
	3 Numerical Results and Analysis
		3.1 Translation Performance Analysis
	4 Conclusions
	References
An Automated Method of Identifying Incorrectly Labelled Images Based on the Sequences of Loss Functions of Deep Learning Networks
	Abstract
	1 Introduction
	2 Methods
	3 Results
	4 Conclusions
	References
Low-Latency Method and Architecture for 5G Packet-Based Fronthaul Networks
	Abstract
	1 Introduction
	2 Fronthaul Architecture
	3 Fronthaul Design
		3.1 Receiving Method Design
		3.2 Fronthaul Architecture Design
	4 Hardware Implementation
	5 Evaluation
	6 Conclusion
	Acknowledgement
	References
Automated Cataracts Screening from Slit-Lamp Images Employing Deep Learning
	Abstract
	1 Introduction
	2 Methods
	3 Statistical Analysis
	4 Discussion
	Acknowledgements
	References
System and Hardware
A Flowchart Based Finite State Machine Design and Implementation Method for FPGA
	1 Introduction
	2 Design Principle and Modelling Methods of FSM
		2.1 Design Principle of FSM
		2.2 Modelling and Description Methods of FSM
	3 Flowchart Based Finite State Machine Designing Method
		3.1 Basic Ideas
		3.2 Detailed Description of F-FSM
	4 IP Core Design and Implementation of F-FSM Method
		4.1 IP Core Design Method of F-FSM
		4.2 System Implementation Method Based on FSM IP Core
	5 Performance Evaluation
	6 Conclusion
	References
A Distributed Reservation and Contention Combined TDMA Protocol for Wireless Avionics Intra-communication Networks
	1 Introduction
	2 Related Works
		2.1 Wired Cabin Avionics Communication Network
		2.2 Wireless Cabin Avionics Communication Network
	3 System Model and Motivation
		3.1 System Model
		3.2 Motivation
	4 Proposed Distributed Reservation and Contention Combined TDMA Protocol
		4.1 Basic Idea of DRCC-RDMA
		4.2 Detailed Description of DRCC-TDMA
	5 Performance Evaluation
	6 Conclusion
	References
The Automation Tool Development for Aircraft Cockpit Display Systems Verification in Part of Text Data
	Abstract
	1 Introduction
	2 Purpose of the Research
	3 Software and Algorithms Used for the Task Implementation
	4 Description of Developed Software and Its Use During the Testing
	5 Testing of the Developed Software
	6 Conclusion
	References
Design of `Floating, Medium and Sinking' Pressure Simulation System for Remote Reduction of Pulse Condition in TCM
	1 Introduction
	2 Pulse Condition Collection
		2.1 Automatic Pressurization Module
		2.2 Pulse Characteristic Value Extraction
	3 Pulse Condition of Reduction
		3.1 Hydraulic Bionic System
		3.2 Pressure Simulation Feedback Module
		3.3 `Floating, Medium and Sinking' Pressure Simulation Algorithm
		3.4 Pulse Condition Reduction Algorithm
	4 Experimental Results and Analysis
	5 Conclusion
	References
A Flexible and Scalable Localization System for Off-the-Shelf LoRa Devices
	Abstract
	1 Introduction
	2 System Design
	3 Geolocation Computation in LoRa-Geo-Server
		3.1 TDOA Extraction Component
		3.2 Geolocation Determination Server
	4 System Tests in Different Gateway Deployments
		4.1 Test in Gateway Deployment Case 1
		4.2 Test in Gateway Deployment Case 2
	5 Conclusions and Future Work
	References
Satellite Communications and Spatial Information Network
Research on Optical-Electrical Path Mapping Strategy of Space Hybrid Switches
	Abstract
	1 Introduce
	2 Space Hybrid Switch Technology
		2.1 Space Information Network
		2.2 Optical-Electrical Hybrid Switching
	3 Optical-Electrical Path Mapping Strategy
		3.1 Internal Path Mark Mapping
		3.2 The Table of Internal Path Mapping
		3.3 Create a Table Lookup Request
		3.4 Query Steps of the Path Mapping Table
	4 Conclusion
	References
Algorithm for Multipath Interference Restraint Based on Blind Source Separation in Passive GNSS-Based Bistatic Radar
	Abstract
	1 Introduction
	2 Passive GNSS-Based Bistatic Radar System Model
	3 Multipath Interference Restraint Algorithm Based on BSS
	4 Simulation Results
	5 Conclusions
	References
Multi-kernel and Multi-task Learning for Radar Target Recognition
	Abstract
	1 Introduction
	2 Multi-kernel and Multi-task Learning
		2.1 Multiple Kernel Learning (MKL) Based on Data-Dependent Kernel Function
		2.2 Multiple Task Learning (MTL) Based on Mixed Norm Penalty \ell_{p} - \ell_{q}
		2.3 Radar Target Recognition with Data-Dependent MKMTL Framework
	3 Experiments and Results Analysis
	4 Conclusion
	References
Information Topology Control Technology of Cluster Satellite Network
	Abstract
	1 Introduction
	2 Concept and Connotation of Information Topology Control in Cluster Satellite Network
	3 Information Topology Model of Cluster Satellite Network
	4 Analysis of Information Topology Control Technology
		4.1 Distributed Satellite Topology Control Technology
		4.2 Centralized Satellite Topology Control Technology
		4.3 Hybrid Algorithm Topology Control Technology
	5 Research Direction of Information Topology Control Technology
	6 Conclusions
	References
Application
Smart Home Security System Using Biometric Recognition
	Abstract
	1 Introduction
	2 Smart Home Security System Design
		2.1 System Architecture
		2.2 Hardware Design
		2.3 User Interface Design
		2.4 Multimode Verification Process
	3 Implementation Results
		3.1 Inference Benchmarks
		3.2 Implementation Results
	4 Concluding Remarks
	References
Internet of Things in the Game of Basketball
	Abstract
	1 Introduction
	2 Related Work
		2.1 IoT as a Shooting Aid
		2.2 Three Men Tracker
	3 Sensor Based Shot Tracker
		3.1 Wilson X
	4 Camera Driven Application
		4.1 HomeCourt
	5 Virtual Reality
		5.1 Magic Leap
		5.2 Tactic Training
		5.3 Virtual Shooting
	6 Comparison
		6.1 Accuracy
		6.2 Comfort
		6.3 User Friendliness
		6.4 Cross Platform
		6.5 Price
		6.6 Lifetime
		6.7 Memory
		6.8 Room to Improve
	7 Conclusion and Future Work
	References
Next Generation Network
Object Recognition Through UAV Observations Based on Yolo and Generative Adversarial Network
	Abstract
	1 Introduction
	2 Problem Formulation and Learning Algorithm
		2.1 Problem Description
		2.2 Object Recognition Based on YOLO
		2.3 Image Resolution Enhancement Based on SRGAN
	3 Experiment and Analysis
		3.1 The Object Recognition Experiment by YOLO
		3.2 The Resolution Enhancement Experiment by SRGAN
	4 Conclusion
	Acknowledgments
	References
Soft Channel Reservation Towards Latency Guarantee for the Next Generation WLAN: IEEE 802.11be
	1 Introduction
	2 Motivation
		2.1 Related Work Brief Introduction to EDCA
		2.2 Motivation
	3 Proposed Flexible Channel Reservation Protocol
		3.1 Protocol Design
		3.2 Resolved Hidden Nodes
		3.3 Frame Design
	4 Simulation and Analysis
	5 Conclusions and Future Work
	References
Optimal Four-Dimensional Route Searching Methodology for Civil Aircrafts
	Abstract
	1 Introduction
	2 Decision Support System Functions
	3 Methodology of Optimal Four-Dimensional Route Searching
	4 Experimental Results
	5 Conclusion
	References
Multi-list Design and FPGA Implementation Method of OLSR protocol
	1 Introduction
	2 Implementation Model of Multi-link List Based on FPGA in OLSR protocol
	3 Solution for Conflicts in the Use of Memory Management
		3.1 Sort Out Timing Relationship
		3.2 Add Timing Relationship
	4 Simulation
		4.1 Functional Simulation and Analysis
		4.2 Performance Simulation and Analysis
	5 Summary
	References
Improvement of Contact Graph Routing Algorithm in LEO Satellite DTN Network
	Abstract
	1 Introduction
	2 CGR Algorithm
	3 Based on Throughput Constrained Minimum Delay Backup Path of CGR Algorithm
		3.1 The Connection Check Process
		3.2 The Message Forwarding Process
	4 Simulation Test
	5 Conclusion
	Acknowledgment
	References
Double-Threshold-Based Massive Random Access Protocol for Heterogeneous MTC Networks
	1 Introduction
	2 System Model
		2.1 Time-Frequency Resource Configuration
		2.2 Packet Arrival Process
	3 Protocol Description and Performance Analysis
		3.1 DT-MRA Protocol Description
		3.2 Transmission Performance Analysis
	4 Optimal Access Control Strategy Design
		4.1 Problem Formulation
		4.2 Optimal Access Control Strategy
	5 Simulation Results
	6 Conclusions
	References
IP Addressing and Address Management of Space-Based Network Based on Geographical Division
	Abstract
	1 Introduction
	2 IP Addressing and Allocation
		2.1 Network Architecture and Addressing Concept
		2.2 Address Allocation
		2.3 Routing Strategy
	3 IP Address Management and Handover
		3.1 Address Management of Inter-Satellite Link
		3.2 Address Handover of the Satellite-Ground Link
	4 Network Simulation and Visualization
		4.1 IP Addressing and Address Allocation Simulation
		4.2 Data Transmission and Address Management Simulation
		4.3 Visual Demonstrate
	5 Conclusion
	References
Artificial Intelligence
A Convolutional Neural Network Approach for Stratigraphic Interface Detection
	1 Introduction
	2 Related Work
	3 Proposed Method
		3.1 Data Formulation
		3.2 Stratigraphy Classification
		3.3 Stratigraphic Interface Detection
	4 Experiment
		4.1 Dataset
		4.2 Classification Accuracy
		4.3 Stratigraphic Interface Detection
		4.4 Time Consumption
		4.5 Ablation Study
	5 Conclusion
	References
A Deep Neural Network Based Feature Learning Method for Well Log Interpretation
	1 Introduction
	2 Related Work
	3 The Proposed Method
		3.1 Original Feature Selection
		3.2 Feature Representation Learning
		3.3 Stratigraphic Interface Detection
	4 Experiments
		4.1 Autoencoder Performance
		4.2 Classification Evaluation
		4.3 Clustering Evaluation
	5 Conclusion
	References
Trust Prediction Model Based on Deep Learning in Social Internet of Things
	Abstract
	1 Introduction
	2 Related Work
	3 Trust Model
		3.1 The Improved Trust Model of Node-Level
		3.2 Trust Model of SIoT Server-Level
	4 Simulation Analysis
	5 Conclusion
	Acknowledgements
	References
An Alarm System Based on BP Neural Network Algorithm for the Detection of Falls to Elderly Person
	1 Introduction
	2 System Structure Design
		2.1 MPU6050
		2.2 Controller, STM32F103
		2.3 Short Message Module
	3 Algorithm of Fall Action Detection
		3.1 Data Preprocessing and Network Feature Selection
		3.2 BP Neural Network Algorithm Implementation
	4 Experimental Analysis
	5 Conclusion
	References
Satellite Communication Networks for Internet of Things
The Intelligent Routing Control Strategy Based on Deep Learning
	1 Introduction
	2 Related Work
		2.1 Overview of SDN Architecture
		2.2 Development Trend of Network Architecture
		2.3 Routing Algorithms
		2.4 Reinforcement Learning
	3 Design and Implementation
		3.1 Principle of Routing Planning Algorithm Based on Q-Learning
		3.2 The Simulation Design of the Experiment
	4 Results and Discussion
	5 Conclusion
	References
Distributed Opportunistic Channel Access with Optimal Single Relay Under Delay Constraints
	1 Introduction
	2 System Model
	3 Distributed Opportunistic Scheduling Under Constraints
	4 Optimal Stopping Strategy
	5 Performance Evaluation
	6 Conclusion
	References
Distributed Opportunistic Channel Access Under Single-Bit CSI Feedback
	1 Introduction
	2 System Model
	3 Optimal Stopping Strategy with Limited Feedback
		3.1 Problem Formulation
		3.2 The Case Under Homogeneous Channels
		3.3 The Case Under Heterogeneous Channels
	4 Performance Evaluation
	5 Conclusion
	References
Spectrum Allocation Algorithm for Energy-Constrained UAV in Interweave Cognitive IoT Network Based on Satellite Coverage
	Abstract
	1 Introduction
	2 Related Works
	3 System Model
	4 Algorithm Design
		4.1 Source of Algorithm Inspiration
		4.2 Algorithm Steps
	5 Simulation Results
	6 Conclusion
	Acknowledgment
	References
Edge Network Extension Based on Multi-domains Fusion and LEO Satellite
	Abstract
	1 Introduction
	2 System Model
		2.1 Modeling the Three Domains
		2.2 Extended Edge Network with LEO Satellite
		2.3 Domains Fusion
		2.4 Reduce the Relevance
	3 Numerical Results
	4 Conclusion
	Acknowledgement
	References
Completion of Marine Wireless Sensor Monitoring Data Based on Tensor Mode-n Rank and Tucker Operator
	Abstract
	1 Introduction
	2 Linear Regression Based on Principal Component Analysis
		2.1 Principal Component Analysis
		2.2 Linear Regression Prediction
	3 Tensor Decomposition Related Knowledge
		3.1 Tensor Representation
		3.2 Tensor Rank and Tucker Decomposition
		3.3 Tensor Completion
	4 Experimental Verification
		4.1 Convergence Experiment
		4.2 Comparative Experiment of Data Completion Effect
	5 Conclusion
	References
Belief Propagation-Based Joint Iterative Detection and Decoding Algorithm for Asynchronous IDMA Satellite Systems
	1 Introduction
	2 System Description
	3 BP-based Joint Iterative Detection and Decoding Algorithm
		3.1 The Factor Graph Representation of the IDMA System
		3.2 Message Passing of Joint Iterative Detection and Decoding Algorithm on the Factor Graph
	4 Complexity Analysis
		4.1 Complexity Comparison of LDPC Decoder
		4.2 Complexity Comparison of Iterative MUD
	5 Simulation Results
	6 Conclusion
	References
Communications
Modulation Pattern Recognition Based on Wavelet Approximate Coefficient Entropy
	Abstract
	1 Introduction
	2 System Model
	3 Wavelet Theory
	4 Modulation Recognition Technology Based on Wavelet Approximate Coefficient Entropy
	5 Simulation Results and Analysis
	6 Conclusions
	Acknowledgments
	References
A New Message Passing Algorithm Based on Sphere Decoding Improvement
	Abstract
	1 Introduction
	2 MPA and Improvement Based on Spherical Decoding
		2.1 Basic Model of SCMA System
		2.2 Sphere Decoding and the PMSD-MPA
	3 Results and Discussion
	4 Conclusions
	References
A Novel Codebook Design Scheme for Sparse Code Multiple Access
	Abstract
	1 Introduction
	2 SCMA Sender Principle
		2.1 SCMA Encoding Process
		2.2 Sparse Matrix
	3 SCMA Codebook Design Scheme
		3.1 Design Mapping Matrix
		3.2 Design Mother Constellation
		3.3 Design Constellation Operator
	4 Performance Simulation
	References
Multi-view Polarization HRRP Target Recognition Based on Convolutional Neural Network
	Abstract
	1 Introduction
	2 CNN-Based MVPHRRP
		2.1 Multi-view HRRP
		2.2 Feature Tensor Construction
		2.3 CNN-Based MVPHRRP Model
	3 Simulation Results
	4 Conclusion
	Acknowledgments
	References
Millimeter-Wave Communications with Beamforming for UAV-Assisted Railway Monitoring System
	1 Introduction
	2 System Model
	3 Hybrid Beamforming
		3.1 ZF Beamforming Design
		3.2 MMSE Beamforming Design
	4 Simulations
	5 Conclusions
	References
Improved Pulse Shaping Algorithm for Reducing PAPR in OFDM System
	Abstract
	1 Introduction
		1.1 OFDM System Composition
		1.2 The Basic Principle of OFDM System
	2 PAPR Suppression Algorithm Based on Improved Pulse Forming Technology
		2.1 Definition of PAPR
		2.2 Principle of PAPR Suppression in Pulse Forming
		2.3 Improvement of Nyquist Pulse Forming Technology to Suppress PAPR
	3 Simulation Results and Analysis
	4 Conclusion
	References
Image and Information
Information Optimization for Image Screening and Transmission in Aerial Detection
	1 Introduction
	2 Image Screening and Transmission System
	3 Autonomous Screening and Transmission Algorithm
		3.1 Screening and Transmission Model
		3.2 Model Optimization
	4 Feature Representation of Detection Images
	5 Experiment and Discussion
	6 Conclusion
	References
Method of Quality Assessment for BOC Navigation Signal Based on Multi-correlation Receiver
	Abstract
	1 Introduction
	2 Signal Model and Synchronization Method
		2.1 BOC Signal Model
		2.2 BOC Signal Synchronization Method
	3 Multiple Correlators Detection Method
		3.1 Pseudo-range Difference Detection Method
		3.2 Correlation Value Difference Detection Method
		3.3 Symmetry Ratio Detection Method
	4 Performance Simulation and Analysis
		4.1 Signal Synchronization Performance
		4.2 Performance of Pseudo-range Difference Detection
		4.3 Performance of Multi-correlation Value Difference Detection
		4.4 Performance of Symmetry Ratio Detection
	5 Conclusion
	References
Satellite Navigation Software Receiver Design
	Abstract
	1 Introduction
	2 BDS B1I Signal
		2.1 Introduction to the BDS
		2.2 Signal Structure
			2.2.1 Carrier
			2.2.2 The Structure of Ranging Code
			2.2.3 Data Code
	3 Research on Signal Tracking Algorithm
		3.1 The Fundamentals of Signal Tracking
		3.2 Carrier Tracking Loop
			3.2.1 Phase Lock Loop (PLL)
			3.2.2 Frequency Lock Loop (FLL)
			3.2.3 Comparison and Combination of FLL and PLL
		3.3 Code Tracking Loop
		3.4 Results of Tracking and Navigation Messages Demodulation
	4 Conclusion
	References
A Novel Pansharpening Method with Multi-scale Mutual-structure Perception
	Abstract
	1 Introduction
	2 Methodology
		2.1 Multi-scale Structure Filtering
		2.2 Mutual-Structure Perception
		2.3 Weighted Details Injection
	3 Experimental Results
		3.1 Dataset and Evaluation Indexes
		3.2 Subjective Analysis
		3.3 Objective Analysis
	4 Conclusion
	Acknowledgements
	References
A New Fusion Method for Remote Sensing Images
	Abstract
	1 Introduction
	2 Structure-Preserving Filter
	3 The Proposed Method
		3.1 Modified Structure-Preserving Filtering
		3.2 Multi-scale Structure Perception
		3.3 The Proposed Fusion Method
	4 Experimental Results
		4.1 Experiment Setup
		4.2 Selection of the Parameters k and r
		4.3 Comparison Among Different Methods
			4.3.1 Experiment 1—IKONOS Dataset
			4.3.2 Experiment 2—GeoEye-1 Dataset
			4.3.3 Experiment 3—WorldView-3 Dataset
	5 Conclusion
	Acknowledgements
	References
Author Index




نظرات کاربران