Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cognitive radio networking and communications: An overview
Cognitive radio (CR) is the enabling technology for supporting dynamic spectrum access:
the policy that addresses the spectrum scarcity problem that is encountered in many …
the policy that addresses the spectrum scarcity problem that is encountered in many …
Physical layer security in wireless networks: A tutorial
Wireless networking plays an extremely important role in civil and military applications.
However, security of information transfer via wireless networks remains a challenging issue …
However, security of information transfer via wireless networks remains a challenging issue …
Flying ad-hoc networks (FANETs): A survey
One of the most important design problems for multi-UAV (Unmanned Air Vehicle) systems
is the communication which is crucial for cooperation and collaboration between the UAVs. If …
is the communication which is crucial for cooperation and collaboration between the UAVs. If …
A survey on cluster based routing protocols in wireless sensor networks
SP Singh, SC Sharma - Procedia computer science, 2015 - Elsevier
Latest advancements in micro-electro-mechanical-system (MEMS) and wireless
communication technology, opens the way for the growth in applications of wireless sensor …
communication technology, opens the way for the growth in applications of wireless sensor …
Vehicle ad hoc networks: Applications and related technical issues
This article presents a comprehensive survey of the state-of-the-art for vehicle ad hoc
networks. We start by reviewing the possible applications that can be used in VANETs …
networks. We start by reviewing the possible applications that can be used in VANETs …
A PUF-based secure communication protocol for IoT
Security features are of paramount importance for the Internet of Things (IoT), and
implementations are challenging given the resource-constrained IoT setup. We have …
implementations are challenging given the resource-constrained IoT setup. We have …
[KNIHA][B] Сети связи пост-NGN
БС Гольдштейн - 2013 - books.google.com
Книга описывает инфокоммуникационные сети пост-NGN второго десятилетия
текущего века. Предназначается студентам, бакалаврам и магистрам, а также …
текущего века. Предназначается студентам, бакалаврам и магистрам, а также …
A survey of attacks and countermeasures in mobile ad hoc networks
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
[PDF][PDF] Security challenges, issues and their solutions for VANET
ABSTRACT Vehicular Ad hoc Networks (VANETs) are the promising approach to provide
safety and other applications to the drivers as well as passengers. It becomes a key …
safety and other applications to the drivers as well as passengers. It becomes a key …
On swarm intelligence inspired self-organized networking: its bionic mechanisms, designing principles and optimization approaches
Z Zhang, K Long, J Wang… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
Inspired by swarm intelligence observed in social species, the artificial self-organized
networking (SON) systems are expected to exhibit some intelligent features (eg, flexibility …
networking (SON) systems are expected to exhibit some intelligent features (eg, flexibility …