期刊文献+
共找到1,296篇文章
< 1 2 65 >
每页显示 20 50 100
Kernel-based virtual machine事件跟踪机制的设计与实现 被引量:1
1
作者 刘锋 雷航 李晓瑜 《计算机应用》 CSCD 北大核心 2008年第S2期285-287,共3页
分析了基于处理器硬件虚拟化技术实现的KVM子系统的架构。针对KVM跟踪独立事件信息的局限性,提出一种新的KVM事件跟踪机制(kvmtrace)来达到性能调节的目的,并使用relayfs接口进行了设计与实现。同时探讨了Linux kernel Markers实现机制... 分析了基于处理器硬件虚拟化技术实现的KVM子系统的架构。针对KVM跟踪独立事件信息的局限性,提出一种新的KVM事件跟踪机制(kvmtrace)来达到性能调节的目的,并使用relayfs接口进行了设计与实现。同时探讨了Linux kernel Markers实现机制及其在kvmtrace的实际应用。 展开更多
关键词 处理器硬件虚拟化 KVM kvmtrace
下载PDF
Virtual population pharmacokinetic using physiologically based pharmacokinetic model for evaluating bioequivalence of oral lacidipine formulations in dogs 被引量:5
2
作者 Bin Yang Chunnuan Wu +4 位作者 Bin Ji Mingrui Wu Zhonggui He Lei Shang Jin Sun 《Asian Journal of Pharmaceutical Sciences》 SCIE CAS 2017年第1期98-104,共7页
The aim of the present study was to investigate virtual population pharmacokinetic using physiologically based pharmacokinetic(PBPK) model for evaluating bioequivalence of oral lacidipine formulations in dogs. The dis... The aim of the present study was to investigate virtual population pharmacokinetic using physiologically based pharmacokinetic(PBPK) model for evaluating bioequivalence of oral lacidipine formulations in dogs. The dissolution behaviors of three lacidipine formulations including one commercial product and two self-made amorphous solid dispersions(ASDs)capsules were determined in 0.07% Tween 80 media. A randomized 3-period crossover design in 6 healthy beagle dogs after oral administration of the three formulations at a single dose of 4 mg was conducted. The PBPK modeling was utilized for the virtual bioequivalence study.In vitro dissolution experiment showed that the dissolution behaviors of lacidipine amorphous solid dispersions(ASDs) capsules, which was respectively prepared by HPMC-E5 or Soluplus, as polymer displayed similar curves compared with the reference formulation in 0.07% Tween 80 media. In vivo pharmacokinetics experiments showed that three formulations had comparable maximum plasma drug concentration(Cmax), and the time(Tmax) to reach Cmax of lacidipine tablet, which was prepared by Soluplus, as polymer was slower than other two formulations in consistency with the in vitro dissolution rate. The 90% confidence interval(CI) for the Cmax, AUC0–24 h and AUC0–∞ of the ratio of the test drug to the reference drug exceeded the acceptable bioequivalence(BE) limits(0.80–1.25). However, the 90% CI of the AUC0–24 h, AUC0–∞ and Cmax of the ratio of test to reference drug were within the BE limit,calculated using PBPK modeling when the virtual subjects reached 24 dogs. The results all demonstrated that virtual bioequivalence study can overcome the inequivalence caused by inter-subject variability of the 6 beagle dogs involved in in vivo experiments. 展开更多
关键词 Physiologically based PHARMACOKINETIC model virtual POPULATION PHARMACOKINETIC BIOEQUIVALENCE LACIDIPINE Amorphous solid DISPERSIONS
下载PDF
V–L decomposition of a novel full-waveform lidar system based on virtual instrument technique 被引量:2
3
作者 徐帆 王元庆 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第10期262-273,共12页
A novel three-dimensional(3D) imaging lidar system which is based on a virtual instrument technique is introduced in this paper. The main characteristics of the system include: the capability of modeling a 3D objec... A novel three-dimensional(3D) imaging lidar system which is based on a virtual instrument technique is introduced in this paper. The main characteristics of the system include: the capability of modeling a 3D object in accordance with the actual one by connecting to a geographic information system(GIS), and building the scene for the lidar experiment including the simulation environment. The simulation environment consists of four parts: laser pulse, atmospheric transport,target interaction, and receiving unit. Besides, the system provides an interface for the on-site experiment. In order to process the full waveform, we adopt the combination of pulse accumulation and wavelet denoising for signal enhancement.We also propose an optimized algorithm for data decomposition: the V-L decomposition method, which combines Vondrak smoothing and laser-template based fitting. Compared with conventional Gaussian decomposition, the new method brings an improvement in both precision and resolution of data decomposition. After applying V-L decomposition to the lidar system, we present the 3D reconstructed model to demonstrate the decomposition method. 展开更多
关键词 lidar system virtual instrument Vondrak smoothing laser-template based fitting
下载PDF
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers 被引量:2
4
作者 Bassma S.Alsulami Chandra Bajracharya Danda B.Rawat 《Digital Communications and Networks》 SCIE CSCD 2021年第3期327-334,共8页
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertain... Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertainty causing issues to licensed users,business models for licensed service providers.Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum,offer improved coverage and capacity of networks,enhance network security and reduce energy consumption.With wireless virtualization,wireless networks'physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations(MVNOs).Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers(WIPs),virtualized wireless networks are vulnerable to a multitude of attacks,including jamming attacks and eavesdropping attacks.This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users,and eavesdroppers aim to reduce secrecy rates.Specifically,we consider a virtual wireless network where MVNO users'job is to improve their Signal to Interference plus Noise Ratio(SINR)while the jammers target to collectively enhance their Jammer Received Signal Strength(JRSS),and an eavesdropper's goal is to reduce the overall secrecy rate.Numerical results have demonstrated that the proposed game strategies are effective(in terms of data rate,secrecy rate and latency)against such attackers compared to the traditional approaches. 展开更多
关键词 Game theory based security virtual wireless networks Jamming and eavesdropping
下载PDF
A Network-Based VPN Architecture Using Virtual Routing 被引量:4
5
作者 ZHANG Bao-liang 1,2,HU Han-ping 1,2,WU Xiao-gang 1,2, KONG Tao 31.State Education Ministry Key Laboratory of Image Information and Intelligent Control, Wuhan 430074, Hubei, China 2.Institute of Pattem Recognition and Artificial Intelligonce, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China 3.709th Research Institute of China Shipbuilding Engineering Society, Wuhan 430074, Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期161-164,共4页
A network-based Virtual Private Network (VPN) architecture by using fundamental routing mechanism is proposed. This network is a virtual overlay network based on the relay of IP-in-IP tunneling of virtual routing modu... A network-based Virtual Private Network (VPN) architecture by using fundamental routing mechanism is proposed. This network is a virtual overlay network based on the relay of IP-in-IP tunneling of virtual routing modules. The packet format employs the encapsulation of IPSec ESP(Encapsulating Security Payload), an impact path code and an extended DS(Differentiated Services) code to support multi-path routing and QoS. Comparing with other models of VPN, this network system can be deployed in the current network with little investment, and it is easy to implement. The simulation result shows its performance is better than the traditional VPN system of black box mode. 展开更多
关键词 virtual routing network-based VPN proactive defense
下载PDF
Virtual local target method for avoiding local minimum in potential field based robot navigation 被引量:9
6
作者 邹细勇 诸静 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期264-269,共6页
A novel robot navigation algorithm with global path generation capability is presented. Local minimum is a most intractable but is an encountered frequently problem in potential field based robot navigation.Through ap... A novel robot navigation algorithm with global path generation capability is presented. Local minimum is a most intractable but is an encountered frequently problem in potential field based robot navigation.Through appointing appropriately some virtual local targets on the journey, it can be solved effectively. The key concept employed in this algorithm are the rules that govern when and how to appoint these virtual local targets. When the robot finds itself in danger of local minimum, a virtual local target is appointed to replace the global goal temporarily according to the rules. After the virtual target is reached, the robot continues on its journey by heading towards the global goal. The algorithm prevents the robot from running into local minima anymore. Simulation results showed that it is very effective in complex obstacle environments. 展开更多
关键词 局部最小化 虚拟局部目标 整体目标 机器人导航 潜在领域方法 路径规划
下载PDF
Mechanism of Kinect-based virtual reality training for motor functional recovery of upper limbs after subacute stroke 被引量:15
7
作者 Xiao Bao Yurong Mao +6 位作者 Qiang Lin Yunhai Qiu Shaozhen Chen Le Li Ryan S.Cates Shufeng Zhou Dongfeng Huang 《Neural Regeneration Research》 SCIE CAS CSCD 2013年第31期2904-2913,共10页
The Kinect-based virtual reality system for the Xbox 360 enables users to control and interact with the game console without the need to touch a game controller, and provides rehabilitation training for stroke patient... The Kinect-based virtual reality system for the Xbox 360 enables users to control and interact with the game console without the need to touch a game controller, and provides rehabilitation training for stroke patients with lower limb dysfunctions. However, the underlying mechanism remains un- clear. In this study, 18 healthy subjects and five patients after subacute stroke were included. The five patients were scanned using functional MRI prior to training, 3 weeks after training and at a 12-week follow-up, and then compared with healthy subjects. The FugI-Meyer Assessment and Wolf Motor Function Test scores of the hemiplegic upper limbs of stroke patients were significantly increased 3 weeks after training and at the 12-week follow-up. Functional MRI results showed that contralateral primary sensorimotor cortex was activated after Kinect-based virtual reality training in the stroke patients compared with the healthy subjects. Contralateral primary sensorimotor cortex, the bilateral supplementary motor area and the ipsilateral cerebellum were also activated during hand-clenching in all 18 healthy subjects. Our findings indicate that Kinect-based virtual reality training could promote the recovery of upper limb motor function in subacute stroke patients, and brain reorganization by Kinect-based virtual reality training may be linked to the contralateral sen- sorimotor cortex. 展开更多
关键词 neural regeneration neurological rehabilitation rehabilitation training neural plasticity virtual reality functional MRI stroke Kinect-based virtual reality training upper limb cerebral cortex brain activation region of interest grants-supported paper NEUROREGENERATION
下载PDF
A virtual machine-based invasion detection system for the virtual computing environment
8
作者 曾宇 Wang Jie +2 位作者 Sun Ninghui Li Jun Nie Hua 《High Technology Letters》 EI CAS 2006年第4期379-384,共6页
关键词 虚拟计算机 侵入检测系统 系统安全监测 虚拟计算环境
下载PDF
Exploration on Business English Training Curriculum Reform of Vocational Colleges --Practical Teaching Based On Operating Process of "Virtual Company"
9
作者 Siyi Chen 《Journal of Zhouyi Research》 2014年第2期78-80,共3页
关键词 课程改革 虚拟公司 英语培训 高职院校 工作流程 实践教学 商务 基础
下载PDF
Harmonic State Space Based Impedance Modeling and Virtual Impedance Based Stability Enhancement Control for LCC-HVDC Systems
10
作者 Yifeng Liu Xiaoping Zhou +5 位作者 Quan Chen Hanhang Yin Lerong Hong Hao Tian Ying Chen Siyuan Li 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第1期287-298,共12页
Line commutated converter based high-voltage direct-current(LCC-HVDC)transmissions are prone to harmonic oscillation under weak grids.Impedance modeling is an effective method for assessing interaction stability.First... Line commutated converter based high-voltage direct-current(LCC-HVDC)transmissions are prone to harmonic oscillation under weak grids.Impedance modeling is an effective method for assessing interaction stability.Firstly,this paper proposes an improved calculation method for the DC voltage and AC currents of commutation stations to address the complex linearization of the commutation process and constructs an overall harmonic state-space(HSS)model of an LCC-HVDC.Based on the HSS model,the closed-loop AC impedances on the LCC-HVDC sending and receiving ends are then derived and verified.The impedance characteristics of the LCC-HVDC are then analyzed to provide a physical explanation for the harmonic oscillation of the system.The effects of the grid strength and control parameters on system stability are also analyzed.To improve the impedance characteristics and operating stability of the LCC-HVDC system,a virtual impedance based stability enhancement control is proposed,and a parameter design method is considered to ensure satisfactory phase margins at both the sending and receiving ends.Finally,simulation results are presented to verify the validity of the impedance model and virtual impedance based stability enhancement control. 展开更多
关键词 Line commutated converter based high-voltage direct-current(LCC-HVDC)transmission harmonic state space stability analysis harmonic oscillation virtual impedance
原文传递
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
11
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network virtualization Device-To-Device COMMUNICATION base STATION Direct COMMUNICATION INTERFERENCE Multi-Access EDGE COMPUTING Mobile EDGE COMPUTING
下载PDF
ApplianceBricks: A Scalable Network Appliance Architecture for Network Functions Virtualization 被引量:2
12
作者 MA Shicong WANG Baosheng +1 位作者 ZHANG Xiaozhe GAO Xianming 《China Communications》 SCIE CSCD 2016年第S1期32-42,共11页
Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtuali... Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtualized software instances. But, existing novel network appliances designed for NFV infrastructure are always architected on a general-purpose x86 server, which makes the performance of network functions limited by the hosted single server. To address this challenge, we propose ApplianceB ricks, a novel NFV-enable network appliance architecture that is used to explore the way of consolidating multiple physical network functions into a clustered network appliance, which is able to improve the processing capability of NFV-enabled network appliances. 展开更多
关键词 NFV network APPLIANCE virtualization software ROUTERS cluster-based appliances CONSOLIDATION SCALABILITY
下载PDF
DPGL:The Direct3D9-based Parallel Graphics Library for Multi-display Environment 被引量:1
13
作者 Zhen Liu Jiao-Ying Shi 《International Journal of Automation and computing》 EI 2007年第1期30-37,共8页
The emergence of high performance 3D graphics cards has opened the way to PC clusters for high performance multi- display environment. In order to exploit the rendering ability of PC clusters, we should design appropr... The emergence of high performance 3D graphics cards has opened the way to PC clusters for high performance multi- display environment. In order to exploit the rendering ability of PC clusters, we should design appropriate parallel rendering algorithms and parallel graphics library interfaces. Due to the rapid development of Direct3D, we bring forward DPGL, the Direct3D9-based parallel graphics library in D3DPR parallel rendering system, which implements Direct3D9 interfaces to support existing Direct3D9 application parallelization with no modification. Based on the parallelism analysis of Direct3D9 rendering pipeline, we briefly introduce D3DPR parallel rendering system. DPGL is the fundamental component of D3DPR. After presenting DPGL three layers architecture, we discuss the rendering resource interception and management. Finally, we describe the design and implementation of DPGL in detail, including rendering command interception layer, rendering command interpretation layer and rendering resource parallelization layer. 展开更多
关键词 Direct3D9-based parallel graphics library parallel rendering virtual environment PC clusters.
下载PDF
Parallel programming characteristics of a DSP-based parallel system 被引量:1
14
作者 GAO Shu GUO Qing-ping 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第10期1669-1675,共7页
This paper firstly introduces the structure and working principle of DSP-based parallel system, parallel accelerating board and SHARC DSP chip. Then it pays attention to investigating the system’s programming charact... This paper firstly introduces the structure and working principle of DSP-based parallel system, parallel accelerating board and SHARC DSP chip. Then it pays attention to investigating the system’s programming characteristics, especially the mode of communication, discussing how to design parallel algorithms and presenting a domain-decomposition-based complete multi-grid parallel algorithm with virtual boundary forecast (VBF) to solve a lot of large-scale and complicated heat problems. In the end, Mandelbrot Set and a non-linear heat transfer equation of ceramic/metal composite material are taken as examples to illustrate the implementation of the proposed algorithm. The results showed that the solutions are highly efficient and have linear speedup. 展开更多
关键词 并行算法 多格子 域分解 VBF DSP 并行系统
下载PDF
Energy-Efficient Content-Based Routing in Internet of Things 被引量:1
15
作者 Samia Allaoua Chelloug 《Journal of Computer and Communications》 2015年第12期9-20,共12页
The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart... The?convergence of the Internet, sensor networks, and Radio Frequency Identification (RFID) systems has ushered to the concept of Internet of Things (IoT) which is capable of connecting daily things, making them smart through sensing, reasoning, and cooperating with other things. Further, RFID technology enables tracking of an object and assigning it a unique ID. IoT has the potential for a wide range of applications relating to healthcare, environment, transportation, cities… Moreover, the middleware is a basic component in the IoT architecture. It handles heterogeneity issues among IoT devices and provides a common framework for communication. More recently, the interest has focusing on developing publish/subscribe middleware systems for the IoT to allow asynchronous communication between the IoT devices. The scope of our paper is to study routing protocols for publish/subscribe schemes that include content and context-based routing. We propose an Energy-Efficient Content-Based Routing (EECBR) protocol for the IoT that minimizes the energy consumption. The proposed algorithm makes use of a virtual topology that is constructed in a centralized manner and then routes the events from the publishers to the intended interested subscribers in a distributed manner. EECBR has been simulated using Omnet++. The simulation results show that EECBR has a significant performance in term of the energy variance compared to the other schemes. 展开更多
关键词 Internet of THINGS PUBLISH/SUBSCRIBE ROUTING CONTENT-based ROUTING Energy virtual Topology OMNET++
下载PDF
Network Based Real Time Condition Monitoring of Rotating Machinery
16
作者 ZHAO Chong chong, LIAO Ming fu, YU Xiao Institute of Monitoring and Control for Rotating Machinery and Windturbines (NPU & TU Berlin), Northwestern Polytechnical University (NPU), Xi’an 710072, P.R.China 《International Journal of Plant Engineering and Management》 2003年第1期22-27,共6页
This paper presents the development of a network based real time condition monitoring system of rotating machinery. The system is built up in a double net structure consisting of local net (including client and server... This paper presents the development of a network based real time condition monitoring system of rotating machinery. The system is built up in a double net structure consisting of local net (including client and server) and intranet. The client serves as a field data collector and processor that samples the vibration signals and process parameters of a machine monitored in the net and processes the sampled data. The data collected by the client are transmitted to the server that processes the data further and provides the results of the diagnosis of each machine to any distant terminals through intranet or internet. Such a structure of the monitoring system is advantageous in safety, reliability and reasonably shares the existing net resources. In order to ensure real time transmission of the data, two procedures of data transmission, virtual channel and data pool, are developed and applied in the monitoring system. The experimental results show that the monitoring system works well and is suitable to monitor a large group of rotating machines. 展开更多
关键词 Network based monitoring system rotating machinery virtual channel data pool
下载PDF
Switching Delay Aware Computing Resource Allocation in Virtualized Base Station
17
作者 Mingjin Gao He(Henry) Chen +2 位作者 Yonghui Li Yiqing Zhou Jinglin Shi 《China Communications》 SCIE CSCD 2016年第11期226-233,共8页
In centralized cellular network architecture,the concept of virtualized Base Station(VBS) becomes attracting since it enables all base stations(BSs) to share computing resources in a dynamic manner. This can significa... In centralized cellular network architecture,the concept of virtualized Base Station(VBS) becomes attracting since it enables all base stations(BSs) to share computing resources in a dynamic manner. This can significantly improve the utilization efficiency of computing resources. In this paper,we study the computing resource allocation strategy for one VBS by considering the non-negligible effect of delay introduced by switches. Specifically,we formulate the VBS's sum computing rate maximization as a set optimization problem. To address this problem,we firstly propose a computing resource schedule algorithm,namely,weight before one-step-greedy(WBOSG),which has linear computation complexity and considerable performance. Then,OSG retreat(OSG-R) algorithm is developed to further improve the system performance at the expense of computational complexity. Simulation results under practical setting are provided to validate the proposed two algorithms. 展开更多
关键词 资源分配策略 计算资源 虚拟化 基站 延迟 计算复杂度 感知 切换
下载PDF
Content-based facial image retrieval using common vector
18
作者 WANG Zhi-fang SONG Chen +1 位作者 NIU Xia-mu Christoph Busch 《通讯和计算机(中英文版)》 2008年第9期5-11,50,共8页
关键词 面部形象 图象处理 矢量 计算机技术
下载PDF
Content-based facial image authentication via statistic features
19
作者 HAN Qi LI Qiong NIU Xia-mu 《通讯和计算机(中英文版)》 2009年第2期16-20,共5页
关键词 人脸图像 图像识别 计算机技术 图像处理
下载PDF
A Void Avoidance Scheme for Grid-Based Multipath Routing in Underwater Wireless Sensor Networks
20
作者 Thoraya Al- Subhi Bassel Arafeh +2 位作者 Nasser Alzeidi Khalid Day Abderezak Touzene 《Wireless Sensor Network》 2018年第7期131-156,共26页
This work proposes a geographic routing protocol for UWSNs based on the construction of a 3D virtual grid structure, called Void-Avoidance Grid-based Multipath Position-based Routing (VA-GMPR). It consists of two main... This work proposes a geographic routing protocol for UWSNs based on the construction of a 3D virtual grid structure, called Void-Avoidance Grid-based Multipath Position-based Routing (VA-GMPR). It consists of two main components, the multipath routing scheme and the grid-based void avoidance (GVA) mechanism for handling routing holes. The multipath routing scheme adopts node-disjoint routes from the source to the sink in order to enhance network reliability and load balancing. While the GVA mechanism handles the problem of holes in 3D virtual grid structure based on three techniques: Hole bypass, path diversion, and path backtracking. The performance evaluation of the VA-GMPR protocol was compared to a recently proposed grid-based routing protocol for UWSNs, called Energy-efficient Multipath Geographic Grid-based Routing (EMGGR). The results showed that the VA-GMPR protocol outperformed the EMGGR protocol in terms of packet delivery ratio, and end-to end-delay. However, the results also showed that the VA-GMPR protocol exhibited higher energy consumption compared to EMGGR. 展开更多
关键词 GEOGRAPHIC ROUTING 3D virtual Grid Structure Grid-based ROUTING UNDERWATER Wireless Sensor Networks (UWSNs) HOLE Problem
下载PDF
上一页 1 2 65 下一页 到第
使用帮助 返回顶部