POINT 发表于 2025-3-28 17:58:42

Automatic Integrated Exhaust Fan Based on AT89S51 Single Chip Microcomputer algorithm. An exhaust fan which can detect gas automatically and work automatically is designed. It is assembled with smoke sensors, carbon monoxide sensors and exhaust fans to achieve automatic detection, automatic operation and elimination of harmful gases, and ensure people’s health is not infri

他一致 发表于 2025-3-28 20:59:21

Bring Intelligence to Ports Based on Internet of Thingselopment and status of Intelligent Ports. Then, focusing on some important parts of port, we discussed in detail of how to utilize IoT advanced technology to build next generation Intelligent Ports. The IoT key technology, detailed military technology application of functional modules and overall so

碎石 发表于 2025-3-29 00:00:18

http://reply.papertrans.cn/23/2285/228432/228432_43.png

VEN 发表于 2025-3-29 06:46:14

Classification of Car Scratch Types Based on Optimized BP Neural Networketection rate and low efficiency. In order to realize automatic detection, this paper puts forward a kind of car scratch classification method based on optimized BP neural network (H-IGA-BP). The feature vector which extracts obvious scratch characteristic from the texture is served as the input of

Graphite 发表于 2025-3-29 08:51:04

http://reply.papertrans.cn/23/2285/228432/228432_45.png

放纵 发表于 2025-3-29 14:52:48

Composite Structure Health Monitoring Review Based on FBG Sensorfor monitoring damage, fiber Bragg grating (FBG) sensors have the advantages of being free from electromagnetic interference, light weight, small size, and non-corrosion resistance. Therefore, FBG sensors are widely used in the structural health monitoring of composite materials. This paper briefly

Emasculate 发表于 2025-3-29 17:28:20

Correlation Analysis of Alarm Data Based on Fuzzy Rule in Power Networkever, once the fault in power network, the transmission of power will be difficult and the engineer must check the fault in large amounts of alarm data in power network immediately, which would cost so much time by human experience. To solve this problem, we do correlation analysis of alarm data bas

遭遇 发表于 2025-3-29 22:08:52

Coverage Holes Recovery Algorithm of Underwater Wireless Sensor Networksability and lifetime. Underwater wireless sensor network if no wireless sensor node is available in the area due to used up energy or any other reasons, the area which is not detected by any wireless sensor node forms coverage holes. The coverage holes recovery algorithm aiming at the coverage holes

Preserve 发表于 2025-3-30 03:45:45

http://reply.papertrans.cn/23/2285/228432/228432_49.png

节省 发表于 2025-3-30 07:35:17

https://doi.org/10.1007/978-3-322-82166-9object and utilizes the near-field capability of UHF tags for authentication. We implement our prototype using commercial off-the-shelf UHF RFID reader and tags. Extensive experiment results demonstrate that SecurArray effectively achieves high accuracy of physical-layer authentication.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit