愤怒事实 发表于 2025-3-30 09:16:58

http://reply.papertrans.cn/25/2426/242533/242533_51.png

违法事实 发表于 2025-3-30 12:59:43

Technology Transfer in the Field of Additive Medical Technologies Based on Patent Informatics Reseay transfer model presented in the work shows three main milestones in the development of basic technology. The transition from the era of startups to the era of real business solutions expected to be carried out on the basement of flexible project management approaches.

maculated 发表于 2025-3-30 16:33:26

Personnel Privacy and Organisational Data: The Awareness and Policy Enforcement for Smartphone Secucipants has been gathered and analyzed. The MAF personnel are not exceptional to the prevalence of smartphone usage, making them also at risk of being targeted by the enemy or any particular parties with bad agendas towards the organization and the country.

独白 发表于 2025-3-30 22:34:53

Design of a Web Platform for Smoke and Flood Monitoring in a Data Center Based on the Internet of T microcontroller, which sends this information to a cloud server to be accessible through a user interface. When any of the values of the variables reaches a predefined threshold, an alert is sent to the graphical interface through the microcontroller and the user is alerted.

放逐某人 发表于 2025-3-31 04:08:34

http://reply.papertrans.cn/25/2426/242533/242533_55.png

considerable 发表于 2025-3-31 08:54:38

A Dual Frequency Band Comprehensive RFID TAGng microcredit borrowers are considered. The results of the research show that the interpretation of complex models using the SHAP method makes it possible to apply advanced machine learning methods to obtain analytical recommendations in the field of credit risk management in microfinance institutions. #CSOC1120.

斥责 发表于 2025-3-31 09:38:25

http://reply.papertrans.cn/25/2426/242533/242533_57.png

的阐明 发表于 2025-3-31 15:04:28

Security Testing in IEEE 802.11 Wireless Networks,lnerabilities and attacks on security protocols, practical possibilities of breaking the security of Wi-Fi networks protected by WPA2 and WPA3 protocols are shown by the most used attacks on a router secured by the mentioned protocols.

COUCH 发表于 2025-3-31 21:11:18

http://reply.papertrans.cn/25/2426/242533/242533_59.png

Exhilarate 发表于 2025-4-1 01:20:57

Radek Silhavy,Petr SilhavyPresents applications of cybernetics in intelligent systems.Connects academic research with industrial applications.Covers emerging trends in informatics research
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Cybernetics and Control Theory in Systems; Proceedings of 13th Radek Silhavy,Petr Silhavy Conference proceedings 2024 The Editor(s) (if ap