不正常 发表于 2025-3-21 18:07:46

书目名称Data Engineering and Communication Technology影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0262787<br><br>        <br><br>书目名称Data Engineering and Communication Technology影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0262787<br><br>        <br><br>书目名称Data Engineering and Communication Technology网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0262787<br><br>        <br><br>书目名称Data Engineering and Communication Technology网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0262787<br><br>        <br><br>书目名称Data Engineering and Communication Technology被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0262787<br><br>        <br><br>书目名称Data Engineering and Communication Technology被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0262787<br><br>        <br><br>书目名称Data Engineering and Communication Technology年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0262787<br><br>        <br><br>书目名称Data Engineering and Communication Technology年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0262787<br><br>        <br><br>书目名称Data Engineering and Communication Technology读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0262787<br><br>        <br><br>书目名称Data Engineering and Communication Technology读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0262787<br><br>        <br><br>

符合国情 发表于 2025-3-21 21:51:01

Authentic User-Based Luminary Intensity Control System,time zones and as well as by authentic user. The designed prototype will run in two modes: (i) autorun self-test mode and (ii) normal working mode. The normal working mode is used for infield light intensity control and supports two different modes: (i) timer mode and (ii) external authentic user co

miscreant 发表于 2025-3-22 03:26:45

http://reply.papertrans.cn/27/2628/262787/262787_3.png

哑巴 发表于 2025-3-22 07:28:15

http://reply.papertrans.cn/27/2628/262787/262787_4.png

带子 发表于 2025-3-22 09:51:34

Wormhole Attack Detection in Wireless Sensor Network Using SVM and Delay Per-hop Indication,teal data or disrupt functionality of the system. However, small may the chance be, the aftermath of such attacks can be catastrophic in cases where WSNs are deployed in a sensitive area. In this paper, a technique which uses SVM classification along with the delay per-hop indication, to detect the

Proponent 发表于 2025-3-22 14:29:19

http://reply.papertrans.cn/27/2628/262787/262787_6.png

Proponent 发表于 2025-3-22 20:37:07

http://reply.papertrans.cn/27/2628/262787/262787_7.png

有角 发表于 2025-3-22 22:00:51

Number Plate Detection Using Morphology and Geometrical Properties,ng control, etc. To solve these issues, numerous LP detection techniques have been proposed in recent times, and most of them have failed to succeed when there is a complex background or in illumination and they need some enhancements. So, we have proposed a new LP detection technique to detect the

狼群 发表于 2025-3-23 04:14:40

http://reply.papertrans.cn/27/2628/262787/262787_9.png

Bone-Scan 发表于 2025-3-23 08:04:32

http://reply.papertrans.cn/27/2628/262787/262787_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Data Engineering and Communication Technology; Proceedings of ICDEC K. Ashoka Reddy,B. Rama Devi,K. Srujan Raju Conference proceedings 2021