Covenant 发表于 2025-3-21 16:08:10

书目名称Data Science and Information Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0263095<br><br>        <br><br>书目名称Data Science and Information Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0263095<br><br>        <br><br>书目名称Data Science and Information Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0263095<br><br>        <br><br>书目名称Data Science and Information Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0263095<br><br>        <br><br>书目名称Data Science and Information Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0263095<br><br>        <br><br>书目名称Data Science and Information Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0263095<br><br>        <br><br>书目名称Data Science and Information Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0263095<br><br>        <br><br>书目名称Data Science and Information Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0263095<br><br>        <br><br>书目名称Data Science and Information Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0263095<br><br>        <br><br>书目名称Data Science and Information Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0263095<br><br>        <br><br>

敌意 发表于 2025-3-21 23:51:28

,Research on PCB Defect Detection Using 2D and 3D Segmentation,nized by 2D machine vision. This paper investigates PCB component defect detection using a combination of 2D and 3D techniques. We propose some image enhancement and contour extraction methods, and employ Contrast Limited Adaptive Histogram Equalization (CLAHE) to correct the color differences cause

就职 发表于 2025-3-22 03:59:06

http://reply.papertrans.cn/27/2631/263095/263095_3.png

倾听 发表于 2025-3-22 04:57:04

http://reply.papertrans.cn/27/2631/263095/263095_4.png

lipids 发表于 2025-3-22 11:38:55

http://reply.papertrans.cn/27/2631/263095/263095_5.png

音的强弱 发表于 2025-3-22 15:49:37

,An Erase Code Based Collaborative Storage Method in RFID Systems,storage technology based on network coding can divide the transmitted data into blocks and store them redundantly on multiple RFID tags. This paper designs an erase-code-based cooperative storage scheme for important information in a large-scale RFID system. Moreover, the optimization of scheme para

音的强弱 发表于 2025-3-22 19:43:55

http://reply.papertrans.cn/27/2631/263095/263095_7.png

曲解 发表于 2025-3-22 21:58:45

A Memoryless Information Sharing RFID Tag Anti-Collision Protocol, systems. They often rely on time division multiplexing to avoid tag collisions, resulting in low system efficiency. This article introduces a memoryless information-sharing tag anti-collision protocol. The protocol exploits the multi-channel attributes of a passive cellular IoT system, utilizing re

的染料 发表于 2025-3-23 02:17:05

http://reply.papertrans.cn/27/2631/263095/263095_9.png

Abduct 发表于 2025-3-23 08:46:48

Blockchain-Enhanced Device to Device Network Identity Verification Based on Zero Knowledge Proof,. Identity authentication also needs to protect the privacy of users. Therefore, this paper proposes a D2D network identity authentication method based on blockchain and zero knowledge proof, which realizes automatic authentication of devices in the network through blockchain-based smart contracts,
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Data Science and Information Security; First International Hai Jin,Yi Pan,Jianfeng Lu Conference proceedings 2024 The Editor(s) (if applic