expound 发表于 2025-3-27 00:12:38
http://reply.papertrans.cn/47/4657/465619/465619_31.pngnovelty 发表于 2025-3-27 02:21:23
http://reply.papertrans.cn/47/4657/465619/465619_32.png颠簸下上 发表于 2025-3-27 07:28:49
Conference proceedings 2024telligent Decision Making Systems, ITIDMS 2023, held in Moscow, Russia, during December, 12-14, 2023...The 18 full papers included in this book were carefully reviewed and selected from 54 submissions. The papers presented in this volume focus on topics such as digital, intellectual and informationPopcorn 发表于 2025-3-27 12:47:52
Implementing a Jenkins Plugin to Visualize Continuous Integration Pipelines,tt chart as well as provides the user with metadata, crash and restart information. Results of the plugin integration into Jenkins pipeline prove its effectiveness due to reduction of efforts on integration pipeline analysis.Ceremony 发表于 2025-3-27 16:41:32
1865-0929 ies and Intelligent Decision Making Systems, ITIDMS 2023, held in Moscow, Russia, during December, 12-14, 2023...The 18 full papers included in this book were carefully reviewed and selected from 54 submissions. The papers presented in this volume focus on topics such as digital, intellectual and inOptic-Disk 发表于 2025-3-27 20:08:02
Investigation of the Characteristics of a Frequency Diversity Array Antenna, in detail, and its directional patterns with focus only on transmission, only on reception, and full focus are studied. FDA antennas with nonlinear and symmetrical frequency distributions over the elements are considered. The effect of matched filtering on the appearance of the radiation pattern has been studied.Vo2-Max 发表于 2025-3-28 00:30:35
http://reply.papertrans.cn/47/4657/465619/465619_37.pngExpiration 发表于 2025-3-28 05:30:57
Choosing an Information Protection Mechanism Based on the Discrete Programming Method,e problem of choosing the optimal software protection mechanism based on the decay vector method is considered. The implementation of the algorithm of the method is written in the Java language. The resulting solution is a set of countermeasures recommended to neutralize security threats to the software.愚笨 发表于 2025-3-28 06:23:10
http://reply.papertrans.cn/47/4657/465619/465619_39.pngALTER 发表于 2025-3-28 12:04:43
1865-0929 ook were carefully reviewed and selected from 54 submissions. The papers presented in this volume focus on topics such as digital, intellectual and information transformation, the development of computer models and the improvement of automated and computing processes..978-3-031-60317-4978-3-031-60318-1Series ISSN 1865-0929 Series E-ISSN 1865-0937