Complement 发表于 2025-3-26 21:08:14
Proposal of a Music Auditioning Application Using Music Compact Disk Jacket as Augmented Reality Ma application includes a music auditioning function as well as a related information presentation function. With the music auditioning function, users can easily listen to the music CDs they want to listen to on their smartphones. Furthermore, the related information presentation function recognizes加剧 发表于 2025-3-27 02:26:05
Proposal of a Real-Time Video Avatar Generation Method for Metaverse Environment,ng facial expressions and the atmosphere of conversation partners. Therefore, in this study, we propose a real-time video generation method as a new advanced communication tool that allows information sharing and decision-making. This method realizes communication that allows the user to feel the hu小淡水鱼 发表于 2025-3-27 08:52:16
,An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs,ansport system, have drawn a lot of interest from industry and academia. It is expected that vehicle-to-everything (V2X) communication will provide users with ultra-reliable and available transmission, especially in the case of safety-critical and autonomous applications. However, due to the open naReservation 发表于 2025-3-27 10:55:16
http://reply.papertrans.cn/47/4675/467431/467431_34.png流浪 发表于 2025-3-27 17:08:26
http://reply.papertrans.cn/47/4675/467431/467431_35.pngTrypsin 发表于 2025-3-27 21:44:38
,Implementation of FC-RDVM in WMN-PSOHCDGA System Considering Two Islands Distribution of Mesh ClienDVM in WMN-PSOHCDGA. We consider Two Islands distribution of mesh clients and carry out a comparison study of FC-RDVM and RDVM router replacement methods for small scale and middle scale WMNs. Both methods have a good performance for connectivity and coverage metrics. However, they have different loGRATE 发表于 2025-3-28 01:50:38
Universal Intrusion Detection System on In-Vehicle Network, to be developed individually for each vehicle, taking into account the unique data characteristics of the vehicle. Therefore, this paper proposes to implement universal IDS by using three types of CNN architectures to find the best one that is suitable for all types of attacks with high accuracy.怪物 发表于 2025-3-28 03:32:18
http://reply.papertrans.cn/47/4675/467431/467431_38.pngTOXIN 发表于 2025-3-28 10:11:58
http://reply.papertrans.cn/47/4675/467431/467431_39.png感情脆弱 发表于 2025-3-28 11:38:47
http://reply.papertrans.cn/47/4675/467431/467431_40.png