找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit

[复制链接]
楼主: fibrous-plaque
发表于 2025-3-28 17:58:42 | 显示全部楼层
Automatic Integrated Exhaust Fan Based on AT89S51 Single Chip Microcomputer algorithm. An exhaust fan which can detect gas automatically and work automatically is designed. It is assembled with smoke sensors, carbon monoxide sensors and exhaust fans to achieve automatic detection, automatic operation and elimination of harmful gases, and ensure people’s health is not infri
发表于 2025-3-28 20:59:21 | 显示全部楼层
Bring Intelligence to Ports Based on Internet of Thingselopment and status of Intelligent Ports. Then, focusing on some important parts of port, we discussed in detail of how to utilize IoT advanced technology to build next generation Intelligent Ports. The IoT key technology, detailed military technology application of functional modules and overall so
发表于 2025-3-29 00:00:18 | 显示全部楼层
发表于 2025-3-29 06:46:14 | 显示全部楼层
Classification of Car Scratch Types Based on Optimized BP Neural Networketection rate and low efficiency. In order to realize automatic detection, this paper puts forward a kind of car scratch classification method based on optimized BP neural network (H-IGA-BP). The feature vector which extracts obvious scratch characteristic from the texture is served as the input of
发表于 2025-3-29 08:51:04 | 显示全部楼层
发表于 2025-3-29 14:52:48 | 显示全部楼层
Composite Structure Health Monitoring Review Based on FBG Sensorfor monitoring damage, fiber Bragg grating (FBG) sensors have the advantages of being free from electromagnetic interference, light weight, small size, and non-corrosion resistance. Therefore, FBG sensors are widely used in the structural health monitoring of composite materials. This paper briefly
发表于 2025-3-29 17:28:20 | 显示全部楼层
Correlation Analysis of Alarm Data Based on Fuzzy Rule in Power Networkever, once the fault in power network, the transmission of power will be difficult and the engineer must check the fault in large amounts of alarm data in power network immediately, which would cost so much time by human experience. To solve this problem, we do correlation analysis of alarm data bas
发表于 2025-3-29 22:08:52 | 显示全部楼层
Coverage Holes Recovery Algorithm of Underwater Wireless Sensor Networksability and lifetime. Underwater wireless sensor network if no wireless sensor node is available in the area due to used up energy or any other reasons, the area which is not detected by any wireless sensor node forms coverage holes. The coverage holes recovery algorithm aiming at the coverage holes
发表于 2025-3-30 03:45:45 | 显示全部楼层
发表于 2025-3-30 07:35:17 | 显示全部楼层
https://doi.org/10.1007/978-3-322-82166-9object and utilizes the near-field capability of UHF tags for authentication. We implement our prototype using commercial off-the-shelf UHF RFID reader and tags. Extensive experiment results demonstrate that SecurArray effectively achieves high accuracy of physical-layer authentication.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-30 08:02
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表