找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cybernetics and Control Theory in Systems; Proceedings of 13th Radek Silhavy,Petr Silhavy Conference proceedings 2024 The Editor(s) (if ap

[复制链接]
楼主: dabble
发表于 2025-3-30 09:16:58 | 显示全部楼层
发表于 2025-3-30 12:59:43 | 显示全部楼层
Technology Transfer in the Field of Additive Medical Technologies Based on Patent Informatics Reseay transfer model presented in the work shows three main milestones in the development of basic technology. The transition from the era of startups to the era of real business solutions expected to be carried out on the basement of flexible project management approaches.
发表于 2025-3-30 16:33:26 | 显示全部楼层
Personnel Privacy and Organisational Data: The Awareness and Policy Enforcement for Smartphone Secucipants has been gathered and analyzed. The MAF personnel are not exceptional to the prevalence of smartphone usage, making them also at risk of being targeted by the enemy or any particular parties with bad agendas towards the organization and the country.
发表于 2025-3-30 22:34:53 | 显示全部楼层
Design of a Web Platform for Smoke and Flood Monitoring in a Data Center Based on the Internet of T microcontroller, which sends this information to a cloud server to be accessible through a user interface. When any of the values of the variables reaches a predefined threshold, an alert is sent to the graphical interface through the microcontroller and the user is alerted.
发表于 2025-3-31 04:08:34 | 显示全部楼层
发表于 2025-3-31 08:54:38 | 显示全部楼层
A Dual Frequency Band Comprehensive RFID TAGng microcredit borrowers are considered. The results of the research show that the interpretation of complex models using the SHAP method makes it possible to apply advanced machine learning methods to obtain analytical recommendations in the field of credit risk management in microfinance institutions. #CSOC1120.
发表于 2025-3-31 09:38:25 | 显示全部楼层
发表于 2025-3-31 15:04:28 | 显示全部楼层
Security Testing in IEEE 802.11 Wireless Networks,lnerabilities and attacks on security protocols, practical possibilities of breaking the security of Wi-Fi networks protected by WPA2 and WPA3 protocols are shown by the most used attacks on a router secured by the mentioned protocols.
发表于 2025-3-31 21:11:18 | 显示全部楼层
发表于 2025-4-1 01:20:57 | 显示全部楼层
Radek Silhavy,Petr SilhavyPresents applications of cybernetics in intelligent systems.Connects academic research with industrial applications.Covers emerging trends in informatics research
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-4 15:00
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表