找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Smart Grid and Internet of Things; 6th EAI Internationa Der-Jiunn Deng,Han-Chieh Chao,Jyh-Cheng Chen Conference proceedings 2023 ICST Insti

[复制链接]
楼主: industrious
发表于 2025-3-25 05:33:20 | 显示全部楼层
发表于 2025-3-25 10:36:48 | 显示全部楼层
Hybrid AI-Based iBeacon Indoor Positioning Cybersecurity Attacks and Defenses Thereofeople receive the services through the Bluetooth Low Energy (BLE) installed on their mobile phones. However, the positioning and navigation functions of iBeacon system may be compromised when faced with cyberattacks issued by hackers. In other words, its security needs to be further considered and e
发表于 2025-3-25 14:10:57 | 显示全部楼层
Digital Transformation Application of Precision Industrial Quotation Systemuting and IoT related technology has flourished. For traditional industries, demand is gradually changing from less diverse product to more diverse product. And most of them are customized orders, so the change of production mode has also become an opportunity for the digital transformation of enter
发表于 2025-3-25 16:37:35 | 显示全部楼层
Balance Between Data Circulation and Personal Information Protection sharing and sharing requires users to obtain the authorization of data collection and the authorization of users and data holders for data circulation and utilization, which seriously affects the data circulation. Starting from the needs of the development of the big data industry, to reflect on th
发表于 2025-3-25 23:01:14 | 显示全部楼层
发表于 2025-3-26 01:42:30 | 显示全部楼层
Research on Edge Computing Offloading Based on Reinforcement Learning in Multi-user Scenariosmart logistics, industrial Internet, and smart transportation have emerged one after another, and the door to the intelligent interconnection of all things has officially opened. However, due to IoT sensor devices are usually responsible for data acquisition and transmission, they have certain limit
发表于 2025-3-26 04:54:03 | 显示全部楼层
Design of Malicious Code Detection System Based on Convolutional Neural Networkrises more and more frequently with the help of software and system security vulnerabilities, which poses a serious threat to network security. The traditional static or dynamic malicious code detection technology is difficult to solve the problem of high-speed iteration and camouflage of malicious
发表于 2025-3-26 11:29:35 | 显示全部楼层
Comprehensive Task Priority Queue for Resource Allocation in Vehicle Edge Computing Network Based onmework like vehicle-to-roadside infrastructure is still faced with the challenge of balancing the impact of time and energy consumption. To overcome these drawbacks, this paper establishes a comprehensive task priority queue on the basis of software defined network (SDN) based vehicular network inst
发表于 2025-3-26 13:20:39 | 显示全部楼层
发表于 2025-3-26 19:36:03 | 显示全部楼层
Face Emotion Expression Recognition Using DLIB Model and Convolutional Neural Network Approach for So-face meeting learning became online learning. Learners tried to adapt to this unexpected circumstance. In the online learning approach, the instructors only assumed the degree of learners’ understanding with their face emotion expressions spontaneously. Advancement technology enables the machine t
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-15 14:51
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表