標(biāo)題: Titlebook: Advanced Computer Science and Information Technology; Third International Tai-hoon Kim,Hojjat Adeli,Maricel Balitanas Conference proceedin [打印本頁] 作者: monster 時間: 2025-3-21 19:21
書目名稱Advanced Computer Science and Information Technology影響因子(影響力)
書目名稱Advanced Computer Science and Information Technology影響因子(影響力)學(xué)科排名
書目名稱Advanced Computer Science and Information Technology網(wǎng)絡(luò)公開度
書目名稱Advanced Computer Science and Information Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advanced Computer Science and Information Technology被引頻次
書目名稱Advanced Computer Science and Information Technology被引頻次學(xué)科排名
書目名稱Advanced Computer Science and Information Technology年度引用
書目名稱Advanced Computer Science and Information Technology年度引用學(xué)科排名
書目名稱Advanced Computer Science and Information Technology讀者反饋
書目名稱Advanced Computer Science and Information Technology讀者反饋學(xué)科排名
作者: Thyroid-Gland 時間: 2025-3-21 22:33
Hilfsexpedition nach Adrianopel an improved architecture to enhance fault tolerance, reliability, and ultimately predictability of FT-CORBA based ITS by generating and managing object replicas adaptively during system operation with an agent. The proposed architecture is expected to be applicable to other FT-CORBA based systems f作者: commonsense 時間: 2025-3-22 01:40 作者: 反復(fù)拉緊 時間: 2025-3-22 04:37 作者: aplomb 時間: 2025-3-22 10:10
TMDR-Based Query Conversion for Data Integration in a Distributed Network, and vector graphics, and learn how to do this with layers in various non-destructive ways.?.Some of the filters mentioned in this book will be familiar to you, as you may have used them frequently. However, others are well hidden, are new, or perhaps you have never considered that you could use tha作者: Yag-Capsulotomy 時間: 2025-3-22 15:22
Unaffected User Interface for CAVE Using Motion Templates Method,r vector graphics, and learn how to do this with your Layers panel in various non-destructive ways.?.Some of the tools mentioned in this book will be familiar to you, as you may have used them frequently. However, others are well hidden, are new, or perhaps you have never considered that you could u作者: G-spot 時間: 2025-3-22 19:46 作者: 針葉樹 時間: 2025-3-22 21:25 作者: emulsify 時間: 2025-3-23 03:08 作者: Genistein 時間: 2025-3-23 05:47
Dynamic Touch-Screen UI Generation of Mobile Application Using Probe Key Test,neering product realisation process brings great challenge as well as huge benefits. This Symposium provides a platform for academic researchers and industrial practitioners to exchange ideas used to address the challenges presented by this new global economic development. This book presents 75 papers from 18978-94-015-7003-9978-1-4020-2212-8作者: DAFT 時間: 2025-3-23 12:47 作者: 表狀態(tài) 時間: 2025-3-23 16:54
Design of Athlete Information Provision System Using Object Recognition,978-3-662-54430-3作者: 影響帶來 時間: 2025-3-23 21:46
Devising an Optimal Scheme for Distributed Wireless Sensors for Patient Monitoring in Preventive Ub978-3-658-24545-0作者: 偽書 時間: 2025-3-24 00:59 作者: collateral 時間: 2025-3-24 06:03
Advanced Computer Science and Information TechnologyThird International 作者: Infant 時間: 2025-3-24 08:29 作者: right-atrium 時間: 2025-3-24 14:20 作者: Locale 時間: 2025-3-24 16:57
Design and Evaluation of a Hybrid Intelligent Broadcast Algorithm for Alert Message Dissemination icase studies of public sector organizations operating in the energy sector of South Asian liberal democracies (India, Pakistan, Bangladesh, and Sri Lanka), including their structures, policy coherence within hybrid power networks, reciprocal relationships, and public programs.作者: 陳腐思想 時間: 2025-3-24 20:11
Fault Tolerant Intelligent Transportation Systems with an Agent,praken met de zorgverzekaars staan in de weg. Daarom stelt dit boek de bijdrage van DSM-5 aan het kapitalistische ‘spel’ tussen farmaceuten, psychiaters, verzekeraars en politici ter discussie. En ontvouwt Van 978-90-368-2036-3作者: Mortal 時間: 2025-3-25 02:26 作者: 使苦惱 時間: 2025-3-25 06:07 作者: 結(jié)構(gòu) 時間: 2025-3-25 11:29 作者: 清楚 時間: 2025-3-25 11:49
Hilfsexpedition nach Konstantinopeleveral places of the stadium. The server extracts the uniform information using uniform information extraction/recognition module, out of the athlete image transmitted from the broadcast cameras. The extracted information is used to identify athlete information and league information stored in the d作者: 燕麥 時間: 2025-3-25 19:13
https://doi.org/10.1007/978-3-642-51982-6g of target patients, and report tracking to central database server containing the vital information. This study performs optimization scheme for optimal placement of sensors and movement coordination techniques within the monitored area. A movement tracking algorithm is proposed for better patient作者: 愛社交 時間: 2025-3-25 20:54
Hilfsexpedition nach Adrianopel safety, and reliability of nationwide transportation systems. The core functions of the ITS are collection, management, and provision of real time transport information, and it can be deployed based on the Common Object Request Broker Architecture (CORBA) of the Object Management Group (OMG) becaus作者: Irascible 時間: 2025-3-26 03:47
Hilfsexpedition nach Adrianopeladvanced pattern understanding systems. These processes form a part of a field called cognitive informatics, which encompasses subjects related to the semantic analysis and interpretation of data leading to understanding the analysed data sets. These systems dedicated for cognitive analysis of image作者: vascular 時間: 2025-3-26 06:50 作者: 心神不寧 時間: 2025-3-26 09:27
Die Hilfsexpedition nach Griechenlandd to access these data by means of integration. TMDR is a repository that combines MSO for schema integration and Topic Maps for semantic integration of data. In methodology, the global query is created for global processing using TMDR, and the resulting global query is broken down into local schema作者: obeisance 時間: 2025-3-26 15:59 作者: RAG 時間: 2025-3-26 17:37
Heinrich Luxembourg,Anton Jurasz early stage of ERP adoption, called core ERP, the focus was on integrating a firm’s internal processes; so that, increasing its internal efficiency. More recently, firms began to expand their system across their supply chain in order to enhance the supply chain capability by implementing inter-firm作者: inferno 時間: 2025-3-26 23:58 作者: corporate 時間: 2025-3-27 03:20
Hilfsexpedition nach Konstantinopelion of VANET is disseminating emergency messages to warn drivers in case of dangerous events. The core technique relies on the design of a broadcast scheme. In this paper, we propose a hybrid intelligent broadcast algorithm for alert message dissemination in VANETs that is called Hi-CAST. To deliver作者: Respond 時間: 2025-3-27 07:49
Heinrich Luxembourg,Anton Juraszime 3D virtual reality techniques. The objective of the proposed system is to maximize learning, especially self-directed learning, and to promote student motivation by improving several technical problems inherent to previously developed virtual education systems. The main improvements are the syst作者: 外向者 時間: 2025-3-27 10:43 作者: misshapen 時間: 2025-3-27 16:09
Klinische Arbeiten und Beobachtungenility against radio interference attacks is fatal in the microgrid as an energy infrastructure. Thus, the ability to deal with radio interference attacks and maintain an acceptable level of service degradation in presence of the attacks is needed in the design of the communication framework. To solv作者: hidebound 時間: 2025-3-27 20:53
https://doi.org/10.1007/978-3-642-51982-6til this point, the method of defining a single screen keyboard and redirecting touch inputs to key inputs was used. However, this method diminishes the efficiency of touch-screens because a fixed-layout is applied to every application even though different keys are used for different UI states of a作者: accomplishment 時間: 2025-3-27 22:43 作者: 中國紀(jì)念碑 時間: 2025-3-28 02:37
,Zum Problem des ?Axtgeldes” im Alten Peru, is another method from researches on the existing security system. In particular, researches on coding rules and vulnerability analysis tools for developing secure software are active in the field of programming languages. However, existing researches for the development of secure software, the tar作者: 控制 時間: 2025-3-28 07:17
,Zum Problem des ?Axtgeldes” im Alten Peru,l consumption. We got the output as fuel-consumption from a vehicle RPM, TPS as input by using polynomial equation. We had modeling as quadric function with OBD-II data and fuel consumption data supported by automotive company in real. In order to verify the effectiveness of proposed method, 5 km re作者: 制定 時間: 2025-3-28 11:18
https://doi.org/10.1007/978-3-663-16216-2ing the WSN systems operating, power consumption is greatest. There for, if you configure the Network with the RF communication module turn on/off periodically, power consumption less then operating the module all the time without it toggles. However, some data omissions may occur in which transmiss作者: 無聊點好 時間: 2025-3-28 15:24
Beitr?ge zur Lehre von Ding und Gesetz device based on WSN, smart phone device which is used by group manager and web server. The sensor node called as personal device which is used by group members sends a data packet every 2 seconds to the manager device. The manager can check their group member’s distance from him within a 30-meter r作者: 放逐某人 時間: 2025-3-28 19:02
Tai-hoon Kim,Hojjat Adeli,Maricel BalitanasFast-track conference proceedings.State-of-the-art research.Up-to-date results作者: 爆炸 時間: 2025-3-29 02:13
Communications in Computer and Information Sciencehttp://image.papertrans.cn/a/image/145353.jpg作者: pineal-gland 時間: 2025-3-29 03:43 作者: 使長胖 時間: 2025-3-29 07:28
978-3-642-24266-3Springer-Verlag GmbH Berlin Heidelberg 2011作者: 到婚嫁年齡 時間: 2025-3-29 13:56
Advanced Computer Science and Information Technology978-3-642-24267-0Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: SMART 時間: 2025-3-29 16:27
Klinische Arbeiten und Beobachtungenon its nature and importance for the institution concerned. In this paper we will present algorithms for multi-level information management and sharing. Such techniques will be based on the linguistic formalisms and sequential grammars. Presented approach may be treated as a secure enhancement of classical secret sharing procedures.作者: 字形刻痕 時間: 2025-3-29 20:53
https://doi.org/10.1007/978-3-642-51982-6 carried out. In this research, a routing structure using the multi-level grid structure that could decrease multihop was designed in order to reduce energy consumption in the M2M network consisting of different types of sensor nodes.作者: 解開 時間: 2025-3-30 03:09 作者: Synapse 時間: 2025-3-30 04:17 作者: 全能 時間: 2025-3-30 10:30 作者: 無政府主義者 時間: 2025-3-30 15:18 作者: 豐滿有漂亮 時間: 2025-3-30 16:45
https://doi.org/10.1007/978-3-642-51982-6and semantics given by the OSEK/VDX OIL specification. And the configuration is converted into lines of C codes using the system generator rather than loaded on startup. Also we present the design aspects of the tool related to development cycle of the platform and the tool itself.作者: 別炫耀 時間: 2025-3-30 21:00
https://doi.org/10.1007/978-3-642-51982-6n application. This study proposes a method that investigates the type of keys used in an application during run-time using the probe key and dynamically configures the layout of screen keyboards. Test results of the proposed method showed that an optimized touch-screen UI was generated every time the UI state of an application changed.作者: 冰雹 時間: 2025-3-31 04:05
,Zum Problem des ?Axtgeldes” im Alten Peru,al road-test was performed. The results showed that the proposed method can estimate precisely the fuel consumption from vehicle multi-data. It was observed that the proposed models using instantaneous engine RPM and TPS can predict the fuel consumption quite well with correlation coefficient were 76% and 88% respectively.作者: GOUGE 時間: 2025-3-31 05:52 作者: MANIA 時間: 2025-3-31 09:23
Die Hilfsexpedition nach Griechenlandof data. In methodology, the global query is created for global processing using TMDR, and the resulting global query is broken down into local schema to access distributed systems in a network, enabling integrated access. We propose a method of converting global query and local query for this purpose.作者: Pander 時間: 2025-3-31 14:45 作者: HERE 時間: 2025-3-31 20:22
Klinische Arbeiten und Beobachtungencks and maintain an acceptable level of service degradation in presence of the attacks is needed in the design of the communication framework. To solve the problem, we propose a traffic rerouting scheme in the design infrastructure.作者: 反叛者 時間: 2025-4-1 01:33 作者: outer-ear 時間: 2025-4-1 05:20
,Zum Problem des ?Axtgeldes” im Alten Peru,eloping secure software are active in the field of programming languages. However, existing researches for the development of secure software, the target was an individual language. In this study, we were present a methodology to define and analyze for software vulnerability on the case of language interoperability.作者: 腐蝕 時間: 2025-4-1 07:01 作者: 畏縮 時間: 2025-4-1 10:20 作者: QUAIL 時間: 2025-4-1 18:13
Beitr?ge zur Lehre von Ding und Gesetzand information of personal devices to web server. Therefore, other person such as group member’s parents can assure their children’s safety and security through the web page. The RSSI value from sensor node was converted into distance data by computed log-normal path loss model.作者: arousal 時間: 2025-4-1 22:34