派博傳思國(guó)際中心

標(biāo)題: Titlebook: Computer Science and its Applications; Ubiquitous Informati James J. (Jong Hyuk) Park,Ivan Stojmenovic,Gangman Conference proceedings 2015 [打印本頁(yè)]

作者: 萬(wàn)能    時(shí)間: 2025-3-21 19:53
書目名稱Computer Science and its Applications影響因子(影響力)




書目名稱Computer Science and its Applications影響因子(影響力)學(xué)科排名




書目名稱Computer Science and its Applications網(wǎng)絡(luò)公開(kāi)度




書目名稱Computer Science and its Applications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書目名稱Computer Science and its Applications被引頻次




書目名稱Computer Science and its Applications被引頻次學(xué)科排名




書目名稱Computer Science and its Applications年度引用




書目名稱Computer Science and its Applications年度引用學(xué)科排名




書目名稱Computer Science and its Applications讀者反饋




書目名稱Computer Science and its Applications讀者反饋學(xué)科排名





作者: CAJ    時(shí)間: 2025-3-21 20:57

作者: 飲料    時(shí)間: 2025-3-22 01:29

作者: Orgasm    時(shí)間: 2025-3-22 06:02

作者: 江湖郎中    時(shí)間: 2025-3-22 09:02

作者: 卡死偷電    時(shí)間: 2025-3-22 15:14

作者: 卡死偷電    時(shí)間: 2025-3-22 19:45
Measuring and Surveying Bisexuality,ities. Thus, it is crucial to consider device capabilities to provide seamless multi-screen services in conjunction with these devices. In this paper, we present an adaptive transformation engine to efficiently support smooth multi-screen services using smart devices. The proposed engine dynamically
作者: 公理    時(shí)間: 2025-3-22 23:43
https://doi.org/10.1007/978-90-481-9163-5 keys proposed by Bogdanov et al. in 2007. Higher-order differential attack is one of the cryptanalytic techniques exploiting a low algebraic degree of an encryption/decryption function. In 2013 Wu et al. reported the 16th-order differential attack on 10-round variant of PRESENT, which requires 2. p
作者: 貝雷帽    時(shí)間: 2025-3-23 02:33
https://doi.org/10.1007/978-90-481-9163-5tal Signal Processor) for recognizing hand gestures. The DSP based stereo camera module with high resolution and wide angle lens was developed for the hand gesture recognition. In addition, a hand gesture recognition system was developed with the camera module and PC based application. It recognizes
作者: 完成才能戰(zhàn)勝    時(shí)間: 2025-3-23 06:19

作者: 跳動(dòng)    時(shí)間: 2025-3-23 11:34
Game in Africa: Seizing the Opportunityg, power and physical resources. Owing to the dynamic nature of the vehicular cloud, continuous monitoring on trust attributes in necessary to enforce service-level agreement, This paper proposes RA-VTrust, Reputation-based Adaptive Vehicular Trust model for efficiently evaluating the competence of
作者: Encapsulate    時(shí)間: 2025-3-23 16:32

作者: 闖入    時(shí)間: 2025-3-23 19:17

作者: CANDY    時(shí)間: 2025-3-24 01:02
https://doi.org/10.1057/9781137516541llocation and task. In order to improve a performance, the scheduling may consider a resource evaluation. However, a resources state shows an uncertainty to evaluate the subject. In this paper, we propose of fuzzy logic-drive resource evaluation to solve this uncertainty for automated negotiation wi
作者: 北極人    時(shí)間: 2025-3-24 06:26

作者: Gyrate    時(shí)間: 2025-3-24 07:33

作者: 審問(wèn),審訊    時(shí)間: 2025-3-24 12:58
Changing Economic Environment in Asiain terms of energy consumption. LEACH (low energy adaptive clustering hierarchy), a protocol that periodically changes the cluster head, averages the power consumption of all nodes. Some researchers have suggested the use of a security system for LEACH, but such systems create a possibility in which
作者: Customary    時(shí)間: 2025-3-24 18:49

作者: 冒失    時(shí)間: 2025-3-24 20:16

作者: Somber    時(shí)間: 2025-3-25 00:55
The Asian Conglomerates at a Crossroadsed protocols in SCADA networks. However, it provides no inherent security mechanisms. Therefore, the Modbus protocol is susceptible to the type of attack that injects false Modbus commands by fabrication or modification. In this paper, we propose an abnormal behavior detection method by using normal
作者: metropolitan    時(shí)間: 2025-3-25 04:19
The Asian Conglomerates at a Crossroadsnitoring and analysis. The idea is to integrate depth sensor and motion sensor. We illustrate the sensor fusion concept and implement the wireless fall detection sensor sub-system. We experiment with angular acceleration data in three limbs parts of human test target. Different life patterns of elde
作者: jumble    時(shí)間: 2025-3-25 08:07
Computer Science and its Applications978-3-662-45402-2Series ISSN 1876-1100 Series E-ISSN 1876-1119
作者: 拉開(kāi)這車床    時(shí)間: 2025-3-25 13:54

作者: 青石板    時(shí)間: 2025-3-25 17:34
Lecture Notes in Electrical Engineeringhttp://image.papertrans.cn/c/image/233802.jpg
作者: vocation    時(shí)間: 2025-3-26 00:03

作者: 訓(xùn)誡    時(shí)間: 2025-3-26 03:06

作者: 貪婪的人    時(shí)間: 2025-3-26 04:45
https://doi.org/10.1007/978-90-481-9163-5 hand gesture recognition. In addition, a hand gesture recognition system was developed with the camera module and PC based application. It recognizes the movement and click gesture by analyzing the location and shape change of fingertips in real time
作者: 喧鬧    時(shí)間: 2025-3-26 08:30

作者: 易怒    時(shí)間: 2025-3-26 16:12
Game in Africa: Seizing the OpportunityIS protocol. And then the process of the WHOIS privacy collection is analyzed through the clustering method. Several methods of protection of the WHOIS privacy are proposed in this paper. Through the experimental results it can be seen that the protection method can better protect the privacy of WHOIS information in DNS.
作者: 誘騙    時(shí)間: 2025-3-26 18:04

作者: 長(zhǎng)矛    時(shí)間: 2025-3-27 00:26
Adaptive Transformation Engine Supporting Multi-Screen Services Using Smart Devices, we present an adaptive transformation engine to efficiently support smooth multi-screen services using smart devices. The proposed engine dynamically adapts user interfaces to make it suitable for smart devices. In addition, it supports real-time media transcoding and streaming so as to provide these devices with suitable media contents.
作者: STELL    時(shí)間: 2025-3-27 01:29

作者: 無(wú)畏    時(shí)間: 2025-3-27 08:29

作者: Cumbersome    時(shí)間: 2025-3-27 10:04
Research on Privacy Protection of WHOIS Information in DNS,IS protocol. And then the process of the WHOIS privacy collection is analyzed through the clustering method. Several methods of protection of the WHOIS privacy are proposed in this paper. Through the experimental results it can be seen that the protection method can better protect the privacy of WHOIS information in DNS.
作者: ARY    時(shí)間: 2025-3-27 16:54

作者: Bronchial-Tubes    時(shí)間: 2025-3-27 18:06
Conference proceedings 2015s a comprehensive conference focused on the various aspects of advances in engineering systems in computer science, and applications, including ubiquitous computing, U-Health care system, Big Data, UI/UX for human-centric computing, Computing Service, Bioinformatics and Bio-Inspired Computing and wi
作者: 紳士    時(shí)間: 2025-3-27 23:47
1876-1100 ng Service, Bioinformatics and Bio-Inspired Computing and will show recent advances on various aspects of computing technology, Ubiquitous Computing Services and its application..978-3-662-51619-5978-3-662-45402-2Series ISSN 1876-1100 Series E-ISSN 1876-1119
作者: 值得    時(shí)間: 2025-3-28 02:10

作者: 職業(yè)拳擊手    時(shí)間: 2025-3-28 09:06
Changing Economic Environment in Asiaropose a secrecy multiplication based on Shamir’s (k, n)-threshold secret-sharing scheme that uses only . servers. Through this scheme, the system can realize secrecy calculation without altering the threshold level.
作者: TAP    時(shí)間: 2025-3-28 14:29
The Asian Conglomerates at a Crossroadsmotion data for correct classification purpose. We discovered that the trained weights and bios from the neural network based on three limbs parts measurement data has allowed us to differentiate fall from regular walk motion with high accuracy.
作者: 瘙癢    時(shí)間: 2025-3-28 15:18
A Reputation-Based Adaptive Trust Management System for Vehicular Clouds, most suitable trust for vehicular services because it is performed by considering vehicular service level agreement (VSLA) documents and reputation services. The performance of RA-VTrust is evaluated through a simulation.
作者: CAMP    時(shí)間: 2025-3-28 19:44

作者: 神圣將軍    時(shí)間: 2025-3-29 01:20

作者: chassis    時(shí)間: 2025-3-29 05:33
Conference proceedings 2015tous computing, U-Health care system, Big Data, UI/UX for human-centric computing, Computing Service, Bioinformatics and Bio-Inspired Computing and will show recent advances on various aspects of computing technology, Ubiquitous Computing Services and its application..
作者: labile    時(shí)間: 2025-3-29 11:06
The Changing Definition of Masculinityincluding imperceptibility (such as PSNR, NC) and robustness (such as Filtering, Gaussian noise, Rotation and Salt and Pepper). Experimental results demonstrate that the proposed scheme shows superior performance in the presence of signal processing attracks.
作者: 鳴叫    時(shí)間: 2025-3-29 13:23

作者: 急急忙忙    時(shí)間: 2025-3-29 16:59
Game in Africa: Seizing the Opportunity), which not only uses the words themselves, but relations between them as well. Evaluation experiment and analysis confirm that our techniques have better recommendation results and effects on cold-start scenarios.
作者: abnegate    時(shí)間: 2025-3-29 23:13

作者: Enervate    時(shí)間: 2025-3-30 00:45
,Performance of a Hybrid DCT SVD Visually Imperceptible Digital Watermarking? against Signal Processincluding imperceptibility (such as PSNR, NC) and robustness (such as Filtering, Gaussian noise, Rotation and Salt and Pepper). Experimental results demonstrate that the proposed scheme shows superior performance in the presence of signal processing attracks.
作者: babble    時(shí)間: 2025-3-30 05:22

作者: Curmudgeon    時(shí)間: 2025-3-30 11:49

作者: expound    時(shí)間: 2025-3-30 13:20

作者: 變白    時(shí)間: 2025-3-30 18:08

作者: maculated    時(shí)間: 2025-3-30 23:41
The Changing Definition of Masculinity former velocity data of GPS until next the GPS signal is received. The performance of the hybrid navigation system was confirmed through the experiment comparing the actual route and the calculated route, where the calculated route of the simplified hybrid navigation system is the same with the actual route.
作者: BRINK    時(shí)間: 2025-3-31 02:46

作者: Rodent    時(shí)間: 2025-3-31 06:06
Robert G. Patman,Timothy G. Ferneriency and performance of architecture. The scenario has been developed and implemented in OMnet++ simulator. The simulation results reveal that the ERAGHC is better than the previous schemes in term of packet delivery ratio, packet delay and overall efficiency.
作者: Demonstrate    時(shí)間: 2025-3-31 13:07

作者: 抱怨    時(shí)間: 2025-3-31 14:13
Doryane Kermel-Torrès,Philippe Scharose a novel key exchange scheme that does not include nodes that cannot perform key exchange. Even if many nodes are stolen, the proposed scheme ensures that the analysis of keys in other nodes is not possible, in the case where the attacker cannot intercept communication between any of them.
作者: analogous    時(shí)間: 2025-3-31 18:14
The Asian Conglomerates at a Crossroads traffic pattern. Most of all, the proposed method is performed according to the analysis of only Modbus/TCP request messages. Therefore, it has the benefit of detecting abnormal behavior on even with the simple traffic pattern learning.
作者: Inertia    時(shí)間: 2025-3-31 22:50

作者: engagement    時(shí)間: 2025-4-1 03:31
A Simplified Hybrid Navigation System Design of a Mobile Robot Using Kalman Filter, former velocity data of GPS until next the GPS signal is received. The performance of the hybrid navigation system was confirmed through the experiment comparing the actual route and the calculated route, where the calculated route of the simplified hybrid navigation system is the same with the actual route.




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
通榆县| 吴堡县| 韶山市| 南木林县| 法库县| 高阳县| 长治县| 英德市| 庆云县| 上虞市| 肃宁县| 都江堰市| 中方县| 建德市| 巴中市| 富锦市| 两当县| 镇安县| 安国市| 长宁区| 延津县| 东安县| 乌鲁木齐市| 尉氏县| 宜春市| 湖北省| 云梦县| 资溪县| 江山市| 灵武市| 隆德县| 茂名市| 兴城市| 苏州市| 偏关县| 洛川县| 宾阳县| 新民市| 吉水县| 甘谷县| 靖安县|