派博傳思國際中心

標題: Titlebook: Industrial IoT Technologies and Applications; Second EAI Internati Fulong Chen,Yonglong Luo Conference proceedings 2017 ICST Institute for [打印本頁]

作者: Addendum    時間: 2025-3-21 19:24
書目名稱Industrial IoT Technologies and Applications影響因子(影響力)




書目名稱Industrial IoT Technologies and Applications影響因子(影響力)學科排名




書目名稱Industrial IoT Technologies and Applications網(wǎng)絡公開度




書目名稱Industrial IoT Technologies and Applications網(wǎng)絡公開度學科排名




書目名稱Industrial IoT Technologies and Applications被引頻次




書目名稱Industrial IoT Technologies and Applications被引頻次學科排名




書目名稱Industrial IoT Technologies and Applications年度引用




書目名稱Industrial IoT Technologies and Applications年度引用學科排名




書目名稱Industrial IoT Technologies and Applications讀者反饋




書目名稱Industrial IoT Technologies and Applications讀者反饋學科排名





作者: 性冷淡    時間: 2025-3-21 21:03
Ping Zhang,Along Cao,Tao Liuen. Dementsprechend trafen wir innerhalb eines bestimmten Raumbereiches, dem finiten Element, Annahmen über den Verschiebungsverlauf. Wird nun neben den Koordinaten x, y und z auch die Zeit t als Variable aufgenommen, so erstrecken sich im Prinzip die finiten Elemente nicht nur über einen Raumbereic
作者: BURSA    時間: 2025-3-22 03:03
Shu-Ting Deng,Cong Xien ihres Gegenstands jeweils hinterherzuhinken. Die gesamte Branche ist nach wie vor von ?konomischem Wachstum bestimmt (vgl. Quandt/Festl/Scharkow 2011; Wolters 2008: 31) und die Halbwertszeit der Beliebtheit vieler publizierter Spiele zwingt die Forschenden dazu, notwendige Reduktionen oder Abstrak
作者: 說明    時間: 2025-3-22 06:59

作者: 姑姑在炫耀    時間: 2025-3-22 11:29
Cong Xie,Shu-Ting DengBerger und Luckmann 1969)), welche als audiovisuelle Speicher- und Wiedergabemedien grunds?tzlich in der Lage sind, reale Prozesse wahrnehmungsnah zu registrieren und ? wiederzugeben ? (vgl. hierzu Sachs-Hombach 2003, Schmidt 1994, H?risch 2006), um damit Wirklichkeit zu repr?sentieren.. Medienprodu
作者: hankering    時間: 2025-3-22 14:19

作者: 刪減    時間: 2025-3-22 19:24
Kai Zhang,Haiping Huang,Yunqi Wang,Ruchuan Wangelektionsvorgang, in dem nach den parametrisierten Wünschen des Nachfragers bzw. den Erfordernissen des Anwendungsfalles ein (komplexes) Endprodukt zusammengestellt wird.. Dabei besteht die Schwierigkeit darin, eine L?sung zu ermitteln, die den vorgegebenen Anforderungen des Aufgabenstellers entspri
作者: BOLT    時間: 2025-3-23 00:33
Guangyong Gao,Caixue Zhou,Zongmin Cui,Shimao Yao,Zhijun Chongelektionsvorgang, in dem nach den parametrisierten Wünschen des Nachfragers bzw. den Erfordernissen des Anwendungsfalles ein (komplexes) Endprodukt zusammengestellt wird.. Dabei besteht die Schwierigkeit darin, eine L?sung zu ermitteln, die den vorgegebenen Anforderungen des Aufgabenstellers entspri
作者: 低位的人或事    時間: 2025-3-23 03:59
Aohui Wang,Ruigang Liang,Xiaokang Liu,Yingjun Zhang,Kai Chen,Jin List kamen dann vor allem Homecomputer zum Einsatz. Die endgültige Spezifikation des Aufbaus und des Datenprotokolls lag im Jahre 1983 vor. Ziel dieser Zusatzeinrichtung ist es, Kl?nge aus Instrumenten zu gewinnen, die z.?B. von einem zentralen Keyboard oder Computer angesteuert werden. Um auch in Bez
作者: 槍支    時間: 2025-3-23 07:24
Bound Analysis for Anchor Selection in Cooperative Localization,of cooperative localization. Focusing on the localization accuracy, conventional practice suggests that the anchors should be deployed on the perimeter of the network. This paper derives the perimeter anchor deployment strategy by performing a bound analysis for the Cramér-Rao lower bound (CRLB) whi
作者: 我不重要    時間: 2025-3-23 11:54

作者: faculty    時間: 2025-3-23 14:18

作者: omnibus    時間: 2025-3-23 20:03

作者: 眨眼    時間: 2025-3-23 23:31
Optimization Bottleneck Analysis in GPU-Based Aiming at SAR Imaging,in SAR field. In GPU-based SAR imaging system, application defect induced by resources competition can significantly decrease the granularity of parallelism. To solve this problem, the GPU-based SAR imaging system with CUDA is firstly modeled. Secondly, conditions of parallel granularity loss rate b
作者: magnate    時間: 2025-3-24 02:51

作者: 投射    時間: 2025-3-24 09:20

作者: JADED    時間: 2025-3-24 12:36
Elastic Resource Provisioning System Based on OpenStack Cloud Platform,mponents of OpenStack platform were deployed and installed. Integrated basic resource pool was built. Based on open API of platform, applying JAVA native interface, elastic resource provisioning system was implemented which adops software architecture of B/S. The system has functions of establishmen
作者: 指耕作    時間: 2025-3-24 16:10
Edge Affine Invariant Moment for Texture Image Feature Extraction,ature extraction based on edge affine invariant moment is presented in this paper. Firstly, each texture image is checked by a short step affine transformation Sobel algorithm initially. Then, the corresponding texture image feature named edge affine invariant moment will be calculated and added to
作者: 正面    時間: 2025-3-24 19:57
Intelligent Private Fitness System Based on ARM and Hybrid Internet of Things,dually surfaced. On top of that, facing some of the common barriers, those new styles of different body-building activities could even do more harm then good to the individuals where these negative effect on the long-time training is not visible until the individual is facing physical injuries. For
作者: 喚醒    時間: 2025-3-25 00:54
Research and Application of Security and Privacy in Industrial Internet of Things Based on Fingerprtions of industrial Internet of things, this paper summarizes the security and privacy issues of industrial Internet of Things, then analyzes the common security threats and attacks, and draws on several kinds of fluent security measures, putting forward the security program of Fingerprint encryptio
作者: 肉體    時間: 2025-3-25 04:33

作者: Rustproof    時間: 2025-3-25 08:09
Link-Based Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks,a link is proposed in this paper. To be specifically, the data link is formed according to energy consumption and distance. For each round of the data aggregation, nodes within a certain cluster perform data aggregation together by subtracting the base value(given by cluster head) from its real valu
作者: 箴言    時間: 2025-3-25 12:14
Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC,hentication groups, and each authentication group is composed of a generator group and a carrier group. Then the cyclical redundancy check (CRC) code of generator group is produced as the authentication information. In the carrier group, using the prediction-error-based histogram shifting algorithm,
作者: COST    時間: 2025-3-25 19:21
Heterogeneous Component Model for Architecture of Community Medical Internet of Things,rements. In the face of growing community medical needs, the construction and development of community medical Internet of things is imminent. Through analyzing the existing construction of medical Internet of Things, combined with the community application environment, a heterogeneous component mod
作者: plasma-cells    時間: 2025-3-25 21:58
A Novel Grouping-Based WSN Clustering Data Transmission Protocol,ission process and the defects of transmission path after clustering on wireless sensor network (WSN). By calculating the reach probability of data packets, the original data packets are grouped to guarantee data integrity before transmission. Creating multi-path between cluster heads and the base s
作者: conflate    時間: 2025-3-26 02:10
An Improved DV-Hop Localization Algorithm via Inverse Distance Weighting Method in Wireless Sensor dom distribution in DV-Hop. Different from the previous results, minimum mean-squared error (MSE) and inverse distance weighting method are adopted to deal with the average one-hop distance in improved algorithm. Improved algorithm and DV-Hop are simulated by MATLAB R2015b, and the results of these
作者: 離開可分裂    時間: 2025-3-26 06:29

作者: 記成螞蟻    時間: 2025-3-26 09:03
An Inside Look at IoT Malware,ase up to 50.1 billion. Different from traditional security-related areas in which researchers have made many efforts on them for many years, researches on IoT have just started to receive attentions in recent years. The IoT devices are exposing to many security problems, such as weak passwords, bac
作者: Influx    時間: 2025-3-26 14:47

作者: chalice    時間: 2025-3-26 20:14

作者: deforestation    時間: 2025-3-26 23:19

作者: anaphylaxis    時間: 2025-3-27 01:15

作者: Spongy-Bone    時間: 2025-3-27 07:13
Cong Xie,Shu-Ting Dengng – wenn man so m?chte – ? sekund?r flüchtig ? ist, da es als zeitbasiertes Wahrnehmungsanalogon aus Prozessen besteht, die nicht (vollst?ndig) einer schriftlichen Notierung unterworfen werden k?nnen (vgl. ebd.: 15 ff.). Kurz: AV-Produkte sind Artefakte, in welchen Sinn nicht blo? als menschliches
作者: 捏造    時間: 2025-3-27 10:56
Shan Sun,Zhaoxia Yin,Jin Tang,Bin Luong – wenn man so m?chte – ? sekund?r flüchtig ? ist, da es als zeitbasiertes Wahrnehmungsanalogon aus Prozessen besteht, die nicht (vollst?ndig) einer schriftlichen Notierung unterworfen werden k?nnen (vgl. ebd.: 15 ff.). Kurz: AV-Produkte sind Artefakte, in welchen Sinn nicht blo? als menschliches
作者: 摻假    時間: 2025-3-27 16:26
Kai Zhang,Haiping Huang,Yunqi Wang,Ruchuan Wangin bezug auf die Schnittstellengestaltung Kompatibilit?t aufweisen.. Unter konfigurationsbedürftigen Produkten sollen damit im folgenden Leistungsbündel verstanden werden, die sich aus unterschiedlichen standardisierten Komponenten bzw. aus eigenst?ndig nutzenstiftenden Fertigprodukten zusammensetze
作者: 我吃花盤旋    時間: 2025-3-27 18:22
Guangyong Gao,Caixue Zhou,Zongmin Cui,Shimao Yao,Zhijun Chongin bezug auf die Schnittstellengestaltung Kompatibilit?t aufweisen.. Unter konfigurationsbedürftigen Produkten sollen damit im folgenden Leistungsbündel verstanden werden, die sich aus unterschiedlichen standardisierten Komponenten bzw. aus eigenst?ndig nutzenstiftenden Fertigprodukten zusammensetze
作者: diabetes    時間: 2025-3-28 00:41

作者: Nebulizer    時間: 2025-3-28 03:27

作者: 相反放置    時間: 2025-3-28 07:23

作者: Bridle    時間: 2025-3-28 10:29

作者: Limousine    時間: 2025-3-28 17:07
Jiequ Ji,Xianjin Fang,Dai Chen,Yafei Xiao,Yanting Wu
作者: 男生如果明白    時間: 2025-3-28 20:56
Recharging Route Scheduling for Wireless Sensor Network Through Particle Swarm Optimization,enishment still need to be carefully designed. In this paper, we proposed a novel route scheduling method for wireless sensor network to maximize network utility. Experiments results indicate that our method can more effective replenish energy than the compared method.
作者: eczema    時間: 2025-3-28 23:20

作者: 多節(jié)    時間: 2025-3-29 04:44
Fulong Chen,Yonglong LuoIncludes supplementary material:
作者: CRASS    時間: 2025-3-29 10:27

作者: Allodynia    時間: 2025-3-29 13:49
978-3-319-60752-8ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017
作者: 眉毛    時間: 2025-3-29 18:45
Industrial IoT Technologies and Applications978-3-319-60753-5Series ISSN 1867-8211 Series E-ISSN 1867-822X
作者: 不妥協(xié)    時間: 2025-3-29 20:29

作者: flammable    時間: 2025-3-30 01:05
Tracking Movement Target by Using WebGIS on Video Surveillance System,rget’s current location, current speed, current time and event’s attribute can be created. It also automatically collects the target’s relative video clips for improving the artificially monitoring work efficiency.
作者: affect    時間: 2025-3-30 05:36

作者: Cryptic    時間: 2025-3-30 10:51

作者: 免費    時間: 2025-3-30 14:30

作者: Debrief    時間: 2025-3-30 18:53

作者: Aesthete    時間: 2025-3-30 23:42
Improved Reversible Data Hiding Scheme Based on AMBTC Compression Technique,and the absolute moment. Experimental results and analysis demonstrate that, the proposed method can achieve high capacity with low distortion. Besides, the proposed method is very simple and can be easily applied to real-time transmission due to its lower computational complexity.
作者: 豐滿有漂亮    時間: 2025-3-31 04:14
Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC, the authentication information is reversibly embedded into the fluctuation region of prediction-error histogram (PEH), not the smooth region. Experimental results and analysis demonstrate that compared with previous schemes, the proposed scheme achieves better performances on computation complex, false tampering alarm and attraction to attackers.
作者: 激怒    時間: 2025-3-31 06:45

作者: MOT    時間: 2025-3-31 12:58

作者: 暫時休息    時間: 2025-3-31 17:02

作者: nascent    時間: 2025-3-31 19:47
Bound Analysis for Anchor Selection in Cooperative Localization,criminable relative configuration whose nodes are randomly deployed onto a two-dimensional plane. For the relative configuration specified by the internode distance measurements, we introduce an error metric to evaluate the anchor selection performance, together with an upper bound that is independent of anchor selection.
作者: carbohydrate    時間: 2025-3-31 23:56

作者: Emg827    時間: 2025-4-1 05:27
Optimization Bottleneck Analysis in GPU-Based Aiming at SAR Imaging,f SAR imaging operation is proposed according to the measured conditions of parallel granularity loss rate. Finally, optimization bottleneck analysis through FFT function and linear matrix interpolation scheme, and numerical simulations are made to demonstrate the effectiveness of the proposed scheme.
作者: Platelet    時間: 2025-4-1 06:59
Intelligent Private Fitness System Based on ARM and Hybrid Internet of Things,ecifically, inventing a more scientific option of body building than the traditional gym to prevent incorrect ways of training and guide the individuals to do healthy exercises by utilizing visual personal training system and internet to design a distributed mobile application.
作者: 砍伐    時間: 2025-4-1 12:59
Research and Application of Security and Privacy in Industrial Internet of Things Based on Fingerprdecoded out. Because the fingerprint information is unique, whether the success of the match can determine whether the operation is by itself, and then decides the next step, protects the user’s security and privacy in a great degree.




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
洞头县| 元氏县| 浠水县| 门源| 丰台区| 三都| 托克托县| 麻阳| 百色市| 固安县| 葫芦岛市| 山阳县| 手机| 涪陵区| 龙江县| 盐津县| 南平市| 玉门市| 龙海市| 长寿区| 惠东县| 宁晋县| 漾濞| 建湖县| 格尔木市| 鹤峰县| 洛浦县| 黄大仙区| 宣恩县| 隆回县| 略阳县| 瑞安市| 公主岭市| 益阳市| 玉树县| 营口市| 无棣县| 梓潼县| 永年县| 安宁市| 曲松县|