標題: Titlebook: Industrial IoT Technologies and Applications; Second EAI Internati Fulong Chen,Yonglong Luo Conference proceedings 2017 ICST Institute for [打印本頁] 作者: Addendum 時間: 2025-3-21 19:24
書目名稱Industrial IoT Technologies and Applications影響因子(影響力)
書目名稱Industrial IoT Technologies and Applications影響因子(影響力)學科排名
書目名稱Industrial IoT Technologies and Applications網(wǎng)絡公開度
書目名稱Industrial IoT Technologies and Applications網(wǎng)絡公開度學科排名
書目名稱Industrial IoT Technologies and Applications被引頻次
書目名稱Industrial IoT Technologies and Applications被引頻次學科排名
書目名稱Industrial IoT Technologies and Applications年度引用
書目名稱Industrial IoT Technologies and Applications年度引用學科排名
書目名稱Industrial IoT Technologies and Applications讀者反饋
書目名稱Industrial IoT Technologies and Applications讀者反饋學科排名
作者: 性冷淡 時間: 2025-3-21 21:03
Ping Zhang,Along Cao,Tao Liuen. Dementsprechend trafen wir innerhalb eines bestimmten Raumbereiches, dem finiten Element, Annahmen über den Verschiebungsverlauf. Wird nun neben den Koordinaten x, y und z auch die Zeit t als Variable aufgenommen, so erstrecken sich im Prinzip die finiten Elemente nicht nur über einen Raumbereic作者: BURSA 時間: 2025-3-22 03:03
Shu-Ting Deng,Cong Xien ihres Gegenstands jeweils hinterherzuhinken. Die gesamte Branche ist nach wie vor von ?konomischem Wachstum bestimmt (vgl. Quandt/Festl/Scharkow 2011; Wolters 2008: 31) und die Halbwertszeit der Beliebtheit vieler publizierter Spiele zwingt die Forschenden dazu, notwendige Reduktionen oder Abstrak作者: 說明 時間: 2025-3-22 06:59 作者: 姑姑在炫耀 時間: 2025-3-22 11:29
Cong Xie,Shu-Ting DengBerger und Luckmann 1969)), welche als audiovisuelle Speicher- und Wiedergabemedien grunds?tzlich in der Lage sind, reale Prozesse wahrnehmungsnah zu registrieren und ? wiederzugeben ? (vgl. hierzu Sachs-Hombach 2003, Schmidt 1994, H?risch 2006), um damit Wirklichkeit zu repr?sentieren.. Medienprodu作者: hankering 時間: 2025-3-22 14:19 作者: 刪減 時間: 2025-3-22 19:24
Kai Zhang,Haiping Huang,Yunqi Wang,Ruchuan Wangelektionsvorgang, in dem nach den parametrisierten Wünschen des Nachfragers bzw. den Erfordernissen des Anwendungsfalles ein (komplexes) Endprodukt zusammengestellt wird.. Dabei besteht die Schwierigkeit darin, eine L?sung zu ermitteln, die den vorgegebenen Anforderungen des Aufgabenstellers entspri作者: BOLT 時間: 2025-3-23 00:33
Guangyong Gao,Caixue Zhou,Zongmin Cui,Shimao Yao,Zhijun Chongelektionsvorgang, in dem nach den parametrisierten Wünschen des Nachfragers bzw. den Erfordernissen des Anwendungsfalles ein (komplexes) Endprodukt zusammengestellt wird.. Dabei besteht die Schwierigkeit darin, eine L?sung zu ermitteln, die den vorgegebenen Anforderungen des Aufgabenstellers entspri作者: 低位的人或事 時間: 2025-3-23 03:59
Aohui Wang,Ruigang Liang,Xiaokang Liu,Yingjun Zhang,Kai Chen,Jin List kamen dann vor allem Homecomputer zum Einsatz. Die endgültige Spezifikation des Aufbaus und des Datenprotokolls lag im Jahre 1983 vor. Ziel dieser Zusatzeinrichtung ist es, Kl?nge aus Instrumenten zu gewinnen, die z.?B. von einem zentralen Keyboard oder Computer angesteuert werden. Um auch in Bez作者: 槍支 時間: 2025-3-23 07:24
Bound Analysis for Anchor Selection in Cooperative Localization,of cooperative localization. Focusing on the localization accuracy, conventional practice suggests that the anchors should be deployed on the perimeter of the network. This paper derives the perimeter anchor deployment strategy by performing a bound analysis for the Cramér-Rao lower bound (CRLB) whi作者: 我不重要 時間: 2025-3-23 11:54 作者: faculty 時間: 2025-3-23 14:18 作者: omnibus 時間: 2025-3-23 20:03 作者: 眨眼 時間: 2025-3-23 23:31
Optimization Bottleneck Analysis in GPU-Based Aiming at SAR Imaging,in SAR field. In GPU-based SAR imaging system, application defect induced by resources competition can significantly decrease the granularity of parallelism. To solve this problem, the GPU-based SAR imaging system with CUDA is firstly modeled. Secondly, conditions of parallel granularity loss rate b作者: magnate 時間: 2025-3-24 02:51 作者: 投射 時間: 2025-3-24 09:20 作者: JADED 時間: 2025-3-24 12:36
Elastic Resource Provisioning System Based on OpenStack Cloud Platform,mponents of OpenStack platform were deployed and installed. Integrated basic resource pool was built. Based on open API of platform, applying JAVA native interface, elastic resource provisioning system was implemented which adops software architecture of B/S. The system has functions of establishmen作者: 指耕作 時間: 2025-3-24 16:10
Edge Affine Invariant Moment for Texture Image Feature Extraction,ature extraction based on edge affine invariant moment is presented in this paper. Firstly, each texture image is checked by a short step affine transformation Sobel algorithm initially. Then, the corresponding texture image feature named edge affine invariant moment will be calculated and added to 作者: 正面 時間: 2025-3-24 19:57
Intelligent Private Fitness System Based on ARM and Hybrid Internet of Things,dually surfaced. On top of that, facing some of the common barriers, those new styles of different body-building activities could even do more harm then good to the individuals where these negative effect on the long-time training is not visible until the individual is facing physical injuries. For 作者: 喚醒 時間: 2025-3-25 00:54
Research and Application of Security and Privacy in Industrial Internet of Things Based on Fingerprtions of industrial Internet of things, this paper summarizes the security and privacy issues of industrial Internet of Things, then analyzes the common security threats and attacks, and draws on several kinds of fluent security measures, putting forward the security program of Fingerprint encryptio作者: 肉體 時間: 2025-3-25 04:33 作者: Rustproof 時間: 2025-3-25 08:09
Link-Based Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks,a link is proposed in this paper. To be specifically, the data link is formed according to energy consumption and distance. For each round of the data aggregation, nodes within a certain cluster perform data aggregation together by subtracting the base value(given by cluster head) from its real valu作者: 箴言 時間: 2025-3-25 12:14
Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC,hentication groups, and each authentication group is composed of a generator group and a carrier group. Then the cyclical redundancy check (CRC) code of generator group is produced as the authentication information. In the carrier group, using the prediction-error-based histogram shifting algorithm,作者: COST 時間: 2025-3-25 19:21
Heterogeneous Component Model for Architecture of Community Medical Internet of Things,rements. In the face of growing community medical needs, the construction and development of community medical Internet of things is imminent. Through analyzing the existing construction of medical Internet of Things, combined with the community application environment, a heterogeneous component mod作者: plasma-cells 時間: 2025-3-25 21:58
A Novel Grouping-Based WSN Clustering Data Transmission Protocol,ission process and the defects of transmission path after clustering on wireless sensor network (WSN). By calculating the reach probability of data packets, the original data packets are grouped to guarantee data integrity before transmission. Creating multi-path between cluster heads and the base s作者: conflate 時間: 2025-3-26 02:10
An Improved DV-Hop Localization Algorithm via Inverse Distance Weighting Method in Wireless Sensor dom distribution in DV-Hop. Different from the previous results, minimum mean-squared error (MSE) and inverse distance weighting method are adopted to deal with the average one-hop distance in improved algorithm. Improved algorithm and DV-Hop are simulated by MATLAB R2015b, and the results of these 作者: 離開可分裂 時間: 2025-3-26 06:29 作者: 記成螞蟻 時間: 2025-3-26 09:03
An Inside Look at IoT Malware,ase up to 50.1 billion. Different from traditional security-related areas in which researchers have made many efforts on them for many years, researches on IoT have just started to receive attentions in recent years. The IoT devices are exposing to many security problems, such as weak passwords, bac作者: Influx 時間: 2025-3-26 14:47 作者: chalice 時間: 2025-3-26 20:14 作者: deforestation 時間: 2025-3-26 23:19 作者: anaphylaxis 時間: 2025-3-27 01:15 作者: Spongy-Bone 時間: 2025-3-27 07:13
Cong Xie,Shu-Ting Dengng – wenn man so m?chte – ? sekund?r flüchtig ? ist, da es als zeitbasiertes Wahrnehmungsanalogon aus Prozessen besteht, die nicht (vollst?ndig) einer schriftlichen Notierung unterworfen werden k?nnen (vgl. ebd.: 15 ff.). Kurz: AV-Produkte sind Artefakte, in welchen Sinn nicht blo? als menschliches 作者: 捏造 時間: 2025-3-27 10:56
Shan Sun,Zhaoxia Yin,Jin Tang,Bin Luong – wenn man so m?chte – ? sekund?r flüchtig ? ist, da es als zeitbasiertes Wahrnehmungsanalogon aus Prozessen besteht, die nicht (vollst?ndig) einer schriftlichen Notierung unterworfen werden k?nnen (vgl. ebd.: 15 ff.). Kurz: AV-Produkte sind Artefakte, in welchen Sinn nicht blo? als menschliches 作者: 摻假 時間: 2025-3-27 16:26
Kai Zhang,Haiping Huang,Yunqi Wang,Ruchuan Wangin bezug auf die Schnittstellengestaltung Kompatibilit?t aufweisen.. Unter konfigurationsbedürftigen Produkten sollen damit im folgenden Leistungsbündel verstanden werden, die sich aus unterschiedlichen standardisierten Komponenten bzw. aus eigenst?ndig nutzenstiftenden Fertigprodukten zusammensetze作者: 我吃花盤旋 時間: 2025-3-27 18:22
Guangyong Gao,Caixue Zhou,Zongmin Cui,Shimao Yao,Zhijun Chongin bezug auf die Schnittstellengestaltung Kompatibilit?t aufweisen.. Unter konfigurationsbedürftigen Produkten sollen damit im folgenden Leistungsbündel verstanden werden, die sich aus unterschiedlichen standardisierten Komponenten bzw. aus eigenst?ndig nutzenstiftenden Fertigprodukten zusammensetze作者: diabetes 時間: 2025-3-28 00:41 作者: Nebulizer 時間: 2025-3-28 03:27 作者: 相反放置 時間: 2025-3-28 07:23 作者: Bridle 時間: 2025-3-28 10:29 作者: Limousine 時間: 2025-3-28 17:07
Jiequ Ji,Xianjin Fang,Dai Chen,Yafei Xiao,Yanting Wu作者: 男生如果明白 時間: 2025-3-28 20:56
Recharging Route Scheduling for Wireless Sensor Network Through Particle Swarm Optimization,enishment still need to be carefully designed. In this paper, we proposed a novel route scheduling method for wireless sensor network to maximize network utility. Experiments results indicate that our method can more effective replenish energy than the compared method.作者: eczema 時間: 2025-3-28 23:20 作者: 多節(jié) 時間: 2025-3-29 04:44
Fulong Chen,Yonglong LuoIncludes supplementary material: 作者: CRASS 時間: 2025-3-29 10:27 作者: Allodynia 時間: 2025-3-29 13:49
978-3-319-60752-8ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017作者: 眉毛 時間: 2025-3-29 18:45
Industrial IoT Technologies and Applications978-3-319-60753-5Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 不妥協(xié) 時間: 2025-3-29 20:29 作者: flammable 時間: 2025-3-30 01:05
Tracking Movement Target by Using WebGIS on Video Surveillance System,rget’s current location, current speed, current time and event’s attribute can be created. It also automatically collects the target’s relative video clips for improving the artificially monitoring work efficiency.作者: affect 時間: 2025-3-30 05:36 作者: Cryptic 時間: 2025-3-30 10:51 作者: 免費 時間: 2025-3-30 14:30 作者: Debrief 時間: 2025-3-30 18:53 作者: Aesthete 時間: 2025-3-30 23:42
Improved Reversible Data Hiding Scheme Based on AMBTC Compression Technique,and the absolute moment. Experimental results and analysis demonstrate that, the proposed method can achieve high capacity with low distortion. Besides, the proposed method is very simple and can be easily applied to real-time transmission due to its lower computational complexity.作者: 豐滿有漂亮 時間: 2025-3-31 04:14
Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC, the authentication information is reversibly embedded into the fluctuation region of prediction-error histogram (PEH), not the smooth region. Experimental results and analysis demonstrate that compared with previous schemes, the proposed scheme achieves better performances on computation complex, false tampering alarm and attraction to attackers.作者: 激怒 時間: 2025-3-31 06:45 作者: MOT 時間: 2025-3-31 12:58 作者: 暫時休息 時間: 2025-3-31 17:02 作者: nascent 時間: 2025-3-31 19:47
Bound Analysis for Anchor Selection in Cooperative Localization,criminable relative configuration whose nodes are randomly deployed onto a two-dimensional plane. For the relative configuration specified by the internode distance measurements, we introduce an error metric to evaluate the anchor selection performance, together with an upper bound that is independent of anchor selection.作者: carbohydrate 時間: 2025-3-31 23:56 作者: Emg827 時間: 2025-4-1 05:27
Optimization Bottleneck Analysis in GPU-Based Aiming at SAR Imaging,f SAR imaging operation is proposed according to the measured conditions of parallel granularity loss rate. Finally, optimization bottleneck analysis through FFT function and linear matrix interpolation scheme, and numerical simulations are made to demonstrate the effectiveness of the proposed scheme.作者: Platelet 時間: 2025-4-1 06:59
Intelligent Private Fitness System Based on ARM and Hybrid Internet of Things,ecifically, inventing a more scientific option of body building than the traditional gym to prevent incorrect ways of training and guide the individuals to do healthy exercises by utilizing visual personal training system and internet to design a distributed mobile application.作者: 砍伐 時間: 2025-4-1 12:59
Research and Application of Security and Privacy in Industrial Internet of Things Based on Fingerprdecoded out. Because the fingerprint information is unique, whether the success of the match can determine whether the operation is by itself, and then decides the next step, protects the user’s security and privacy in a great degree.