派博傳思國際中心

標題: Titlebook: Intelligent Transport System in Smart Cities; Aspects and Challeng Rodolfo I. Meneguette,Robson E. De Grande,Antonio Book 2018 Springer In [打印本頁]

作者: formation    時間: 2025-3-21 18:20
書目名稱Intelligent Transport System in Smart Cities影響因子(影響力)




書目名稱Intelligent Transport System in Smart Cities影響因子(影響力)學(xué)科排名




書目名稱Intelligent Transport System in Smart Cities網(wǎng)絡(luò)公開度




書目名稱Intelligent Transport System in Smart Cities網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Intelligent Transport System in Smart Cities被引頻次




書目名稱Intelligent Transport System in Smart Cities被引頻次學(xué)科排名




書目名稱Intelligent Transport System in Smart Cities年度引用




書目名稱Intelligent Transport System in Smart Cities年度引用學(xué)科排名




書目名稱Intelligent Transport System in Smart Cities讀者反饋




書目名稱Intelligent Transport System in Smart Cities讀者反饋學(xué)科排名





作者: 表否定    時間: 2025-3-21 21:45
Vehicular Networks,ing agent, which can help cities to control transportation and traffic better. This chapter describes the concept of smart connected vehicles, as well as the concept and features of a vehicular network.
作者: 凹槽    時間: 2025-3-22 02:33
Vehicle-to-Infrastructure Communication,ns further increase the overhead of control messages and the time of change from one AP to another, thereby affecting the network throughput and, consequently, application performance. This chapter describes techniques and architectures that manage the communication among APs and vehicles to allow h
作者: FUSE    時間: 2025-3-22 07:28

作者: glowing    時間: 2025-3-22 11:34

作者: 殖民地    時間: 2025-3-22 12:53
represent bits 0 and 1, respectively. These photons are used to transmit a series of random numbers, serving as cryptographic keys. The parties are connected via classical and quantum channels, with Alice generating a random stream of qubits transmitted through the quantum channel. By performing cl
作者: 浪蕩子    時間: 2025-3-22 19:42
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroscenarios, to evaluate the synergistic impact of deception technologies when coupled with other defensive measures and explore the suitable application scenarios of deception technology. The outcomes of multiple experiments conducted on the CyberBattleSim platform demonstrate that deception technolo
作者: Oligarchy    時間: 2025-3-22 22:43
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroto improve the efficiency of vulnerability detection in realistic scenarios, we introduced a file-level vulnerability identification mechanism on the basis of Optir-SBERT. The new model Optir-SBERT-F saved 45.36% of the detection time on the premise of a slight decrease in detection F value, which g
作者: wall-stress    時間: 2025-3-23 02:12

作者: 是限制    時間: 2025-3-23 08:33

作者: 間接    時間: 2025-3-23 09:58

作者: Obligatory    時間: 2025-3-23 17:37
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiro feature points are selected as the feature areas for hidden data embedding. The hidden data is scrambled by the knight parade method to obtain the corresponding binary coded sequence. Finally, the hidden data is embedded by matching and modifying the parity sequence of the two significant bits with
作者: FORGO    時間: 2025-3-23 18:19

作者: 浮雕    時間: 2025-3-24 00:34
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiro lines of inquiry for investigators are limited in identifying the offender’s real identity. There has been no study in literature into what investigators could obtain from these apps to identify another user if you only had one account, such as an account from a victim of a crime. Therefore, in thi
作者: Traumatic-Grief    時間: 2025-3-24 02:28

作者: 單挑    時間: 2025-3-24 10:01
Vehicular Cloud,prehensive description is also presented covering the existing techniques that require consideration in the context of resource management for VCs. Finally, we discuss the current issues and challenges that may ignite potential future work.
作者: synchronous    時間: 2025-3-24 14:39
Book 2018er of large cities. Therefore, it describes all concepts and technologies that address the challenges, bringing up a top-down approach, which begins from the vehicular network and central infrastructure to a distributed structure..For scientists and researchers, this book will bring together the sta
作者: 蜿蜒而流    時間: 2025-3-24 16:04
Autonomous Vehicles,andalone vehicle demands significant attention to the safety and reliability of the driving system. These concerns have led the automotive industry to invest heavily in embedded electronic systems to achieve comprehensive safety, comfort, stability, and performance.
作者: 租約    時間: 2025-3-24 21:21

作者: JAUNT    時間: 2025-3-25 00:34

作者: 的闡明    時間: 2025-3-25 06:34

作者: 高腳酒杯    時間: 2025-3-25 09:47

作者: progestin    時間: 2025-3-25 11:42
978-3-030-06641-3Springer International Publishing AG, part of Springer Nature 2018
作者: carbohydrate    時間: 2025-3-25 17:30
Intelligent Transport System in Smart Cities978-3-319-93332-0Series ISSN 2510-2575 Series E-ISSN 2510-2583
作者: Ancestor    時間: 2025-3-25 21:16

作者: 解開    時間: 2025-3-26 03:29

作者: 范圍廣    時間: 2025-3-26 06:08
focus on leveraging the laws of quantum mechanics to secure communication systems. An intriguing application within this field is the protection of information channels from unauthorized eavesdropping through the implementation of quantum cryptography. Quantum key distribution (QKD) represents the
作者: resilience    時間: 2025-3-26 09:04

作者: Ophthalmoscope    時間: 2025-3-26 14:46
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroility of existing cross-architecture detection technologies, we propose Optir-SBERT, which is the first technology to detect cross-architecture binary code similarity based on optimized LLVM IR. At the same time, we design a new data set BinaryIR, which is more diverse and provides a benchmark data
作者: Counteract    時間: 2025-3-26 16:46
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroility of existing cross-architecture detection technologies, we propose Optir-SBERT, which is the first technology to detect cross-architecture binary code similarity based on optimized LLVM IR. At the same time, we design a new data set BinaryIR, which is more diverse and provides a benchmark data
作者: intricacy    時間: 2025-3-27 01:00

作者: intercede    時間: 2025-3-27 02:47

作者: obsolete    時間: 2025-3-27 07:30
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroper proposes an information hiding algorithm based on multi-carrier fusion state partitioning of 3D models. Firstly, multiple three-dimensional vectors to be hidden are fused according to the radial distance between the center of each model and the inner tangential sphere, and then the inner tangent
作者: 供過于求    時間: 2025-3-27 10:48

作者: 別名    時間: 2025-3-27 15:41

作者: 付出    時間: 2025-3-27 20:45

作者: 弄污    時間: 2025-3-28 00:47
Vehicular Networks,rs. In general, the systems that have grown out of these advances are based on increasingly sophisticated sensors and actuators, which enable vehicles to detect signals in the environment and pass on information to drivers. For this, communication systems are necessary to allow interactions between
作者: Libido    時間: 2025-3-28 03:22

作者: neologism    時間: 2025-3-28 09:37

作者: 外形    時間: 2025-3-28 14:00
Vehicle-to-Vehicle Communication, vehicles to sense a particular region of a city or even monitor traffic conditions in a given urban area. These applications use the communication between vehicles to disseminate information and propagate data quickly and efficiently. Thus, the dissemination of data in a vehicle network becomes an
作者: Flatus    時間: 2025-3-28 15:26

作者: 悶熱    時間: 2025-3-28 22:27

作者: 薄荷醇    時間: 2025-3-28 23:27
Implementation and Testing Tools,ral technologies, where each technology has a set of limitations that need to be overcome. Also, the cost of evaluating such systems can be high because it involves allocating not only equipment but also the residents of a city. Assessments also need to consider the environmental conditions under wh
作者: 問到了燒瓶    時間: 2025-3-29 05:16

作者: Exploit    時間: 2025-3-29 08:12

作者: aggravate    時間: 2025-3-29 13:28

作者: 畢業(yè)典禮    時間: 2025-3-29 15:38
https://doi.org/10.1007/978-981-287-365-1Design Flood Estimation; Flood Control and Planning; Flood Disaster Management; Flood Forecasting; Flood




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
治多县| 六安市| 陈巴尔虎旗| 皋兰县| 车险| 攀枝花市| 蒙阴县| 昌图县| 丘北县| 那曲县| 安宁市| 宜丰县| 福清市| 深圳市| 凌海市| 揭阳市| 潜江市| 柳林县| 奎屯市| 北川| 梁平县| 阿拉善盟| 孙吴县| 宣化县| 易门县| 新密市| 鄂尔多斯市| 宜州市| 岐山县| 绵竹市| 韶关市| 离岛区| 祁门县| 康马县| 福建省| 华池县| 信丰县| 汾阳市| 吉林市| 宁强县| 余江县|