標題: Titlebook: Intelligent Transport System in Smart Cities; Aspects and Challeng Rodolfo I. Meneguette,Robson E. De Grande,Antonio Book 2018 Springer In [打印本頁] 作者: formation 時間: 2025-3-21 18:20
書目名稱Intelligent Transport System in Smart Cities影響因子(影響力)
書目名稱Intelligent Transport System in Smart Cities影響因子(影響力)學(xué)科排名
書目名稱Intelligent Transport System in Smart Cities網(wǎng)絡(luò)公開度
書目名稱Intelligent Transport System in Smart Cities網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Intelligent Transport System in Smart Cities被引頻次
書目名稱Intelligent Transport System in Smart Cities被引頻次學(xué)科排名
書目名稱Intelligent Transport System in Smart Cities年度引用
書目名稱Intelligent Transport System in Smart Cities年度引用學(xué)科排名
書目名稱Intelligent Transport System in Smart Cities讀者反饋
書目名稱Intelligent Transport System in Smart Cities讀者反饋學(xué)科排名
作者: 表否定 時間: 2025-3-21 21:45
Vehicular Networks,ing agent, which can help cities to control transportation and traffic better. This chapter describes the concept of smart connected vehicles, as well as the concept and features of a vehicular network.作者: 凹槽 時間: 2025-3-22 02:33
Vehicle-to-Infrastructure Communication,ns further increase the overhead of control messages and the time of change from one AP to another, thereby affecting the network throughput and, consequently, application performance. This chapter describes techniques and architectures that manage the communication among APs and vehicles to allow h作者: FUSE 時間: 2025-3-22 07:28 作者: glowing 時間: 2025-3-22 11:34 作者: 殖民地 時間: 2025-3-22 12:53
represent bits 0 and 1, respectively. These photons are used to transmit a series of random numbers, serving as cryptographic keys. The parties are connected via classical and quantum channels, with Alice generating a random stream of qubits transmitted through the quantum channel. By performing cl作者: 浪蕩子 時間: 2025-3-22 19:42
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroscenarios, to evaluate the synergistic impact of deception technologies when coupled with other defensive measures and explore the suitable application scenarios of deception technology. The outcomes of multiple experiments conducted on the CyberBattleSim platform demonstrate that deception technolo作者: Oligarchy 時間: 2025-3-22 22:43
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroto improve the efficiency of vulnerability detection in realistic scenarios, we introduced a file-level vulnerability identification mechanism on the basis of Optir-SBERT. The new model Optir-SBERT-F saved 45.36% of the detection time on the premise of a slight decrease in detection F value, which g作者: wall-stress 時間: 2025-3-23 02:12 作者: 是限制 時間: 2025-3-23 08:33 作者: 間接 時間: 2025-3-23 09:58 作者: Obligatory 時間: 2025-3-23 17:37
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiro feature points are selected as the feature areas for hidden data embedding. The hidden data is scrambled by the knight parade method to obtain the corresponding binary coded sequence. Finally, the hidden data is embedded by matching and modifying the parity sequence of the two significant bits with作者: FORGO 時間: 2025-3-23 18:19 作者: 浮雕 時間: 2025-3-24 00:34
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiro lines of inquiry for investigators are limited in identifying the offender’s real identity. There has been no study in literature into what investigators could obtain from these apps to identify another user if you only had one account, such as an account from a victim of a crime. Therefore, in thi作者: Traumatic-Grief 時間: 2025-3-24 02:28 作者: 單挑 時間: 2025-3-24 10:01
Vehicular Cloud,prehensive description is also presented covering the existing techniques that require consideration in the context of resource management for VCs. Finally, we discuss the current issues and challenges that may ignite potential future work.作者: synchronous 時間: 2025-3-24 14:39
Book 2018er of large cities. Therefore, it describes all concepts and technologies that address the challenges, bringing up a top-down approach, which begins from the vehicular network and central infrastructure to a distributed structure..For scientists and researchers, this book will bring together the sta作者: 蜿蜒而流 時間: 2025-3-24 16:04
Autonomous Vehicles,andalone vehicle demands significant attention to the safety and reliability of the driving system. These concerns have led the automotive industry to invest heavily in embedded electronic systems to achieve comprehensive safety, comfort, stability, and performance.作者: 租約 時間: 2025-3-24 21:21 作者: JAUNT 時間: 2025-3-25 00:34 作者: 的闡明 時間: 2025-3-25 06:34 作者: 高腳酒杯 時間: 2025-3-25 09:47 作者: progestin 時間: 2025-3-25 11:42
978-3-030-06641-3Springer International Publishing AG, part of Springer Nature 2018作者: carbohydrate 時間: 2025-3-25 17:30
Intelligent Transport System in Smart Cities978-3-319-93332-0Series ISSN 2510-2575 Series E-ISSN 2510-2583 作者: Ancestor 時間: 2025-3-25 21:16 作者: 解開 時間: 2025-3-26 03:29 作者: 范圍廣 時間: 2025-3-26 06:08
focus on leveraging the laws of quantum mechanics to secure communication systems. An intriguing application within this field is the protection of information channels from unauthorized eavesdropping through the implementation of quantum cryptography. Quantum key distribution (QKD) represents the 作者: resilience 時間: 2025-3-26 09:04 作者: Ophthalmoscope 時間: 2025-3-26 14:46
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroility of existing cross-architecture detection technologies, we propose Optir-SBERT, which is the first technology to detect cross-architecture binary code similarity based on optimized LLVM IR. At the same time, we design a new data set BinaryIR, which is more diverse and provides a benchmark data 作者: Counteract 時間: 2025-3-26 16:46
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroility of existing cross-architecture detection technologies, we propose Optir-SBERT, which is the first technology to detect cross-architecture binary code similarity based on optimized LLVM IR. At the same time, we design a new data set BinaryIR, which is more diverse and provides a benchmark data 作者: intricacy 時間: 2025-3-27 01:00 作者: intercede 時間: 2025-3-27 02:47 作者: obsolete 時間: 2025-3-27 07:30
Rodolfo I. Meneguette,Robson E. De Grande,Antonio A. F. Loureiroper proposes an information hiding algorithm based on multi-carrier fusion state partitioning of 3D models. Firstly, multiple three-dimensional vectors to be hidden are fused according to the radial distance between the center of each model and the inner tangential sphere, and then the inner tangent作者: 供過于求 時間: 2025-3-27 10:48 作者: 別名 時間: 2025-3-27 15:41 作者: 付出 時間: 2025-3-27 20:45 作者: 弄污 時間: 2025-3-28 00:47
Vehicular Networks,rs. In general, the systems that have grown out of these advances are based on increasingly sophisticated sensors and actuators, which enable vehicles to detect signals in the environment and pass on information to drivers. For this, communication systems are necessary to allow interactions between 作者: Libido 時間: 2025-3-28 03:22 作者: neologism 時間: 2025-3-28 09:37 作者: 外形 時間: 2025-3-28 14:00
Vehicle-to-Vehicle Communication, vehicles to sense a particular region of a city or even monitor traffic conditions in a given urban area. These applications use the communication between vehicles to disseminate information and propagate data quickly and efficiently. Thus, the dissemination of data in a vehicle network becomes an 作者: Flatus 時間: 2025-3-28 15:26 作者: 悶熱 時間: 2025-3-28 22:27 作者: 薄荷醇 時間: 2025-3-28 23:27
Implementation and Testing Tools,ral technologies, where each technology has a set of limitations that need to be overcome. Also, the cost of evaluating such systems can be high because it involves allocating not only equipment but also the residents of a city. Assessments also need to consider the environmental conditions under wh作者: 問到了燒瓶 時間: 2025-3-29 05:16 作者: Exploit 時間: 2025-3-29 08:12 作者: aggravate 時間: 2025-3-29 13:28 作者: 畢業(yè)典禮 時間: 2025-3-29 15:38
https://doi.org/10.1007/978-981-287-365-1Design Flood Estimation; Flood Control and Planning; Flood Disaster Management; Flood Forecasting; Flood