派博傳思國際中心

標(biāo)題: Titlebook: Intelligent Transport Systems; 5th EAI Internationa Ana Lúcia Martins,Joao C Ferreira,Alexander Kocian Conference proceedings 2022 ICST Ins [打印本頁]

作者: vitamin-D    時間: 2025-3-21 17:52
書目名稱Intelligent Transport Systems影響因子(影響力)




書目名稱Intelligent Transport Systems影響因子(影響力)學(xué)科排名




書目名稱Intelligent Transport Systems網(wǎng)絡(luò)公開度




書目名稱Intelligent Transport Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Intelligent Transport Systems被引頻次




書目名稱Intelligent Transport Systems被引頻次學(xué)科排名




書目名稱Intelligent Transport Systems年度引用




書目名稱Intelligent Transport Systems年度引用學(xué)科排名




書目名稱Intelligent Transport Systems讀者反饋




書目名稱Intelligent Transport Systems讀者反饋學(xué)科排名





作者: Immunoglobulin    時間: 2025-3-21 22:30
Real-Time Traffic Monitoring and?Status Detection with?a?Multi-vehicle Tracking Systemeviewing over these videos, a person may decide to change the travel route from the one he or she initially plans to take. To let road users make decisions better and faster, it would be desirable to design an automated software, being a component of an Intelligent Transport System, which offers pro
作者: 玉米棒子    時間: 2025-3-22 02:06

作者: 粗語    時間: 2025-3-22 07:52
An Unsupervised Approach for Driving Behavior Analysis of Professional Truck Drivers of the vehicle itself. However, these data have an enormous value as they can be collected and analyzed to better understand additional aspects of the driving experience, such as classifying the driver’s behavior and driving style..In this paper, we present a simple yet novel unsupervised methodolo
作者: LIMIT    時間: 2025-3-22 11:09
Wine Traceability and Counterfeit Reduction: Blockchain-Based Application for a Wine Supply Chaingitimacy and safety to consume. In this paper, we develop an approach towards wine traceability, with main objectives on combating counterfeit and increasing brand reputation by assuring the origin of wine to the final consumer. We build an architecture for a blockchain-based system to track and rec
作者: 壕溝    時間: 2025-3-22 12:53
Open Market for Reusing Auto Parts with Blockchainin, among others..These advances have allowed to solve many of the problems we face nowadays, such as today, for example, they have been used recently in the fight against Covid-19 which has affected and continues to affect people and organizations around the world..Taking advantage of the advanceme
作者: 退出可食用    時間: 2025-3-22 18:14
Enabling Citizen-Centric ITS Services Through Blockchain and Human Incentivesigate traffic, pollution and degradation of the quality of life. In this paper, we propose a system that attempts to influence drivers to follow a certain route by means of an incentive. The proposals are put forward based on predefined urban traffic network indicators in need of optimization, such
作者: 食道    時間: 2025-3-23 01:10

作者: 星球的光亮度    時間: 2025-3-23 03:45
Data-Driven Disaster Management in a Smart Cityties. The advances in IT and Big Data analysis represent an opportunity for the development of resilient environments once the application of analytical methods allows extracting information from a significant amount of data, optimizing the decision-making processes. This research aims to apply the
作者: 暖昧關(guān)系    時間: 2025-3-23 09:34

作者: evasive    時間: 2025-3-23 13:19

作者: 和平    時間: 2025-3-23 13:51
Improved Bus Service on Ten Times Less EnergyMilliPod picks up passengers without stopping and uses an order of magnitude less energy than the transit buses it replaces. To reduce congestion, the pods physically couple to each other, but are all individually powered and steered creating an agile all-wheel drive vehicle..The MilliPod is designe
作者: PANIC    時間: 2025-3-23 20:43

作者: 無法治愈    時間: 2025-3-24 02:05

作者: 手銬    時間: 2025-3-24 03:07

作者: 北京人起源    時間: 2025-3-24 07:16

作者: 悶熱    時間: 2025-3-24 13:11

作者: Abutment    時間: 2025-3-24 17:55

作者: 帳單    時間: 2025-3-24 19:59
Lu Wang,Chan Tong Lam,K. L. Eddie Law,Benjamin Ng,Wei Ke,Marcus Im app’ due to its various functions, and they particularly enjoy the payment feature for both personal and business purposes. Criminals abused the platforms to facilitate illegal activities such as bank fraud. Previous research on WeChat focused mostly on the messaging function of the WeChat app, but
作者: 熱情的我    時間: 2025-3-25 01:01
Louis Calvin Touko Tcheumadjeu,Katrin Stuerz-Mutalibow,Janis Hoeing,Dennis Harmann,Julian Glaab,Robeent of accurate digital forensic techniques which require not only the confirmation of the data integrity but also the verification of its origin source. To this end, machine and/or deep learning techniques are widely being employed within forensics tools. Nevertheless, while these techniques became
作者: Peristalsis    時間: 2025-3-25 05:34

作者: anticipate    時間: 2025-3-25 10:53

作者: 無意    時間: 2025-3-25 15:00
Ulpan Tokkozhina,Joao C Ferreira,Ana Lúcia Martins networks (SNs). One noticeable behaviour is taking pictures using smartphone cameras and sharing them with friends through online social platforms. On the downside, this has contributed to the growth of the cyber crime through SNs. In this paper, we present a method to extract the characteristic fi
作者: dandruff    時間: 2025-3-25 16:29

作者: CRAB    時間: 2025-3-25 23:25

作者: palpitate    時間: 2025-3-26 01:51

作者: muster    時間: 2025-3-26 05:21
Sandra P. Gon?alves,Joao C Ferreira,Ana Madureiras to check the awareness level and knowledge gap among email users with respect to the actions that need to be taken in case of scam email victimization, and awareness regarding common practices that are used in identifying scam email and types of online scam media. Most common actions mentioned by
作者: 驕傲    時間: 2025-3-26 08:48
ng attack, choosing an appropriate classifier for learning relevant information from speech feature is an important issue. In this paper, a GRU-SVM model for synthetic speech detection is proposed. The Gate Recurrent Unit (GRU) neural network is considered to learn the feature. The GRU can overcome
作者: omnibus    時間: 2025-3-26 16:13
Carlos Carvalho,Ricardo Pessoa,Rui Josées such as median filtering to hide the obvious traces of these tampered images. Therefore, median filtering detection is one of the key technologies in the field of image forensics. Recently, with the rapid development of the deep learning, more and more researchers have proposed many image median
作者: ALLEY    時間: 2025-3-26 19:11
Alexander Fazari,Maurizio Arnone,Cristiana Botta,Brunella Caroleo,Stefano Pensa are commonly used to cover fingerprints of falsification that does alter image content such as copy-move and splicing. Therefore image forensics researchers are interested in detecting these basic operations. Some existing detectors track local inconsistencies in statistics of the image. However th
作者: 討好女人    時間: 2025-3-27 00:58

作者: 講個故事逗他    時間: 2025-3-27 01:29
Rui Rodrigues,Vitória Albuquerque,Joao C Ferreira,Miguel Sales Dias are commonly used to cover fingerprints of falsification that does alter image content such as copy-move and splicing. Therefore image forensics researchers are interested in detecting these basic operations. Some existing detectors track local inconsistencies in statistics of the image. However th
作者: 遺傳學(xué)    時間: 2025-3-27 06:29
Joel Ribeiro,Jorge Tavares,Tania Fontesyou find from the Internet all other pictures taken from the same camera? Forensics professionals all over the world are increasingly encountering such questions. Given the ease by which digital images can be created, altered, and manipulated with no obvious traces, digital image forensics has emerg
作者: 可憎    時間: 2025-3-27 10:22
Jun Wang,Ilsu Kim,Suleman B. Rana machine translation is widespread across various domains. Existing plagiarism detection models often treat different features uniformly and overlook the significance of disparities within high-dimensional features. Therefore, this paper proposes a novel plagiarism detection model towards multi-turn
作者: 嚴(yán)厲批評    時間: 2025-3-27 14:52

作者: FOLD    時間: 2025-3-27 20:36
1867-8211 ook were selected from 31 submissions and are organized in three thematic sessions on mobility; blockchain and disaster management; and data analytics.978-3-030-97602-6978-3-030-97603-3Series ISSN 1867-8211 Series E-ISSN 1867-822X
作者: 政府    時間: 2025-3-28 00:39

作者: Gum-Disease    時間: 2025-3-28 05:04

作者: 極肥胖    時間: 2025-3-28 07:08
EV Battery Degradation: A Data Mining Approach This paper seeks to answer this question using a data science methodology. The results allowed us to conclude that all other factors had a marginal effect on the vehicles’ autonomy decrease except for the car year. The biggest obstacle encountered in adopting electric vehicles was the insufficient coverage of the charging stations network.
作者: Communicate    時間: 2025-3-28 11:25
1867-8211 November 2021. Due to COVID-19 pandemic the conference was held virtually.. With the globalization of trade and transportation and the consequent multi-modal solutions used, additional challenges are faced by organizations and countries. Intelligent Transport Systems make transport safer, more effi
作者: GUISE    時間: 2025-3-28 17:36
Conference proceedings 20222021. Due to COVID-19 pandemic the conference was held virtually.. With the globalization of trade and transportation and the consequent multi-modal solutions used, additional challenges are faced by organizations and countries. Intelligent Transport Systems make transport safer, more efficient, and
作者: 打包    時間: 2025-3-28 21:14

作者: Essential    時間: 2025-3-29 01:55
Wine Traceability and Counterfeit Reduction: Blockchain-Based Application for a Wine Supply Chainis making a decision to purchase the wine. This application shows the enormous potential of blockchain technology to reduce counterfeiting levels and assure the final consumer with the origin of the wine, potentially avoiding health risks that counterfeit wine can cause, and thus increasing the wine brand reputation.
作者: harbinger    時間: 2025-3-29 05:19
Enabling Citizen-Centric ITS Services Through Blockchain and Human Incentivesrs can lead to the optimization of such indicators. The accumulated incentives are registered in a Blockchain network in order to ensure the unchanging and reliable registration of route proposals accepted by drivers. Additionally, we describe an application developed as a proof of concept and as a basis for future work.
作者: Reverie    時間: 2025-3-29 09:27

作者: 彎曲的人    時間: 2025-3-29 13:02

作者: judicial    時間: 2025-3-29 17:58

作者: 盟軍    時間: 2025-3-29 21:56

作者: 流出    時間: 2025-3-30 00:52

作者: 細(xì)胞    時間: 2025-3-30 05:10
Louis Calvin Touko Tcheumadjeu,Katrin Stuerz-Mutalibow,Janis Hoeing,Dennis Harmann,Julian Glaab,Robe. Our experimental results demonstrate that the proposed attack can be implemented to successfully compromise the existing forensic methods with 100% probability for non-flat videos while producing the high quality content. The results indicate the need for attack-prone video source camera identific
作者: INCUR    時間: 2025-3-30 10:22
Sebastiano Milardo,Punit Rathore,Paolo Santi,Richard Buteau,Carlo Rattif awareness was found among the users with respect to the actions that need to be taken in case of financial scam victimization. In conclusion, the researchers suggest a need for formal education regarding email scam awareness and best email usage practices.
作者: 殺死    時間: 2025-3-30 16:13

作者: 愛哭    時間: 2025-3-30 20:06

作者: 排他    時間: 2025-3-30 21:15

作者: commute    時間: 2025-3-31 03:08

作者: Osteoarthritis    時間: 2025-3-31 05:07





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
西峡县| 天台县| 柞水县| 上高县| 高密市| 庆安县| 轮台县| 米脂县| 厦门市| 海淀区| 崇信县| 弋阳县| 新乐市| 晋江市| 新化县| 成安县| 道孚县| 科技| 阳新县| 邳州市| 民县| 万年县| 开封县| 吉隆县| 抚顺市| 永州市| 佛山市| 安康市| 三亚市| 松溪县| 新安县| 太仓市| 沁水县| 封丘县| 来安县| 闻喜县| 珲春市| 辽中县| 林口县| 鄂尔多斯市| 佛坪县|