派博傳思國(guó)際中心

標(biāo)題: Titlebook: Sustainability in Energy and Buildings; Proceedings of the 4 Anne Hakansson,Mattias H?jer,Lakhmi C Jain Conference proceedings 2013 Springe [打印本頁(yè)]

作者: ISH    時(shí)間: 2025-3-21 19:44
書(shū)目名稱(chēng)Sustainability in Energy and Buildings影響因子(影響力)




書(shū)目名稱(chēng)Sustainability in Energy and Buildings影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Sustainability in Energy and Buildings網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Sustainability in Energy and Buildings網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Sustainability in Energy and Buildings被引頻次




書(shū)目名稱(chēng)Sustainability in Energy and Buildings被引頻次學(xué)科排名




書(shū)目名稱(chēng)Sustainability in Energy and Buildings年度引用




書(shū)目名稱(chēng)Sustainability in Energy and Buildings年度引用學(xué)科排名




書(shū)目名稱(chēng)Sustainability in Energy and Buildings讀者反饋




書(shū)目名稱(chēng)Sustainability in Energy and Buildings讀者反饋學(xué)科排名





作者: 喃喃訴苦    時(shí)間: 2025-3-21 23:59

作者: Flustered    時(shí)間: 2025-3-22 01:49
Sustainability in Energy and Buildings978-3-642-36645-1Series ISSN 2190-3018 Series E-ISSN 2190-3026
作者: 慷慨不好    時(shí)間: 2025-3-22 04:58

作者: Fulsome    時(shí)間: 2025-3-22 09:34
Smart Innovation, Systems and Technologieshttp://image.papertrans.cn/t/image/882873.jpg
作者: 內(nèi)疚    時(shí)間: 2025-3-22 13:20
https://doi.org/10.1007/978-3-642-36645-1Sustainability in Buildings; Sustainability in Energy
作者: Rebate    時(shí)間: 2025-3-22 18:08
Transformational Role of Lochiel Park Green Village, demonstrates how structural change at the regime level has come from the experience of actors at the niche level. The creation of the Lochiel Park Green Village has allowed many organisations to gain a more detailed and practical understanding of sustainable housing, and has given organisations the
作者: 錫箔紙    時(shí)間: 2025-3-22 23:09

作者: Indelible    時(shí)間: 2025-3-23 01:48
Using the Energy Signature Method to Estimate the Effective U-Value of Buildings,studied real-world houses. The results show that the increasingly strict U-value requirements of more recent building codes have resulted in lower U-values for newer buildings, and that static energy signature models can be used to estimate the effective U-value of buildings provided that the differ
作者: 抒情短詩(shī)    時(shí)間: 2025-3-23 07:47
Analysis of Structural Changes of the Load Profiles of the German Residential Sector due to Decentrpeaks. At the same time, electricity generation from photovoltaic sources can entirely compensate this additional demand by e-mobility, if decentralized electricity generation can be matched with the electricity demand via demand-side-management (DSM) or storage devices.
作者: 逗留    時(shí)間: 2025-3-23 09:42

作者: 牽索    時(shí)間: 2025-3-23 16:36

作者: 閑聊    時(shí)間: 2025-3-23 18:52
,Solar Collector Based on Heat Pipes for Building Fa?ades, not worse than of the other known ones made of heavier and more expensive copper with higher thermal conductance, or having entire rigid designs. Some variants of the developed solar collectors shaping of the assembled modules for building fa?ade or roof integration are proposed. Variously coloured
作者: 徹底明白    時(shí)間: 2025-3-23 22:20

作者: 矛盾心理    時(shí)間: 2025-3-24 02:39
Conference proceedings 2013hnology for renewable energy and sustainability in the built environment, optimization and modeling techniques, information and communication technology usage, behavior and practice, including applications.
作者: hallow    時(shí)間: 2025-3-24 08:25
2190-3018 bility in Energy and Buildings. Applicable areas include technology for renewable energy and sustainability in the built environment, optimization and modeling techniques, information and communication technology usage, behavior and practice, including applications.978-3-642-43491-4978-3-642-36645-1Series ISSN 2190-3018 Series E-ISSN 2190-3026
作者: 遺留之物    時(shí)間: 2025-3-24 14:11
y, concurrent care-of addresses reachability tests are used to verify mobile nodes’ reachability at the claimed care-of-addresses. In addition, this paper proposes the idea of segmenting the IPv6 address space into three parts: home addresses, care-of addresses, and stationary addresses to different
作者: 膽汁    時(shí)間: 2025-3-24 15:34

作者: 外科醫(yī)生    時(shí)間: 2025-3-24 21:07
Giuseppe M. Tina,Cristina Ventura compare these with the stationary case, demonstrating that the additional cost of reprogramming in a mobile WSN is less than 25% of that in a stationary WSN and the additional cost of re-clustering in a mobile WSN is less than 9% of that in a stationary WSN. Authentication has an insignificant cost
作者: Femine    時(shí)間: 2025-3-24 23:17

作者: 節(jié)省    時(shí)間: 2025-3-25 03:53

作者: 歌唱隊(duì)    時(shí)間: 2025-3-25 08:51

作者: Badger    時(shí)間: 2025-3-25 12:42
Hakan Hisarligils further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, comm
作者: AER    時(shí)間: 2025-3-25 19:52

作者: zonules    時(shí)間: 2025-3-25 20:40

作者: Presbycusis    時(shí)間: 2025-3-26 01:20

作者: PAEAN    時(shí)間: 2025-3-26 05:02
Ricardo Ramírez Villegas,Bj?rn Frostellng the vulnerability dataset, which was obtained by scanning the IP addresses of several enterprises in Hebei Province, China. The experimental results show that the approach of using network security vulnerabilities to assess network security status is feasible.
作者: fibula    時(shí)間: 2025-3-26 10:27

作者: Evacuate    時(shí)間: 2025-3-26 16:13
Anna Kramers protocols based on multi-key FHE, which supports multiple users and satisfies the semi-honest security model where cloud computing is outsourced. Our protocol requires no interaction from the data analysis and users during online secure classification. Performance evaluation demonstrates that our n
作者: 只有    時(shí)間: 2025-3-26 20:47

作者: jovial    時(shí)間: 2025-3-26 22:02

作者: 音樂(lè)會(huì)    時(shí)間: 2025-3-27 01:44
Floriberta Binarti,Agustinus D. Istiadji,Prasasto Satwiko,Priyo T. Iswanto. To seek a solution, we propose a privacy-aware and time-limited data access control (PATLDAC) scheme for secure UAV data sharing in Cloud-based IoD. Specifically, PATLDAC achieves user privacy preserving through partially hidden access policy which conceals the values of attributes while leaves th
作者: MOCK    時(shí)間: 2025-3-27 06:59
Abdolsalam Ebrahimpour,Yousef Karimi VahedPI call sequence as input for App visualization, and analyzes the classifier detection accuracy and detection time under each input characteristics. According to the experimental results, we found that using the API call sequence as the color visualization input feature can achieve the highest detec
作者: 不如樂(lè)死去    時(shí)間: 2025-3-27 12:22

作者: Schlemms-Canal    時(shí)間: 2025-3-27 16:48

作者: 不能強(qiáng)迫我    時(shí)間: 2025-3-27 19:47
Farivar Fazelpour,Majid Vafaeipour,Omid Rahbari,Mohammad H. Valizadehraction between users. This framework would help lower the level of the complexity of the entire system and reduce the cost of authentication by leveraging edge cache. We prove the security of the proposed authentication scheme and present performance analysis to show its efficiency.
作者: 財(cái)政    時(shí)間: 2025-3-28 01:40
its home link. The Mobile IPv6 protocol protects a home registration scheme against outsider attacks, but it fails to protect from attacks by legitimate mobile nodes behaving maliciously. A malicious mobile node could pretend to own a third-party’s address and luring its home agent to flood that vic
作者: 憤怒歷史    時(shí)間: 2025-3-28 02:34
Stephen Robert Berryible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and impl
作者: legacy    時(shí)間: 2025-3-28 09:16
Giuseppe M. Tina,Cristina Venturaible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and impl
作者: ingrate    時(shí)間: 2025-3-28 12:10
Dimitrios N. Kaziolas,Iordanis Zygomalas,Georgios E. Stavroulakis,Dimitrios Emmanouloudis,Charalamboible while delivering quality information to a base station. However, WSNs suffer from a wide range of attacks due to their limited processing and energy capabilities. Their resiliency, however, depends on fast recovery from such attacks being achieved. In recent work, the authors developed and impl
作者: 華而不實(shí)    時(shí)間: 2025-3-28 14:43

作者: nauseate    時(shí)間: 2025-3-28 21:33
Vahid Sabouri,Paula Femeníasnot only address the consumer electronics market but are also increasingly being used in a business and industry context. Thus, we see a demand for research developing software systems comprising mobile devices with special respect to security concerns. In this paper we want to address this demand f
作者: 悄悄移動(dòng)    時(shí)間: 2025-3-29 03:00

作者: 刻苦讀書(shū)    時(shí)間: 2025-3-29 05:15

作者: Precursor    時(shí)間: 2025-3-29 07:59
Stephen Lorimer,Marianne Jang,Korinna Thielenthe development of smart cities, smart transportation, and many other fields. In SIoT, the openness and mobility of objects are enhanced. However, this tends to lead to network data sparsity problems. By distinguishing explicit and implicit social relationships, we introduce an implicit social relat
作者: 來(lái)自于    時(shí)間: 2025-3-29 12:13

作者: Vo2-Max    時(shí)間: 2025-3-29 16:47

作者: Infusion    時(shí)間: 2025-3-29 23:46

作者: 憤怒事實(shí)    時(shí)間: 2025-3-30 03:34
Anna Kramersrting ML typically process and classification manufacturing data services via cloud-based technologies. In order to achieve secure and efficient data collection and application, we design, implement and evaluate a new system employing a SVM classifier model over encrypted data (SVMCM-ED) based on mu
作者: Latency    時(shí)間: 2025-3-30 06:43

作者: GULF    時(shí)間: 2025-3-30 09:36

作者: 浮夸    時(shí)間: 2025-3-30 12:51

作者: misshapen    時(shí)間: 2025-3-30 19:44
Abdolsalam Ebrahimpour,Yousef Karimi Vahed-classification of malicious App families is rarely studied. If we can visualize the Android malicious Apps as color images, we will get more features than using grayscale images. In this paper, a method of color visualization for Android Apps is proposed and implemented. Based on this, combined wit
作者: 思考而得    時(shí)間: 2025-3-30 22:23

作者: 使迷惑    時(shí)間: 2025-3-31 02:36
Arefeh Hesaraki,Sture Holmbergfects the security of cyberspace. How to detect anonymous network flow to position the anonymous users, is becoming to a research hotspot. However, with rapid development of the encryption and network technology, it is a nontrivial task to detect and position the anonymous user in such a complex net
作者: 不要不誠(chéng)實(shí)    時(shí)間: 2025-3-31 08:43
Farivar Fazelpour,Majid Vafaeipour,Omid Rahbari,Mohammad H. Valizadehal systems. While such systems present substantial security challenges for the host-centric communication with the growing trend of sensor data streams. Information Centric Networking (ICN) architecture suggests features exploitable in ICPS applications, reducing delivery latency and promoting quali
作者: scotoma    時(shí)間: 2025-3-31 10:08

作者: Arboreal    時(shí)間: 2025-3-31 14:16

作者: 全部    時(shí)間: 2025-3-31 20:10





歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
章丘市| 视频| 河北省| 武穴市| 荃湾区| 天气| 长岛县| 麻城市| 乌苏市| 林州市| 准格尔旗| 丁青县| 镇原县| 祁门县| 房产| 郎溪县| 六盘水市| 嫩江县| 西昌市| 大连市| 临沭县| 毕节市| 清苑县| 修水县| 沙坪坝区| 行唐县| 烟台市| 万盛区| 大冶市| 萨嘎县| 广平县| 海城市| 大城县| 新竹市| 区。| 淄博市| 新巴尔虎左旗| 乐陵市| 苏尼特右旗| 长垣县| 永嘉县|