標(biāo)題: Titlebook: Advances in Computer Science and Ubiquitous Computing; CSA-CUTE 2019 James J. Park,Simon James Fong,Yunsick Sung Conference proceedings 202 [打印本頁] 作者: Lampoon 時間: 2025-3-21 17:45
書目名稱Advances in Computer Science and Ubiquitous Computing影響因子(影響力)
書目名稱Advances in Computer Science and Ubiquitous Computing影響因子(影響力)學(xué)科排名
書目名稱Advances in Computer Science and Ubiquitous Computing網(wǎng)絡(luò)公開度
書目名稱Advances in Computer Science and Ubiquitous Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances in Computer Science and Ubiquitous Computing被引頻次
書目名稱Advances in Computer Science and Ubiquitous Computing被引頻次學(xué)科排名
書目名稱Advances in Computer Science and Ubiquitous Computing年度引用
書目名稱Advances in Computer Science and Ubiquitous Computing年度引用學(xué)科排名
書目名稱Advances in Computer Science and Ubiquitous Computing讀者反饋
書目名稱Advances in Computer Science and Ubiquitous Computing讀者反饋學(xué)科排名
作者: Heresy 時間: 2025-3-21 20:39
A Method for Nocturia Monitoring in Smart Home Using Decision Trees,N Association, which was founded as an independent organization in March 1988, has been taking over the activities of the earlier TRON Association, which was a division of Japan Electronic Industry Development Association (JEIDA). It has been expanding various operations to globalize the organizatio作者: 尖 時間: 2025-3-22 04:25
Efficient Data Aggregation for Human Activity Detection with Smart Home Sensor Network Using K-Meano be used in all areas of life, making life without computers seem almost impossible. This paper discusses, from a computer architecture point of view, the infrastructure that must be laid to avoid the problems to which a computerized society is liable, and to enable the society to grow in a more po作者: 講個故事逗他 時間: 2025-3-22 04:42 作者: 缺陷 時間: 2025-3-22 08:48 作者: 人類學(xué)家 時間: 2025-3-22 13:26
Purchase Predictive Design Using Skeleton Model and Purchase Record, wenn einfach keines da ist? Das ist eine von vielen Fragen, die Karin Lausch in diesem Buch beantwortet. Radikal ehrlich und mit modernen Ans?tzen beschreibt sie, warum wir dringend Vertrauen brauchen, wenn wir die Herausforderungen der zukünftigen Arbeitswelt meistern wollen. Dabei r?umt sie mit d作者: 裂隙 時間: 2025-3-22 17:55 作者: Headstrong 時間: 2025-3-22 23:58
Performance Analysis of Single-Pulse Modulation in Factory Environment Based on LiFi Standard,ührende Beispiele gesammelt worden, die nun in einem eigenen Band zusammengefa?t werden. Wiederum habe ich mich bemüht, auf trockene Systematik m?glichst zu verzichten und eine Erweiterung der Kenntnisse anhand nicht-trivialer Programme zu vermitteln. Der vorliegende Text enth?lt nicht einfach irgen作者: 和平 時間: 2025-3-23 04:54
Deep Learning-Based Experimentation for Predicting Secondary Structure of Amino Acid Sequence, the MTM (Mary Tyler Moore) stable in Los Angeles and to . (1980) in particular.. The context of the production of . was influenced by a range of factors bearing out the appropriateness of the ecological approach in this study to TV drama. One factor — as declared by Grant Tinker, financial head of 作者: 賠償 時間: 2025-3-23 07:46 作者: Carbon-Monoxide 時間: 2025-3-23 10:17 作者: 殖民地 時間: 2025-3-23 15:10 作者: 公理 時間: 2025-3-23 21:13 作者: 監(jiān)禁 時間: 2025-3-24 00:04
A Study on Evidences Stored in Android Smartphones,rm lijkt te zijn geworden, is dat minder het geval. Het begrip kortdurend is relatief en het zou in verband met . misschien passender zijn om te spreken van . dan van . termijn (2.1). Motieven voor de korte(re) duur zijn gebaseerd op onderzoek naar effecten van zowel kortdurende als langdurige en ni作者: linguistics 時間: 2025-3-24 04:00 作者: 草本植物 時間: 2025-3-24 10:32 作者: Multiple 時間: 2025-3-24 12:10 作者: 銼屑 時間: 2025-3-24 16:34
Indoor Positioning System Using Pyramidal Beacon in Mobile Augmented Reality,t network graph on screen..After that, we implemented a hypermedia editor which can treat text, graphics, clip video and buttons as objects and set interactive synchronization between them..As a result, it achieves programless and “trial and error” hypermedia editing.作者: 繁忙 時間: 2025-3-24 22:30
A Study on Vulnerabilities of Linux Password and Countermeasures, internationally recognized as Brazilian. This absence leads the series to resort to deploying examples extracted from the country’s history to ensure that . offers viewers a legitimately Brazilian experience.作者: 不可思議 時間: 2025-3-25 02:35
Analysis of Learning Model for Improvement of Software Education in Korea,en vonstatten. Dieser Kommentar vermittelt dem Leser die n?tige Orientierung, um den TV?D in der Praxis anzuwenden. Er will den Weg des ?ffentlichen Dienstes zurück zum Arbeitsrecht in wissenschaftlich fundierter Weise – mit der notwendigen kritischen Distanz978-3-540-47858-4作者: Cleave 時間: 2025-3-25 06:34
PCA and K-means Based Genome Analysis for Hymenobacter sp. PAMC26628,d a number. The same codes are reported in the Main Data-Table under the TABLE record (see Chapter 5.2.). In this way, when the reader is interested in a particular structure type, he can get more information on related structures by consulting the crystal chemical tables.作者: Outmoded 時間: 2025-3-25 09:46
On Invariance of Concept Stability for Attribute Reduction in Concept Lattice,r technische Problemst- lungen für Einsteiger und Fortgeschrittene. Die Themen reichen von der Installation über die Vorstellung des Backends, die Einrichtung des Systems, Template-Erstellung, Tipps für Redakteure bis zu komplexen Them978-3-8349-0639-7978-3-8349-9211-6作者: Hot-Flash 時間: 2025-3-25 13:51 作者: FORGO 時間: 2025-3-25 18:44 作者: 使服水土 時間: 2025-3-25 23:32 作者: 樂器演奏者 時間: 2025-3-26 01:21
Front Matterctivities was scheduled for the 1990s. However, I am happy to note that the enthusiasm expressed by individuals and organizations both within and outside Japan has permitted acceleration of the research and development activities. It is to be hoped that the presentations of the Third TRON Project Symposium wi978-4-431-68071-0978-4-431-68069-7作者: 集中營 時間: 2025-3-26 04:25
A Method for Nocturia Monitoring in Smart Home Using Decision Trees,cope and great diversity. As it includes the open architecture concept and as the TRON machine should be able to work with various foreign languages, the TRON is targetted to be used internationally. In order for us to create a complete TRON world, at though there are several TRON products already o作者: 吞吞吐吐 時間: 2025-3-26 11:28 作者: Tremor 時間: 2025-3-26 15:36 作者: Mundane 時間: 2025-3-26 17:29
Intelligent Digital Signage Using Deep Learning Based Recommendation System in Edge Environment,simulation results are processed by means of a cost-benefit analysis which identified the market architectures providing the highest economic benefits to the system and the main factors that influence the profitability of one TSO-DSO coordination scheme among the others.作者: delta-waves 時間: 2025-3-26 21:20
Performance Analysis of Single-Pulse Modulation in Factory Environment Based on LiFi Standard,TURBO; ein ausfiihrliches Lehrbuch wird dadurch aber nicht ersetzt. Die Beispiele sind einigerma?en nach Themenkreisen geordnet, innerhalb eines Kapitels nach dem Schwierigkeitsgrad. Die jeweils mitgelieferten Erl?uterungen und Hinweise zum Umfeld sollten ausreichen, die vorgestellten Programme zu verstehen, 978-3-519-02992-2978-3-322-87185-5作者: 生命層 時間: 2025-3-27 04:37
Deep Learning-Based Experimentation for Predicting Secondary Structure of Amino Acid Sequence,elopments arising from the ‘beat generation’ of the 1960s, the civil rights movement, and the feminist movement of the early 1970s, these influences led to a perceived need for sophisticated adult programming which could nevertheless hold the attention of an audience whose powers of concentration were diminished.作者: tendinitis 時間: 2025-3-27 05:47 作者: DOSE 時間: 2025-3-27 12:39
Real-Time Subscriber Session Management on 5G NSA Wireless Network Systems,978-3-662-10641-9作者: 品牌 時間: 2025-3-27 17:20
Divide the FCA Network Graph into the Various Community Based on the ,-Clique Methods,作者: consent 時間: 2025-3-27 18:15
An Efficient Micro-Service Placement Scheme Based on Fuzzy System for Edge-Enabled Digital Signage 作者: 果仁 時間: 2025-3-27 22:55 作者: RUPT 時間: 2025-3-28 04:16
1876-1100 tional methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science and other disciplines related to ubiquitous computing..978-981-15-9345-1978-981-15-9343-7Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 別名 時間: 2025-3-28 06:31
The CAD*l processors for IBM’s Catiabeacon, and the management server maps the beacon to the coordinates of the room.?The positioning is performed by recognizing the pyramidal beacon through the model learned by deep learning in the mobile device, extracting 6 degrees of freedom relative to the pyramidal beacon recognized through the 作者: 我不明白 時間: 2025-3-28 13:54 作者: 暫停,間歇 時間: 2025-3-28 15:04 作者: COLIC 時間: 2025-3-28 22:04 作者: 小說 時間: 2025-3-29 00:27 作者: CLAIM 時間: 2025-3-29 06:22 作者: Enthralling 時間: 2025-3-29 10:41
Generation of Solid Multiresolution Models is able to discover pattern in sequence and identify gene position in the genome, without prior known homology or gene annotation. Additionally, when the 64-dimensional space of codon probability distribution is applied for the first two and three principle components, a seven-cluster structure has resulted.作者: 粗魯性質(zhì) 時間: 2025-3-29 15:19 作者: FISC 時間: 2025-3-29 18:10 作者: 小爭吵 時間: 2025-3-29 21:38 作者: habile 時間: 2025-3-30 02:59
1876-1100 s in ubiquitous computing and information technologies.DescrThis book presents the combined proceedings of the 11th International Conference on Computer Science and its Applications (CSA 2019) and the 14th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 20作者: hysterectomy 時間: 2025-3-30 04:45
CAD Geometry Data Exchange Using STEPon YOLO. The proposed method is designed and implemented to recognize vehicles using CNN based on YOLO. The proposed method has the advantage of recognizing the vehicle number and the type of vehicle at the same time, and it can be applied to applications such as the prevention of various crimes using vehicles.作者: PRO 時間: 2025-3-30 11:38 作者: kidney 時間: 2025-3-30 16:08
https://doi.org/10.1007/978-1-4615-5413-4of selected goods. Finally, the most suitable advertisement is selected by using the predicted purchase probability of the community. The proposed system does not communicate with the server. Therefore, decides the advertisement with the learned model on the edge. This also applies to digital signage that requires immediate response to many users.作者: FUSC 時間: 2025-3-30 19:41 作者: RODE 時間: 2025-3-30 21:46 作者: objection 時間: 2025-3-31 02:55
Monica Bordegoni,Franco De Angelismulti-metric by combining decision method according to user requirements. In order to satisfy the user’s requirement based on service, we propose an efficient service placement scheme based on Fuzzy-AHP, Finally, we prove the performance of the proposed scheme by using different placement schemes.作者: 間諜活動 時間: 2025-3-31 07:22
Die Zukunft des Architektur-CAD,ess power consumption, lower latency that respects the user’s privacy concern. Therefore, we study the extent to which these two technologies can be applied in the real world for faster convergence without compromising user’s security.作者: nullify 時間: 2025-3-31 12:23
James J. Park,Simon James Fong,Yunsick SungOffers a snapshot of the state of the art in ubiquitous computing technologies and their applications.Covers some of the most recent advances in ubiquitous computing and information technologies.Descr作者: BOLT 時間: 2025-3-31 13:30 作者: ENNUI 時間: 2025-3-31 20:32 作者: hermetic 時間: 2025-4-1 01:28 作者: Tracheotomy 時間: 2025-4-1 03:05
https://doi.org/10.1007/978-3-642-60718-9Linux is a representative operating system running on many servers and password is the primitive authentication way. In this paper, we analyze the vulnerabilities of Linux password file management and show that it is possible to use spoofed attack using system administrator privileges. We also suggests countermeasures to prevent this.作者: 否決 時間: 2025-4-1 06:03
https://doi.org/10.1007/978-3-642-60718-95G mobile network systems are known for their speed, security and durability. Speed and durability are rely on to security. To be able to realize these three core points, performing session managing in real-time is very important. In this paper we look in depth and discuss to achieve high performance session management on 5G NSA mobile networks.作者: 脆弱吧 時間: 2025-4-1 12:16 作者: Pandemic 時間: 2025-4-1 14:40
Networks for communicating CAD informationaper, we presented the method for nocturia monitoring with number of times of urination during bedtime and duration time of sleep before wake to urinate. The proposed method is the use of a few required sensors and decision trees. This method can be used for a follow-up to the symptom of a person with nocturia.