標題: Titlebook: Advances in Wireless Communications and Applications; Wireless Technology: Lakhmi C. Jain,Roumen Kountchev,Roumiana Kountchev Conference pr [打印本頁] 作者: FROM 時間: 2025-3-21 16:49
書目名稱Advances in Wireless Communications and Applications影響因子(影響力)
書目名稱Advances in Wireless Communications and Applications影響因子(影響力)學科排名
書目名稱Advances in Wireless Communications and Applications網(wǎng)絡公開度
書目名稱Advances in Wireless Communications and Applications網(wǎng)絡公開度學科排名
書目名稱Advances in Wireless Communications and Applications被引頻次
書目名稱Advances in Wireless Communications and Applications被引頻次學科排名
書目名稱Advances in Wireless Communications and Applications年度引用
書目名稱Advances in Wireless Communications and Applications年度引用學科排名
書目名稱Advances in Wireless Communications and Applications讀者反饋
書目名稱Advances in Wireless Communications and Applications讀者反饋學科排名
作者: aquatic 時間: 2025-3-21 20:44 作者: Chronic 時間: 2025-3-22 02:41 作者: CUR 時間: 2025-3-22 07:36 作者: 向外供接觸 時間: 2025-3-22 10:04 作者: FILTH 時間: 2025-3-22 16:37 作者: 阻塞 時間: 2025-3-22 19:45
Research on Multi-dimensional Sensitivity Economic Evaluation Method of Digital Technology in Powerdimensional sensitivity of power grid enterprises, this paper proposes a digital technical and economic analysis model for power business needs and a digital benefit technical and economic evaluation method based on multi-dimensional index sensitivity analysis, which can meet the requirements of saf作者: 我就不公正 時間: 2025-3-23 01:04
Heterogeneous Data Fusion Method for Abnormal Network Traffic,ects of life. At the same time, many new security issues have also been raised. Attackers can use loopholes in the system to steal users’ personal privacy information and account information. Attackers can also carry out malicious attacks, causing the background system to be paralyzed and causing ec作者: 鑒賞家 時間: 2025-3-23 04:10
Contactless Access Control System Based on Voiceprint Recognition,signed and has been tested for many times. This system takes the speaker’s voiceprint feature as the “key”, and it contains an Android-based voiceprint recognition APP—which is related to voiceprint registration, voiceprint verification, model addition or deletion and other functions—and a self-desi作者: PANIC 時間: 2025-3-23 06:21
Establishment of Vulnerability Sample Database in Network Attack Environment,k to perform malicious actions. This paper relies on CVE, Exploit Database (vulnerability database website) and other platforms to automatically grab information on the vulnerability platform through Python crawlers and scripts to obtain all vulnerability information with POC. At the same time, we t作者: 碎石頭 時間: 2025-3-23 11:40
An Essential Vigilance Analysis on Security of Web Applications,re often referred to as the protection project. A mechanism for establishing security cooperation would be: When providing services through the internet, this is what you‘d use. According to a recent study, millions of online services and applications produced using digital technology would be utili作者: ordain 時間: 2025-3-23 15:36 作者: Mingle 時間: 2025-3-23 20:03
Research on the Construction of University Data Platform Based on Hybrid Architecture, of colleges and universities in dealing with massive unstructured and semi-structured data and various types of structured data integration and fusion analysis. Based on this, this paper uses MPP and Hadoop to build university data platform, which can not only meet the needs of deep analysis, compl作者: 制定法律 時間: 2025-3-24 00:17
Pingan Campus Intelligent Security Monitoring System Design,ituation, it is necessary to establish and perfect the safety and civilized school safety monitoring network system. How to solve the specific situation of campus security and build to meet the needs of the school security monitoring network system prevention function and reliability is an urgent ta作者: 愉快嗎 時間: 2025-3-24 04:36
An Intelligent Patrol System Based on Edge Data Center Station,er stations, the centralized management of brainy patrols of plant stations in various industry scenarios can be realized. The online intelligent patrol level of each plant and station is improved, and the work pressure of grassroots operation and maintenance personnel is reduced. This kind of syste作者: SOBER 時間: 2025-3-24 08:39 作者: anatomical 時間: 2025-3-24 13:12 作者: 伴隨而來 時間: 2025-3-24 16:24 作者: Fibrinogen 時間: 2025-3-24 22:35
A CNN-Based Information Network Attack Detection Algorithm,attackers. However, the above methods face many challenges when applied to smart grids. This paper is based on the vulnerability sample data set, and studies how to extract features for abstract modeling. The first is to extract the characteristics of the vulnerability samples by transforming the mo作者: 過度 時間: 2025-3-24 23:19
Advances in Wireless Communications and ApplicationsWireless Technology:作者: 正論 時間: 2025-3-25 06:22 作者: GUEER 時間: 2025-3-25 10:53 作者: Offbeat 時間: 2025-3-25 12:16
A Method for Optimizing Communication Network Topology Based on Genetic Algorithm,timization model and the use of genetic algorithm to solve the model. After the network topology is optimized, the network degree distribution is changed, in which the number of low-degree nodes increases, while the number of high-degree nodes decreases. The reliability of the communication network 作者: Thymus 時間: 2025-3-25 19:26 作者: 強制性 時間: 2025-3-25 23:50 作者: 哺乳動物 時間: 2025-3-26 00:36
Contactless Access Control System Based on Voiceprint Recognition,, the similarity between the speaker’s voiceprint information and the corresponding model is more than 97%, and the negative rate of recognition was 0%, with the average recognition time less than 0.4?s.作者: clarify 時間: 2025-3-26 05:20 作者: 強制性 時間: 2025-3-26 10:14 作者: 破譯密碼 時間: 2025-3-26 14:20
Blagica Sekovska,Gjoko Bunevskiethod corresponded to the performance of the vehicles in the test. The results show that the improved evaluation index system is more comprehensive and can determine whether the vehicle has the intelligent obstacle avoidance function and evaluate its performance.作者: 聽寫 時間: 2025-3-26 17:00 作者: Ruptured-Disk 時間: 2025-3-26 21:19
Abele Kuipers,Matthew Gorton,Burkhard Schaertimization model and the use of genetic algorithm to solve the model. After the network topology is optimized, the network degree distribution is changed, in which the number of low-degree nodes increases, while the number of high-degree nodes decreases. The reliability of the communication network 作者: fallible 時間: 2025-3-27 03:59 作者: GEM 時間: 2025-3-27 07:50 作者: jabber 時間: 2025-3-27 12:00 作者: 打擊 時間: 2025-3-27 14:30 作者: hazard 時間: 2025-3-27 18:23
https://doi.org/10.1057/9780230005648 improve the quality of service, build a communication network with a hierarchical control architecture based on the intelligent decision-making needs of virtual power plants, and establish a cloud-side-end integrated digital twin model, thereby integrating the digital twin The technology is highly 作者: 包裹 時間: 2025-3-27 21:57
Conference proceedings 2022inan University, China. The book will focus on the presentation of the newest trends and achievements in the development of intelligent algorithms and network technologies in smart communications, with application in underwater communications, IoT-based marine surface communications as well as state作者: NATAL 時間: 2025-3-28 03:30 作者: LUMEN 時間: 2025-3-28 09:36 作者: 出汗 時間: 2025-3-28 12:01 作者: 發(fā)源 時間: 2025-3-28 15:09 作者: Hemiplegia 時間: 2025-3-28 19:21 作者: 考博 時間: 2025-3-29 02:29 作者: MELON 時間: 2025-3-29 05:37
https://doi.org/10.1057/978-1-137-58165-5lnerabilities to form a prototype of the automatic detection principle of vulnerabilities. Finally, through the above two steps, the discovery ability and analysis efficiency of software high-threat security vulnerabilities are improved.作者: 鞭子 時間: 2025-3-29 09:50 作者: Entrancing 時間: 2025-3-29 14:17 作者: MUMP 時間: 2025-3-29 17:08
Laurens G. Debo,Senthil K. Veeraraghavanovating the production mode of power grid enterprises and the construction of energy Internet service system has important practical significance to improve the economic benefits of power grid enterprises, so as to provide an economic evaluation method for realizing carbon peak.作者: Facet-Joints 時間: 2025-3-29 21:07
Yossi Aviv,Yuri Levin,Mikhail Nediakcation flow anomaly detection and grid data credibility evaluation method is proposed. Finally, how to guide the power system state estimation through the credibility of the measurement data is discussed in detail to realize the detection of data attacks in the power Internet of Things network.作者: Permanent 時間: 2025-3-30 00:08
Equipment Terminals Optimization Control Method for Sensing Terminal of Power IoT Platform,mental simulation, the method can effectively optimize the scheduling of the imperial platform sensation equipment, reduce power energy loss, and ensure business service needs. It guarantees source-end data integration and business online in real time to improve safe grid operation, enterprise lean management and customer quality service.作者: Hangar 時間: 2025-3-30 07:40
Research on Multi-dimensional Sensitivity Economic Evaluation Method of Digital Technology in Powerovating the production mode of power grid enterprises and the construction of energy Internet service system has important practical significance to improve the economic benefits of power grid enterprises, so as to provide an economic evaluation method for realizing carbon peak.作者: 系列 時間: 2025-3-30 10:42 作者: CRANK 時間: 2025-3-30 15:34 作者: Fatten 時間: 2025-3-30 19:13 作者: Lucubrate 時間: 2025-3-30 20:51
Pingan Campus Intelligent Security Monitoring System Design,saving, and consider the maintenance and operation factors comprehensively, so as to leave more space for future development, expansion, transformation and other factors. Therefore, the system design content framework is complete, the design scheme is scientific and reasonable, with operability.作者: overreach 時間: 2025-3-31 02:39 作者: 動物 時間: 2025-3-31 05:07
A CNN-Based Information Network Attack Detection Algorithm,lnerabilities to form a prototype of the automatic detection principle of vulnerabilities. Finally, through the above two steps, the discovery ability and analysis efficiency of software high-threat security vulnerabilities are improved.作者: 使增至最大 時間: 2025-3-31 09:32 作者: Fecal-Impaction 時間: 2025-3-31 13:39
https://doi.org/10.1007/978-1-4614-0700-3et, this is what you‘d use. According to a recent study, millions of online services and applications produced using digital technology would be utilized by millions of websites and people every day. They want to adopt a safe method of building web applications that are used by people and people together.作者: nutrition 時間: 2025-3-31 19:57 作者: 誰在削木頭 時間: 2025-3-31 21:54 作者: 討好女人 時間: 2025-4-1 02:16
Life History Narratives from the P.S. Club,echnology portfolio, program and project management enables clients to see how technology assets are performing, and ensure they’re aligned to business strategies. It maximizes the value of your assets, reduce any potential exposure to risk and ensure technology project is delivered on time and within budget.作者: febrile 時間: 2025-4-1 09:41 作者: 具體 時間: 2025-4-1 10:12
Consumer attitudes to food quality productspment terminals shedding or power restriction measures due to technical and national strategic reasons, congestion or energy shortage, which bring certain negative impacts on regional economic development despite the simple rotation strategy to ensure resource equity. In this paper, we propose a equ