標題: Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit [打印本頁] 作者: fibrous-plaque 時間: 2025-3-21 20:02
書目名稱Cloud Computing and Security影響因子(影響力)
書目名稱Cloud Computing and Security影響因子(影響力)學科排名
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度學科排名
書目名稱Cloud Computing and Security被引頻次
書目名稱Cloud Computing and Security被引頻次學科排名
書目名稱Cloud Computing and Security年度引用
書目名稱Cloud Computing and Security年度引用學科排名
書目名稱Cloud Computing and Security讀者反饋
書目名稱Cloud Computing and Security讀者反饋學科排名
作者: BAN 時間: 2025-3-21 22:02 作者: 可轉(zhuǎn)變 時間: 2025-3-22 01:39
Coverage Holes Recovery Algorithm of Underwater Wireless Sensor Networksodes movement distance. The simulation results show that this recovery algorithm achieves the goal of the nodes reasonable distribution with improving the network coverage and reducing the nodes movement distance thus extends the lifetime of the underwater wireless sensor network in the initial depl作者: CLASH 時間: 2025-3-22 07:38
https://doi.org/10.1007/978-3-322-82166-9o measure moving distance for the user. We mainly innovate in proposing a fusion estimation method leveraging sensors and wireless signals to accurately estimate the human’s moving distance indoor. We implement a prototype with smartphones and commercial WiFi devices. Then we evaluate it in distinct作者: locus-ceruleus 時間: 2025-3-22 09:07 作者: engrossed 時間: 2025-3-22 15:11
Schnitt≈, Stanz≈ und Ziehwerkzeugeodes movement distance. The simulation results show that this recovery algorithm achieves the goal of the nodes reasonable distribution with improving the network coverage and reducing the nodes movement distance thus extends the lifetime of the underwater wireless sensor network in the initial depl作者: engrossed 時間: 2025-3-22 19:21 作者: 假 時間: 2025-3-22 21:27 作者: MEEK 時間: 2025-3-23 03:35 作者: 無動于衷 時間: 2025-3-23 06:44
https://doi.org/10.1007/978-3-322-82166-9range of applications in the era of mobile computing. The maturity of inertial sensors in smartphones and the ubiquity of WiFi technology ensure the accuracy for indoor distance measurement. Despite its importance, moving distance estimation in the indoor environment for mobile devices is still lack作者: 核心 時間: 2025-3-23 13:33
https://doi.org/10.1007/978-3-322-82166-9 attacks due to the inherent characteristics of the design of tag hardware and communication protocol. Recently, physical-layer identification methods are proved to be promising to validate the authenticity of passive tags. However, existing methods are usually highly location-dependent and suscepti作者: 音樂等 時間: 2025-3-23 17:17
Grundlagen der Themenbearbeitung,Lop) is one of the most advanced fuzzy testing tools. However, it is difficult for AFL to explore deeper parts of the program. This paper proposes an improved method called ADFL for low hit branch of the tested program to solve this problem. The method first optimizes the selection strategy for seed作者: fallible 時間: 2025-3-23 19:32
Grundlagen der Themenbearbeitung,critical events. Principal Components Analysis (PCA) has attracted a great interest in the machine learning field especially in outlier detection in WSNs. An efficient and effective method called Improved Distributed PCA-Based Outlier Detection (IDPCA) has been proposed in this paper. The proposed s作者: Hyperplasia 時間: 2025-3-24 01:16 作者: 步履蹣跚 時間: 2025-3-24 02:28 作者: 內(nèi)部 時間: 2025-3-24 08:51
Grundlagen der Themenbearbeitung,BC is a distributed database system with decentralized and unfalsified features that make it be expected to lead a new revolution in the technology industry. The prominent feature of BC makes it break away from currency applications and gradually enter into non-monetary applications. The distributed作者: GORGE 時間: 2025-3-24 12:16 作者: APEX 時間: 2025-3-24 16:23
https://doi.org/10.1007/978-3-8350-5535-3ce firmware provides basic data for automated and artificial intelligent analysis method. Thus, an association analysis method for the large scale firmware security is proposed in this paper. Then, a firmware database platform based on the proposed analysis method is developed. First, the platform c作者: Mortal 時間: 2025-3-24 20:32 作者: 鋼筆尖 時間: 2025-3-25 02:10 作者: 自作多情 時間: 2025-3-25 06:52 作者: tinnitus 時間: 2025-3-25 10:09 作者: LVAD360 時間: 2025-3-25 12:39
Die Bedingung des Alternativismusetection rate and low efficiency. In order to realize automatic detection, this paper puts forward a kind of car scratch classification method based on optimized BP neural network (H-IGA-BP). The feature vector which extracts obvious scratch characteristic from the texture is served as the input of 作者: Opponent 時間: 2025-3-25 16:25
https://doi.org/10.1007/978-3-476-05112-7in the network. Due to huge increase in network traffic and different types of attacks, accurately classifying the malicious and legitimate network traffic is time consuming and computational intensive. Recently, more and more researchers applied deep neural networks (DNNs) to solve intrusion detect作者: micturition 時間: 2025-3-25 20:28
Der Mensch aus philosophischer Perspektivefor monitoring damage, fiber Bragg grating (FBG) sensors have the advantages of being free from electromagnetic interference, light weight, small size, and non-corrosion resistance. Therefore, FBG sensors are widely used in the structural health monitoring of composite materials. This paper briefly 作者: 不斷的變動 時間: 2025-3-26 03:46
Die Bedingung der Verantwortungever, once the fault in power network, the transmission of power will be difficult and the engineer must check the fault in large amounts of alarm data in power network immediately, which would cost so much time by human experience. To solve this problem, we do correlation analysis of alarm data bas作者: 浪費時間 時間: 2025-3-26 05:56 作者: 紋章 時間: 2025-3-26 11:41
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/228432.jpg作者: 時代錯誤 時間: 2025-3-26 12:52
Cloud Computing and Security978-3-030-00018-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: GET 時間: 2025-3-26 19:43
Grundlagen der Themenbearbeitung, algorithm. An exhaust fan which can detect gas automatically and work automatically is designed. It is assembled with smoke sensors, carbon monoxide sensors and exhaust fans to achieve automatic detection, automatic operation and elimination of harmful gases, and ensure people’s health is not infringed.作者: Cantankerous 時間: 2025-3-26 22:58
Accurate Moving Distance Estimation via Multi-modal Fusion from IMU Sensors and WiFi Signalrange of applications in the era of mobile computing. The maturity of inertial sensors in smartphones and the ubiquity of WiFi technology ensure the accuracy for indoor distance measurement. Despite its importance, moving distance estimation in the indoor environment for mobile devices is still lack作者: transdermal 時間: 2025-3-27 02:06 作者: 脆弱么 時間: 2025-3-27 08:43
ADFL: An Improved Algorithm for American Fuzzy Lop in Fuzz TestingLop) is one of the most advanced fuzzy testing tools. However, it is difficult for AFL to explore deeper parts of the program. This paper proposes an improved method called ADFL for low hit branch of the tested program to solve this problem. The method first optimizes the selection strategy for seed作者: COLON 時間: 2025-3-27 11:18 作者: 里程碑 時間: 2025-3-27 16:31 作者: Anecdote 時間: 2025-3-27 20:09 作者: BLANC 時間: 2025-3-27 22:25
Application of BlockChain in Internet of ThingsBC is a distributed database system with decentralized and unfalsified features that make it be expected to lead a new revolution in the technology industry. The prominent feature of BC makes it break away from currency applications and gradually enter into non-monetary applications. The distributed作者: 白楊 時間: 2025-3-28 02:14
Assessment of Haze Effects in Human Lives: A Case Study of Investigation in Nanjings. In recent years, haze has become one of the most important environmental issues affecting the production, lives, and health of Chinese residents. The Chinese government attaches great importance to haze pollution control and prevention. This article intends to explore the urban residents’ percept作者: 漂亮 時間: 2025-3-28 08:38
Association Analysis of Firmware Based on NoSQL Databasece firmware provides basic data for automated and artificial intelligent analysis method. Thus, an association analysis method for the large scale firmware security is proposed in this paper. Then, a firmware database platform based on the proposed analysis method is developed. First, the platform c作者: lambaste 時間: 2025-3-28 10:34
Authentication of Quantum Dialogue Under Noiseer parties. We tackle this problem through decoy and steganography to detect the parties’ identities if any of them is incorrect, and to ensure that the conversation channel is secured. We propose using DFS immune-combined noise characteristics, a generalized entangled states that converts previousl作者: POINT 時間: 2025-3-28 17:58
Automatic Integrated Exhaust Fan Based on AT89S51 Single Chip Microcomputer algorithm. An exhaust fan which can detect gas automatically and work automatically is designed. It is assembled with smoke sensors, carbon monoxide sensors and exhaust fans to achieve automatic detection, automatic operation and elimination of harmful gases, and ensure people’s health is not infri作者: 他一致 時間: 2025-3-28 20:59
Bring Intelligence to Ports Based on Internet of Thingselopment and status of Intelligent Ports. Then, focusing on some important parts of port, we discussed in detail of how to utilize IoT advanced technology to build next generation Intelligent Ports. The IoT key technology, detailed military technology application of functional modules and overall so作者: 碎石 時間: 2025-3-29 00:00 作者: VEN 時間: 2025-3-29 06:46
Classification of Car Scratch Types Based on Optimized BP Neural Networketection rate and low efficiency. In order to realize automatic detection, this paper puts forward a kind of car scratch classification method based on optimized BP neural network (H-IGA-BP). The feature vector which extracts obvious scratch characteristic from the texture is served as the input of 作者: Graphite 時間: 2025-3-29 08:51 作者: 放縱 時間: 2025-3-29 14:52
Composite Structure Health Monitoring Review Based on FBG Sensorfor monitoring damage, fiber Bragg grating (FBG) sensors have the advantages of being free from electromagnetic interference, light weight, small size, and non-corrosion resistance. Therefore, FBG sensors are widely used in the structural health monitoring of composite materials. This paper briefly 作者: Emasculate 時間: 2025-3-29 17:28
Correlation Analysis of Alarm Data Based on Fuzzy Rule in Power Networkever, once the fault in power network, the transmission of power will be difficult and the engineer must check the fault in large amounts of alarm data in power network immediately, which would cost so much time by human experience. To solve this problem, we do correlation analysis of alarm data bas作者: 遭遇 時間: 2025-3-29 22:08
Coverage Holes Recovery Algorithm of Underwater Wireless Sensor Networksability and lifetime. Underwater wireless sensor network if no wireless sensor node is available in the area due to used up energy or any other reasons, the area which is not detected by any wireless sensor node forms coverage holes. The coverage holes recovery algorithm aiming at the coverage holes作者: Preserve 時間: 2025-3-30 03:45 作者: 節(jié)省 時間: 2025-3-30 07:35
https://doi.org/10.1007/978-3-322-82166-9object and utilizes the near-field capability of UHF tags for authentication. We implement our prototype using commercial off-the-shelf UHF RFID reader and tags. Extensive experiment results demonstrate that SecurArray effectively achieves high accuracy of physical-layer authentication.作者: LEERY 時間: 2025-3-30 09:57
Grundlagen der Themenbearbeitung,n real time. Experiments with both synthetic and the real data collected from the Intel Berkeley Research Laboratory indicate that IDPCA achieves a higher detection rate with a lower false alarm rate, while reducing the communication overhead than previous methods.作者: 祝賀 時間: 2025-3-30 14:48
Grundlagen der Themenbearbeitung,in the application of IoT. We also discusses the main direction of BC in the application of IoT. But BC can’t be applied directly to IoT, and the fusion of two technologies will face many challenges. Based on these, this paper analyzes the challenges of BC in the application of IoT.作者: craving 時間: 2025-3-30 18:43
Die Bedingung der Verantwortungentroid algorithm is used to locate unknown nodes. The simulation results show that the FCDC-CL algorithms average localization error is approximately 9.4. and the error is significantly reduced compared with the traditional WCL algorithm.作者: 高興一回 時間: 2025-3-30 20:54 作者: 拖網(wǎng) 時間: 2025-3-31 02:10 作者: Servile 時間: 2025-3-31 08:46 作者: nominal 時間: 2025-3-31 10:36
Application of BlockChain in Internet of Thingsin the application of IoT. We also discusses the main direction of BC in the application of IoT. But BC can’t be applied directly to IoT, and the fusion of two technologies will face many challenges. Based on these, this paper analyzes the challenges of BC in the application of IoT.作者: Femish 時間: 2025-3-31 16:22 作者: 揉雜 時間: 2025-3-31 21:05