標(biāo)題: Titlebook: Embedded System Technology; 13th National Confer Xing Zhang,Zhonghai Wu,Xingmian Sha Conference proceedings 2015 Springer Science+Business [打印本頁] 作者: Reticent 時(shí)間: 2025-3-21 20:04
書目名稱Embedded System Technology影響因子(影響力)
書目名稱Embedded System Technology影響因子(影響力)學(xué)科排名
書目名稱Embedded System Technology網(wǎng)絡(luò)公開度
書目名稱Embedded System Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Embedded System Technology被引頻次
書目名稱Embedded System Technology被引頻次學(xué)科排名
書目名稱Embedded System Technology年度引用
書目名稱Embedded System Technology年度引用學(xué)科排名
書目名稱Embedded System Technology讀者反饋
書目名稱Embedded System Technology讀者反饋學(xué)科排名
作者: ARY 時(shí)間: 2025-3-21 23:33
Communications in Computer and Information Sciencehttp://image.papertrans.cn/e/image/307943.jpg作者: inflame 時(shí)間: 2025-3-22 03:06
978-981-10-0420-9Springer Science+Business Media Singapore 2015作者: 誘使 時(shí)間: 2025-3-22 05:16 作者: BOGUS 時(shí)間: 2025-3-22 12:40 作者: CRACK 時(shí)間: 2025-3-22 16:42 作者: CRACK 時(shí)間: 2025-3-22 17:38
Soft Computing for Metamaterial Structures,per. The EAKFA method selects adaptive Kalman filter algorithm as a fading factor. Furthermore, the fading factor is optimized by evolutionary algorithms. Finally, the effectiveness of EAKFA is validated by comparing EAKFA with a general adaptive Kalman filter algorithm. The results show that the er作者: 無能力 時(shí)間: 2025-3-23 00:34 作者: fodlder 時(shí)間: 2025-3-23 03:02 作者: amplitude 時(shí)間: 2025-3-23 07:49
https://doi.org/10.1007/978-94-011-5978-4++ is a kind of effective single model recommendation algorithm, which is based on the matrix decomposition combined with the neighborhood model. On the Spark, using the Stochastic Gradient Descent, this paper realized the distributed SVD++ algorithm through the Scala, deployed and applied the algor作者: kyphoplasty 時(shí)間: 2025-3-23 12:00 作者: Accommodation 時(shí)間: 2025-3-23 15:17 作者: Overstate 時(shí)間: 2025-3-23 20:17
Industrie 4.0 im Produktionsumfeld,, which results in potential privacy problems. Decentralized online social networking (DOSN) is provided to solve the problems. This paper presents a secure decentralized online social networking framework named SEDOSN. A peer-to-peer (p2p) online networking system is designed, and attribute-based e作者: nocturnal 時(shí)間: 2025-3-24 02:10
https://doi.org/10.1007/978-3-658-06312-2ken as core controllor and processor. DS18B20 as temperature acquisition, DHT11 sensor as humidity data acquisition, BH1750FV1 as light sensor. The collected data will be transmitted through the wireless communication module, and communication with the host computer. The design of the system is divd作者: Inoperable 時(shí)間: 2025-3-24 05:32
Claudia Rademacher,Philipp Ramos Lobatosystem has high reliability and low resource consumption. Embryonic electronic cell array (EECA) is a new kind of circuit structure based on the embryonic evolution of biology, with the feature of self-organization, self-healing and self-adaptive. Compared with traditional circuit design method of e作者: 圍裙 時(shí)間: 2025-3-24 08:02 作者: 仔細(xì)閱讀 時(shí)間: 2025-3-24 11:34
https://doi.org/10.1007/978-3-642-95870-0ation, TMS320F28027 is used as the control core of supervisory control and data transmission system, a constant voltage, constant current and charging process control algorithm is developed, the hardware control circuit based on ZCS power transformation is designed. The experimental results show tha作者: MOT 時(shí)間: 2025-3-24 16:08
Die mittlere und die letzte Sitzung, of our work. To solve this problem, the demand for a mini, smart and wireless printer is rapidly increasing. And our pocket printer, which tends to be small enough to fit into a usual pocket could move itself and print letters wirelessly on any size of paper. This kind of printer could be just as b作者: CUR 時(shí)間: 2025-3-24 20:35
Metaphern und der Metaphorischen Prozesse, hard to satisfy the properties of real-time and low power consumption directly. Based on vxworks kernel, this paper put forward a solution of trusted computing by designing embedded real-time trusted computing module and trusted software stack, which could realize the chain of trust by using integr作者: 多產(chǎn)魚 時(shí)間: 2025-3-25 02:50 作者: reptile 時(shí)間: 2025-3-25 06:48 作者: drusen 時(shí)間: 2025-3-25 08:03
Die Rationalit?t metaphorischer Argumentecations, it is impossible to omit the case. Thus, there is realistic motivation to address this fundamental problem. In the paper, we improve the transmission fashion of synchronization mechanism in IEEE802.15.4/ZigBee protocol with one random method, and pose a time-sharing transmission fashion to 作者: optic-nerve 時(shí)間: 2025-3-25 13:16
Embryonic Electronic Circuit Optimization Design Method Based on Genetic Algorithmption of the circuit is reduced. Through the study of the optimization design of a typical circuit, both the hardware resource consumption and the reliability of the system have improved a lot, compared with the traditional design method,which has great engineering application value.作者: 構(gòu)想 時(shí)間: 2025-3-25 16:41 作者: enhance 時(shí)間: 2025-3-25 22:46
Claudia Rademacher,Philipp Ramos Lobatoption of the circuit is reduced. Through the study of the optimization design of a typical circuit, both the hardware resource consumption and the reliability of the system have improved a lot, compared with the traditional design method,which has great engineering application value.作者: 說笑 時(shí)間: 2025-3-26 00:22 作者: harangue 時(shí)間: 2025-3-26 05:29
1865-0929 y, ESTC 2015, held in Beijing,China, in October 2015..The 18 revised full papers presented werecarefully reviewed and selected from 63 papers. The topics cover a broad rangeof fields focusing on research about embedded system technologies, such assmart hardware, system and network, applications and 作者: 虛弱的神經(jīng) 時(shí)間: 2025-3-26 09:22 作者: CRP743 時(shí)間: 2025-3-26 16:40
https://doi.org/10.1007/978-94-015-1109-4all the path constraints are solved by a constraint solver. If no solution is found, the defect is a false positive, otherwise not. The comparative experiment on an embedded software of certain key field and the comparisons with similar tool PC-Lint show that our method has better analytical accuracy and efficiency.作者: 膽汁 時(shí)間: 2025-3-26 19:57 作者: avarice 時(shí)間: 2025-3-26 22:21 作者: Contracture 時(shí)間: 2025-3-27 03:42 作者: 胰島素 時(shí)間: 2025-3-27 06:45 作者: Digitalis 時(shí)間: 2025-3-27 12:51
https://doi.org/10.1007/978-3-031-56862-6ntal results show that the given improved hierarchical motion estimation search algorithm can reduce the encoding time up to 21.73?% on average compared with the TZ-Search algorithm. Therefore, the computational complexity can be reduced.作者: onlooker 時(shí)間: 2025-3-27 14:58
Industrie 4.0 im Produktionsumfeld,generating decryption keys for uses, we firstly proposed an ABE scheme with discretionary authorization. In our system, each user can authorize his friend, and generate decryption keys for his friend based on his friend’s attributes. We give our implementation and experiment results in the paper.作者: 壁畫 時(shí)間: 2025-3-27 21:23
Metaphern soziologischer Zeitdiagnosenhe terminal reader device for several days to deal with the server disaster. The data managed in the server is physically deleting prevented as the user may do the misoperation, and the backup server can further improve the data dependability.作者: cavity 時(shí)間: 2025-3-27 22:31
An Improved Hierarchical Motion Estimation Algorithmntal results show that the given improved hierarchical motion estimation search algorithm can reduce the encoding time up to 21.73?% on average compared with the TZ-Search algorithm. Therefore, the computational complexity can be reduced.作者: 大罵 時(shí)間: 2025-3-28 02:50 作者: Watemelon 時(shí)間: 2025-3-28 07:01
Dependable Data Management in the IoT Traceability Systemhe terminal reader device for several days to deal with the server disaster. The data managed in the server is physically deleting prevented as the user may do the misoperation, and the backup server can further improve the data dependability.作者: 系列 時(shí)間: 2025-3-28 13:13 作者: Mortar 時(shí)間: 2025-3-28 15:28 作者: Offset 時(shí)間: 2025-3-28 21:07
3D Localization Algorithm for Wireless Sensor Networks Based on DCP and VRTt the average location accuracy of the improved localization algorithm is much better than classical 3D DV-hop algorithm and Centroid algorithm. Moreover the stability of the new algorithm is better than others’.作者: 中古 時(shí)間: 2025-3-29 01:22 作者: chisel 時(shí)間: 2025-3-29 06:33 作者: 微塵 時(shí)間: 2025-3-29 09:15
Pocket Printer - A Novel Idea and Implement About Printere small enough to fit into a usual pocket could move itself and print letters wirelessly on any size of paper. This kind of printer could be just as big as a cup, which is very convenient to carry and efficient in printing.作者: RENIN 時(shí)間: 2025-3-29 15:14 作者: armistice 時(shí)間: 2025-3-29 19:29 作者: 障礙 時(shí)間: 2025-3-29 23:20 作者: 隱語 時(shí)間: 2025-3-30 01:20 作者: pellagra 時(shí)間: 2025-3-30 06:28
Conference proceedings 2015ober 2015..The 18 revised full papers presented werecarefully reviewed and selected from 63 papers. The topics cover a broad rangeof fields focusing on research about embedded system technologies, such assmart hardware, system and network, applications and algorithm..作者: 比喻好 時(shí)間: 2025-3-30 09:38 作者: 職業(yè) 時(shí)間: 2025-3-30 15:16 作者: 最初 時(shí)間: 2025-3-30 18:48 作者: 衰老 時(shí)間: 2025-3-30 21:48
Isolation of Physical and Logical Views of Dark-Silicon Many-Core Systems for Reliability and Perforogically condensed intercommunications within it. Compared to traditional mesh-like systems, the proposed folded torus-like organization can achieve on average 39.44?% application performance improvement and decrease average 9.3.C of the chip.作者: abnegate 時(shí)間: 2025-3-31 04:50
Distributed Design and Implementation of SVD++ Algorithm for E-commerce Personalized Recommender Sysithm into an actual recommendation product for testing. The testing results represent that the distributed SVD++ algorithm succeeded in solving problems of terabytes of data processing in the e-commerce recommendation and the sparse data of user-item matrix, enhancing the quality in personalized commodity recommendation.作者: BRIBE 時(shí)間: 2025-3-31 07:45
Research on Trusted Computing Technology for Embedded Real-Time Operation Systemity measurement certificate. Experiments show that the average execution time of commands on trusted platform module saves 65.81?% execution time compared with SW-TP, which can meet the ERTOS requirements of real-time property and low power consumption as a whole.作者: 不透氣 時(shí)間: 2025-3-31 09:28
Novel Congestion Avoidance Mechanism ZigBee-Based Wireless Sensor Networkavoid congestion. Experimental results indicate that the two proposed methods can significantly reduce collision and, as a result, congestion avoidance can be implemented. The validity of proposed strategies is intuitively demonstrated through an experimental test-bed based on open-source implementation of IEEE802.15.4/ZigBee protocols.