Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Autonomous wireless sensor network based Building Energy and Environment Monitoring system design
Wensi Wang, Ningning Wang, Jafer, Essa, Hayes, Michael, O'Flynn, Brendan, O'Mathuna, Cian
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
Improving for chaotic image encryption algorithm based on logistic map
Ai-hong Zhu, Lian Li
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
A network security situation evaluation method based on D-S evidence theory
Zhao-Yang Qu, Ya-Ying Li, Peng Li
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
Illumination normalization preprocessing for face recognition
Sharif, Muhammad, Mohsin, Sajjad, Jamal, Muhammad Jawad, Raza, Mudassar
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
The study of rainfall forecast based on neural network and GPS precipitable water vapor
Wang Yong, Xu Hong, Guo Zengzhang, Ding Keliang, Liu Yanping, Wen Debao
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
The construction of soft servo networked motion control system based on EtherCAT
Lei Wang, Huijuan Jia, Junyan Qi, Bin Fang
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
A segment-based stereo matching method with ground control points
Jun Xiao, Linyuan Xia, Liqun Lin, Zhentao Zhang
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
Design of compactRIO-based acquisition system
Tao Lin, Yongxing Xie, Jing Tang
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
Application of SVM based on rough set in electricity prices forecasting
Ting Wang, Lijuan Qin
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
A 3D coordinate transformation algorithm
Huaien Zeng
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
Design of a bio-inspired jumping robot for rough terrain
Jun Zhang, Yunshuai Zhu, Hui Wang, Jimei Zhang
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
One Publicly Verifiable Secret Sharing Scheme based on linear code
Anjie Peng, Lei Wang
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
Denial of service attacks in cognitive radio networks
Wang Weifang
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
A double heads static cluster algorithm for wireless sensor networks
Xiao Yi, Lu Deng
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
Research on the intrusion detection technology with hybrid model
Qingqing Zhang, Hongbian Yang, Kai Li, Qian Zhang
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
An automated registration of RS images based on SURF and piecewise linear transformation
Hui Guo, Chengqi Cheng, Yubo Yang
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
The real-time monitoring system for inspecting car based on RFID, GPS and GIS
Chunyan Deng, Linfu Xue, Wenqing Li, Zhiguo Zhou
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
Research of key technology in game theory
Derong Jiang, Jianfeng Hu
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding
Research and simulation of Volterra series kernel identification on wiener model
Chen, Y., Liu, Z.Y., Zhang, H.J.
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Published in 2010 2nd Conference on Environmental Science and Information Application Technology (01.07.2010)
Get full text
Conference Proceeding