As RFID (Radio Frequency Identification) technology plays an important role in IOT (Internet of Things), the research of intelligent bus-mounted system based on RFID is a hotspot to solve the traffic problems in recen...
详细信息
IKE protocol is an important part of the IPSec protocol suite meanwhile it is a prerequisite and guarantee for the IPSec VPN secure transmission. Since IKEv2 is a proposed technology, it is widely used in professional...
详细信息
Through researches on design and application of wireless sensor network in botanic garden environment monitoring system, enforcing the deployment of wireless sensor network in areas that traditional wired network unab...
详细信息
Many different source code clone detection methods were proposed to detect clones in commercial source codes especially in large scale source codes. However, such methods are not quite fit for detecting source code cl...
详细信息
An increased uses of mobile devices such as smart phones, PDAs and tablet computers with limited energy and intermittent wireless network are growing rapidly. Data management in these devices raises new challenges tha...
详细信息
Narrowband powerline communication has the great potential market application like Auto-Meter-Reading (AMR). This paper focuses on the design and implementation of narrowband powerline communication module with the OF...
详细信息
In this paper, we focus on providing users with an effective and efficient way to extract useful information from complex structured XML databases. We propose a new query mechanism to provide users with the ability to...
详细信息
In online class teaching, there are several elements related to online learning tasks: online resources, teaching goals, materials, activities, the roles of teachers and students, activity backgrounds and the supervis...
详细信息
Web-based online examination system is a Web-based databases and the Internet dealing with real-time processing system to produce random and fair examination papers. For the examinee to provide fair of the exam enviro...
详细信息
In this paper, it presented the method of network intrusion detection based on the neural network GCBP algorithm. By analyzing and comparing the BP algorithm with the GCBP algorithm, what learned is that the GCBP algo...
详细信息
暂无评论