the paper proposes the new classification methodology using risk distance (RD). From 553 example students in the Chiang Rai Vocational College, dropout risk factors were chosen. the method was applied to classify the ...
详细信息
Cognitive complexity of a software determines the methodology of comprehending the internal logic of a given software by an individual, quantitatively. the procedure of handling a software by different users is differ...
详细信息
In the process of real-time tracking of multiple moving targets, there is a big gap between the tracking effect and the ideal effect due to the influence of the objective environment state. therefore, a real-time trac...
详细信息
Both government and private organizations are rapidly fortifying their cybersecurity measures to cope with recent trends in cyberattacks. In general, these attacks target several critical infrastructures including com...
详细信息
Withthe development of modern science and technology, aviation, aerospace, satellite and other equipment are developing in the direction of high reliability, safety and stability, which puts forward higher requiremen...
详细信息
the SLAM algorithm assumes that the collected scene is static during the process of localization and mapping. However, it is inevitable to encounter interference from dynamic objects such as pedestrians in the actual ...
详细信息
In the process of asset status assessment, the power transmission intelligent Internet of things (IoT) with smart towers as the core IoT nodes faces many problems such as large workload of physical information, poor d...
详细信息
the objective of the study is to develop a methodology to detect drought in Nan province, northern part of thailand using vegetation spectrum in different period of the satellite passing approximately 11,420 ***. the ...
详细信息
Aiming at the problem that the traditional methods of modern satellite navigation interference detection can not deal with multi-component interference, a two-component scanning interference global navigation satellit...
详细信息
the proceedings contain 11 papers. the special focus in this conference is on information, Communication and Computing technology. the topics include: A Systematic Study on LoRa Communication in IoT: Implementation Ch...
ISBN:
(纸本)9783031209765
the proceedings contain 11 papers. the special focus in this conference is on information, Communication and Computing technology. the topics include: A Systematic Study on LoRa Communication in IoT: Implementation Challenges and Research Solutions;A Low Complexity CFO Reduction Technique for LFDMA Systems;DICCh-D: Detecting IPv6-Based Covert Channels Using DNN;image Caption Generation for Low Light Images;a Study on Feature Selection for Gender Detection in Speech processing for Assamese Language;Bengali Fake News Detection: Transfer Learning Based Technique with Masked LM Process by BERT;crowd Counting Using Federated Learning and Domain Adaptation;news Headline Generation Using Abstractive Text Summarization;preface.
暂无评论