Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Guang Song Li"'
Autor:
Frank Momberg, Wen Xiao, Chi Ma, Guang-Song Li, Alison M. Behie, Zhi-Pang Huang, Wenjuan Li, Paul A. Garber, Yin Yang, Shaoliang Yi, Ying Gao, Aung Lin, Guopeng Ren, Xinwen Wang
Publikováno v:
Global Ecology and Conservation, Vol 20, Iss, Pp-(2019)
Difficult to study species that inhabit inaccessible terrain, present significant challenges in obtaining accurate ecological, distributional, and conservation information. To address these challenges, we used an effective set of time- and cost-effic
Autor:
Wen Xiao, Zhi-Pang Huang, Guang-Song Li, Ying Gao, Yin Yang, Chi Ma, Guopeng Ren, Wei Wang, Xiao-Dong He
Publikováno v:
Biological Conservation. 209:273-279
The black snub-nosed monkey (Rhinopithecus strykeri) is an IUCN-Critically Endangered primate, recently discovered on the northern Sino-Myanmar border. In order to identify the most urgent gaps in the conservation of the black snub-nosed monkey, a hi
Autor:
Bin Wang, Zhi-Pang Huang, Guang-Song Li, Yong-Cheng Long, Shao-Hua Dong, Ying-Ping Tian, Zuofu Xiang, Yin Yang, Wen Xiao, Chen-Xiang He
Publikováno v:
Oryx. 52:134-136
The Myanmar snub-nosed monkey Rhinopithecus strykeri was discovered in 2010 on the western slopes of the Gaoligong Mountains in the Irrawaddy River basin in Myanmar and subsequently in the same river basin in China, in 2011. Based on 2 years of surve
Publikováno v:
Cloud Computing and Security ISBN: 9783030000110
ICCCS (3)
ICCCS (3)
Secure and efficient authentication protocols are necessary for cloud service. Multi-factor authentication protocols taking advantage of smart card, user’s password and biometric, are more secure than password-based single-factor authentication pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c0f83a9b5bcb95ac921471bc77f614e3
https://doi.org/10.1007/978-3-030-00012-7_9
https://doi.org/10.1007/978-3-030-00012-7_9
Publikováno v:
Security and Communication Networks, Vol 2018 (2018)
Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentication protocols taking advantage of smart card, user’s password, and biometric, are more secure than password-based single-factor authentication pro
Autor:
Guang Song Li, Jie Hong Luo
Publikováno v:
Applied Mechanics and Materials. :901-905
Gesture recognition is a kind of interaction of the natural user interface (Natural User Interface), which plays an important role in the application of the body-experience. In this paper, it uses Kinect sensor to track the 20 skeleton joint points o
Autor:
Guang Song Li
Publikováno v:
Applied Mechanics and Materials. :1742-1745
Arduino is a popular platform for interactive application. The posture recognition of human body is realized by the Microsoft’s Kinect sensor, and it translates the posture into data based on the protocol, and then transmits the data to the Arduino
Publikováno v:
Advanced Materials Research. :1027-1030
Security of mobile IP is very important for seamless roaming in heterogeneous mobile environments. Recently, Dang et al. proposed a new scheme for secure registration procedure of mobile IP. However, we found out that the scheme had three weaknesses
Publikováno v:
Chinese Journal of Computers. 33:1675-1685
Publikováno v:
Wuhan University Journal of Natural Sciences; Jan2005, Vol. 10 Issue 1, p123-126, 4p