Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Huikui Zhou"'
Autor:
Huikui Zhou, Mudan Gu
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9789811993725
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f48505ddff16a56f2b3d6cd4d7f4e411
https://doi.org/10.1007/978-981-19-9373-2_68
https://doi.org/10.1007/978-981-19-9373-2_68
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9789819911561
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::afe8fc316f593dcd438125d5de626946
https://doi.org/10.1007/978-981-99-1157-8_8
https://doi.org/10.1007/978-981-99-1157-8_8
Autor:
Huikui Zhou, Mudan Gu
Publikováno v:
2022 International Conference on Artificial Intelligence of Things and Crowdsensing (AIoTCs).
Autor:
Mudan Gu, Huikui Zhou
Publikováno v:
2021 International Conference on Applications and Techniques in Cyber Intelligence ISBN: 9783030791995
ATCI (1)
ATCI (1)
As a new model of Internet-based computers, blockchain technology has always been a hot spot for scholars and the industry. Although blockchain technology has been developed for many years, data security and reliable computing are still the main chal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e14140bde15dabe052953849c50a808b
https://doi.org/10.1007/978-3-030-79200-8_79
https://doi.org/10.1007/978-3-030-79200-8_79
Autor:
Huikui Zhou, Mudan Gu
Publikováno v:
Journal of Physics: Conference Series. 1881:032028
Autonomous mobile robot is widely used in security patrol, freight, autopilot, and family life and other fields, improve the application effect is one of the most important factor is to be able to accurate navigation path, so how to design a highly e
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319133256
TRIDENTCOM
TRIDENTCOM
Network security simulation model for HITLS technology is established, which aims to solve the problems in present network security simulation, that is, the network vulnerability and lack of network attack responses. This paper studies the implement
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::76d9011a5922fe867e45969715663395
https://doi.org/10.1007/978-3-319-13326-3_45
https://doi.org/10.1007/978-3-319-13326-3_45
Autor:
HuiKui Zhou, MuDan Gu
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319133256
TRIDENTCOM
TRIDENTCOM
In order to solve the Four Problems in present quality course establishing and the redundancy in Cloud Service, this paper studies the effective ways of improving the Cloud Service, and also introduces the Chord algorithm into Cloud Computation. A mu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::83011ec7586812886a7d0ce2d07249f3
https://doi.org/10.1007/978-3-319-13326-3_44
https://doi.org/10.1007/978-3-319-13326-3_44