Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Qu, Jubao"'
Publikováno v:
In Procedia Engineering 2011 15:2943-2947
Publikováno v:
In Procedia Engineering 2011 15:2922-2926
Autor:
Qu, Jubao
Publikováno v:
IOP Conference Series: Earth & Environmental Science; 2021, Vol. 632, p1-7, 7p
Publikováno v:
2010 International Forum on Information Technology and Applications.
The widespread application of manufacturing grid technology has already caused each kind of manufacturing resources which dispersed in the different zones and enterprises, organized effectively, that enables the user to be able to obtain each kind of
Publikováno v:
2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
As an emerging technology, Wirless Sensor Networks have attracted wide attention. But the development of its application system demands solutions provided by the appropriate middlewares. Addressing the current demand in WSNs appplication system and t
Autor:
Qu Jubao
Publikováno v:
2009 International Forum on Information Technology and Applications.
The rapid development of the World Wide Web makes it become more and more important sources for people to look for useful data. A substantial fraction of the Web consists of pages that are dynamically generated using a common template populated with
Autor:
Qu Jubao
Publikováno v:
2009 WRI World Congress on Software Engineering.
This paper first analyzes the traditional PPDR security model. Then, it puts forward a theory to strengthen network security by building an intelligent warning system, namely, RPRDRE. It is a self-learning and self-evolving system with intelligent wa
Publikováno v:
2009 Second International Conference on Intelligent Computation Technology and Automation.
Through the research for the intelligent manufacture systems, this article proposed the model of intelligence manufacture systems which are based on the multi-Agent, and according to the systems characteristic, the networks realizing and the systems
Publikováno v:
2010 International Forum on Information Technology & Applications (IFITA); 2010, p252-255, 4p
Publikováno v:
2010 Second International Conference on Networks Security Wireless Communications & Trusted Computing (NSWCTC); 2010, p522-525, 4p