Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Zeng, Jijun"'
Publikováno v:
Electrical Measurement & Instrumentation; Feb2024, Vol. 61 Issue 2, p210-215, 6p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2021 6th International Conference on Inventive Computation Technologies (ICICT).
Aiming at the problem that the traditional method has great computational complexity and low evaluation accuracy for the operational risk evaluation of power grid companies, a new operational risk informationization evaluation algorithm for China Sou
Publikováno v:
Application of Intelligent Systems in Multi-modal Information Analytics ISBN: 9783030515553
The user experience is the foundation for many enterprises to settle down. One of the key points to improve the user experience is to solve the user’s problems immediately and at any time. Therefore, more and more enterprises have added online cust
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::25582984f45eb2d54c3e9e53c56cce80
https://doi.org/10.1007/978-3-030-51556-0_2
https://doi.org/10.1007/978-3-030-51556-0_2
Publikováno v:
SCIENTIA SINICA Chimica. 47:1312-1325
Fluorohydrocarbons including hydrofluorocarbons and hydrofluoroolefins are environment-friendly replacements for chlorofluorocarbons, one kind of ozone-depleting substances. The development and application of catalytic synthesis technologies for fluo
Publikováno v:
In Composites Part B 2004 35(3):245-249
Publikováno v:
In Composites Part B 2004 35(2):173-178
Publikováno v:
In Composites Science and Technology 2003 63(11):1617-1628
Publikováno v:
Journal of Physics: Conference Series. 1606:012019
With the rapid development of software industry, the scale of software becomes larger and larger, and the complexity of software becomes higher and higher. The test coverage criterion traverses to get the corresponding test path and deletes the redun
Publikováno v:
Journal of Physics: Conference Series. 1187:052031
In the current cyberspace, vulnerability has attracted the widespread attention. This paper briefly introduces the typical software vulnerability mining techniques. Based on the existing research work, this paper puts forward the whole idea of the re