Paper Title
Page
Authors: Li Sheng Zhang, Mei Jie Yang, Da Jiang Lei
Chapter 2: Network & Control
Abstract:This paper proposes a novel clustering algorithm with the steady initial center based on the PAM algorithm. As the PAM algorithm arbitrarily...
244
Authors: Yi Min Tian
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:Numeric scheme and numeric result was in this paper. First, We proposes a kind of explicit - implicit difference scheme to solve the initial...
253
Authors: Yan Chu, Yan Shao, Liang Chen
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:After studying the advantages and disadvantages of existing wearable lower limb rehabilitation training robot product performance, by...
256
Authors: Hai Tao Min, Dong Jin Ye, Yuan Bin Yu
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:This paper introduced the structure of Extended-Range Electric Vehicles as well as its characteristics. Principle researches have been...
261
Authors: Jian Wei Gu, Mei Wu
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:There are lots of factors effect on weak gel flooding.This paper based on the conceptual model by changing the model parameters and using...
268
Authors: Lan Xia, Ting Ting Song
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:As market competition intensifies, Price competition as the most common and effective way of market competition among operators is quite...
274
Authors: Zhang Jie Peng, Zhang Lin Peng, Ming Ming Wu
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:M2M communications are capturing the attention of many stakeholders from application developers to mobile operators. Recent initiatives of...
279
Authors: Li Hua Liu, Zheng Jun Cao
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:Unlike some earlier proxy re-encryption schemes, the LV08 scheme specifies a validity-checking process to guarantee that the received...
284
Authors: Wei Wang, Qing Feng Cheng
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:In this paper, we analyze two ID-based authenticated key exchange (AKE) protocols in the eCK model. One is a two-party AKE protocol between...
289
Authors: Kai Yuan Meng, Peng Yang, Qing Nian Cao
Chapter 3: Advanced Intelligence & Manufacturing
Abstract:By analyzing the oilfield wireless monitoring system, the paper puts forward an oilfield monitoring system framework based on ZigBee wireless...
294
Showing 41 to 50 of 198 Paper Titles