Data Mining for Cyber 𠄁Physical Systems

MV Rao, DA Reddy, A Ampavathi… - Data Mining and …, 2022 - Wiley Online Library
… The computational components depend on sensors to screen … The enormous number of
implanted force generator sensors … Bali, RS and Kumar, N., Secure clustering for efficient data

藉系統層的資訊流動追蹤以偵測Android 平台上竊取敏感資料的行為

蘇修醇, 謝續平 - 2011 - ir.lib.nycu.edu.tw
Security [4] finds that there are more than fifty Android Market applications have been implanted
… result of the “MUL” instruction has a byte-mixed computation, we evaluate the result with …

人工智能辅助修复周围神经损伤: 一个新的研究热点及挑战

Y Guo, L Sun, W Zhong, N Zhang, Z Zhao… - 中国神经再生研究(英文 …, 2024 - sjzsyj.com.cn
sensors for AI-enhanced autonomous robots, neuroprostheses, and neuromorphic computational
metal implants … information is fully protected, and also to ensure the security of the data. …

[HTML][HTML] HE Guisong (贺贵松), HUANG Xuegong (黄学功), LI Feng (李峰), WANG Huixing (汪辉兴)

J TAO, Z ZHOU - Journal of Shanghai Jiao Tong University, 2024 - qk.sjtu.edu.cn
… new challenges to perioperative safety management. The … For mechanical behavior of
implantation, the implantation … This research proposes a real-time calculation method for the …

[PDF][PDF] [課題研究報告書] A Survey on Internet of Things for Smart Health Technologies

DT Le - 2018 - dspace02.jaist.ac.jp
… that needs to be collected in order to ensure the quality of life, safetysensors to the future of
sensing implant deployment and … sensor and communication technologies, the computational

[PDF][PDF] 河蟹养殖池塘多层水温实时监测系统设计与试验

陈雷雷, 杜舟, 李俊, 胡庆松 - 渔业现代化, 2021 - fm.fmiri.ac.cn
… Six temperature sensors are fixed to collect water temperature of different layers … cloud
platform is designed to manage the upload data from the different monitoring points and sensors. …

主動式無線區域網路安全防護機制之研究

謝文川 - 2004 - ir.lib.nycu.edu.tw
… to enhance the security of the existing WEP protocol without changing its basic architecture.
The key … process can be summarized as following formula based on the encryption formula. …

RFID 的應用與挑戰

何傑輝, 虞孝成 - 2009 - ir.lib.nycu.edu.tw
Services (EPCIS), a secure, real-time standard for data sharing among trusted organizations.
The ratification marks a key milestone in the effort to enable RFID basedsensor web; or …

[PDF][PDF] 虚拟机自省技术研究与应用进展

李保珲, 徐克付, 张鹏, 郭莉, 胡玥, 方滨兴 - 软件学报, 2016 - jos.org.cn
security based on VMI. Finally, it presents the future research directions that need in-depth
study, such as VMI’s security, … software structure; knowledge of hardware architecture; security

混合现实技术在医学手术可视化中的应用研究

高原, 谭珂, 孙坚, 姜涛, 邹晓文 - Chinese Medical Sciences Journal, 2019 - cmsj.cams.cn
safety and accuracy of surgery. Gregory TM et al.from the Paris hospital in France presented
a live webcast of shoulder prosthesis implantation … automatic analysis and calculation of the …