×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
沈阳自动化研究所 [2]
兰州理工大学 [1]
华南理工大学 [1]
内容类型
会议论文 [2]
期刊论文 [2]
发表日期
2014 [4]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共4条,第1-4条
帮助
限定条件
发表日期:2014
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Study on path optimization method of urban traffic flow guidance system based on internet of things
会议论文
2014 International Conference on Mechatronics, Materials and Manufacturing, ICMMM 2014, Chengdu, China, August 2-4, 2014
作者:
Wang DP(王丹萍)
;
Hu KY(胡琨元)
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2014/11/03
Highway traffic control
Information systems
Internet of things
Manufacture
Street traffic control
Research on path optimization of urban traffic guidance system
会议论文
2014 International Conference on Mechatronics, Materials and Manufacturing, ICMMM 2014, Chengdu, China, August 2-4, 2014
作者:
Wang DP(王丹萍)
;
Hu KY(胡琨元)
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2014/11/03
Control systems
Manufacture
Motor transportation
Street traffic control
Traffic congestion
Video-based two-wheel vehicle detection for mixed traffic flow based on combination foreground extraction (EI收录)
期刊论文
Jiaotong Yunshu Xitong Gongcheng Yu Xinxi/Journal of Transportation Systems Engineering and Information Technology, 2014, 卷号: 14, 页码: 49-54 and 73
作者:
Kuang, Xian-Yan[1]
;
Wang, Cheng-Kun[1]
;
Xu, Lun-Hui[1,2]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/25
Edge detection
Extraction
Image matching
Pattern matching
Street traffic control
Traffic control
Vehicles
Wheels
Verifiable multi-authority attribute based encryption scheme with different permissions
期刊论文
Journal of Chemical and Pharmaceutical Research, 2014, 卷号: 6, 期号: 7, 页码: 611-620
作者:
Liu, Xueyan
;
Li, Zhanming
;
Hao, Zhanjun
;
Zhang, Qiang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/14
Access control
Algorithms
Computation theory
Decision making
Decision theory
Granular computing
Street traffic control
Traffic congestion
Attribute-based encryptions
Identity Based Encryption
Multiple authorities
Permission
Pseudorandom functions
©版权所有 ©2017 CSpace - Powered by
CSpace