-
1381
Cognitive Multihop Wireless Sensor Networks over Nakagami- Fading Channels
Published 2014-08-01Get full text
Article -
1382
Elevated high-precision mapping and localization technology for periodic inspections
Published 2025-02-01Get full text
Article -
1383
Identification of Environmental Anomalies in Enterprises Based on Electricity Consumption Data Mining
Published 2025-02-01Get full text
Article -
1384
Risk Analysis and Control Measures for Slurry Shield Tunneling Diagonally under an Urban River Embankment
Published 2020-01-01Get full text
Article -
1385
Ship Bow Force-Deformation Curves for Ship-Impact Demand of Bridges considering Effect of Pile-Cap Depth
Published 2014-01-01Get full text
Article -
1386
Research on Solving Path of Negative Effect of “Information Cocoon Room” in Emergency
Published 2022-01-01“…Based on information ecology theory and the S-O-R model, this study designed questionnaires using a Likert five-level scale and selected 388 publics from several smart city pilot areas in Changsha, Zhuzhou, Shaoshan, and Yueyang cities in Hunan Province. …”
Get full text
Article -
1387
-
1388
Recent Advances in Electrocatalysts for Carbon Dioxide Reduction
Published 2025-01-01Get full text
Article -
1389
An Accurate Measurement Method for Tension Force of Short Cable by Additional Mass Block
Published 2021-01-01Get full text
Article -
1390
-
1391
-
1392
A Compressive Review on High- and Low-Temperature Performance of Asphalt Modified with Nanomodifier
Published 2021-01-01Get full text
Article -
1393
-
1394
-
1395
Ensemble graph auto-encoders for clustering and link prediction
Published 2025-01-01Get full text
Article -
1396
Landscape Image Layout Optimization Extraction Simulation of 3D Pastoral Complex under Big Data Analysis
Published 2020-01-01Get full text
Article -
1397
-
1398
A Mixed Equilibrium Model and Optimal Path Platooning Method for CAV Platoons in Heterogeneous Traffic Flow
Published 2023-01-01Get full text
Article -
1399
-
1400
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01Get full text
Article