浏览/检索结果:共8条,第1-8条

已选(0)清除 条数/页:   排序方式:
Digital modeling and grading evaluation of fabric softness for online trading 会议论文
Proceedings of 2024 4th International Conference on Computational Modeling, Simulation and Data Analysis, CMSDA 2024
作者:  Du,Jianxia;  Yuan,Mengya;  Du,Haoze;  Huang,Pan;  Zhu,Mengke
收藏  |  浏览/下载:21/0  |  提交时间:2025/07/22
Carbon Audit Evaluation Based on Entropy-TOPSIS Method in China's Power Industry 会议论文
Advances in Transdisciplinary Engineering, Virtual, Online, 29 June 2022
作者:  Bai, Huimin;  Lin, Shujia;  Wang, Cuilin
收藏  |  浏览/下载:15/0  |  提交时间:2022/11/14
Mathematical evaluation model of the relationship between earnings and under-pricing in the long-term through big data analysis and calculation 会议论文
2022 IEEE 2nd International Conference on Power, Electronics and Computer Applications, ICPECA 2022, Shenyang, January 21-23, 2022
作者:  Zhang, Wanlin;  Zhang, Kaixuan;  Lin, Haoqi;  Qiao, Longxuan;  Han, Lei
收藏  |  浏览/下载:11/0  |  提交时间:2022/05/05
Data Augmentation and Class Based Model Evaluation for Load Disaggregation Based on Deep Learning 会议论文
The Proceedings of the 9th Frontier Academic Forum of Electrical Engineering, Volume II, Xi'an, China, August 2020
作者:  Li, Bo;  Li, Yandi;  Liang, Changyuan;  Su, Weifeng;  Xuanyuan, Zhe
收藏  |  浏览/下载:28/0  |  提交时间:2021/10/19
Comparison and evaluation of the Chang'E microwave radiometer data based on theoretical computation of brightness temperatures at the Apollo 15 and 17 sites 期刊论文
Icarus,2017, 卷号: 294, 页码: 72-80
作者:  Hu, Guo Ping;  Chan, Kwing L.;  Zheng, Yong Chun;  Tsang, Kang T.;  Xu, Ao Ao
收藏  |  浏览/下载:9/0  |  提交时间:2021/10/19
Trust-risk-game based access control in cross domain application 会议论文
Communications in Computer and Information Science
作者:  Li,Yan;  Ren,Jinqiang;  Sun,Huiping;  Luo,Haining;  Chen,Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2025/08/05
Information system security evaluation method based on FCME model 期刊论文
Jisuanji Gongcheng/Computer Engineering,2006, 卷号: 32, 期号: 2
作者:  Yan,Qiang;  Shu,Huaying;  Chen,Zhong;  Duan,Yunsuo
收藏  |  浏览/下载:2/0  |  提交时间:2025/08/05
Object-oriented method for information system security evaluation 期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications,2005, 卷号: 28, 期号: 4, 页码: 69-73
作者:  Yan,Qiang;  Shu,Hua Ying;  Chen,Zhong;  Duan,Yun Suo
收藏  |  浏览/下载:4/0  |  提交时间:2025/08/05