Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
V2VR: reliable hybrid-network-oriented V2V data transmission and routing considering RSUs and connectivity probability
Vehicular ad hoc networks (VANETs) have been widely used in intelligent transportation
systems (ITSs) for purposes such as the control of unmanned aerial vehicles (UAVs) and …
systems (ITSs) for purposes such as the control of unmanned aerial vehicles (UAVs) and …
The cloud-edge-based dynamic reconfiguration to service workflow for mobile ecommerce environments: a QoS prediction perspective
H Gao, W Huang, Y Duan - ACM Transactions on Internet Technology …, 2021 - dl.acm.org
The emergence of mobile service composition meets the current needs for real-time
eCommerce. However, the requirements for eCommerce, such as safety and timeliness, are …
eCommerce. However, the requirements for eCommerce, such as safety and timeliness, are …
A hybrid approach to trust node assessment and management for vanets cooperative data communication: Historical interaction perspective
Vehicular ad hoc networks (VANETs) provide self-organized wireless multihop transmission,
where nodes cooperate with each other to support data communication. However, malicious …
where nodes cooperate with each other to support data communication. However, malicious …
Internet of things and cloud convergence for ehealth systems: concepts, opportunities, and challenges
Healthcare and technology have a long history of interaction but eHealth adoption has been
delayed due to a lack of infrastructure, capacity, and political will. It is called a health …
delayed due to a lack of infrastructure, capacity, and political will. It is called a health …
Mobility based trust evaluation for heterogeneous electric vehicles network in smart cities
Smart cities can manage assets and resources efficiently by using different types of
electronic data collection sensors, devices and vehicles. However, growing complexity of …
electronic data collection sensors, devices and vehicles. However, growing complexity of …
Feature extraction and analysis of natural language processing for deep learning English language
D Wang, J Su, H Yu - IEEE Access, 2020 - ieeexplore.ieee.org
NLP (Natural Language Processing) is a technology that enables computers to understand
human languages. Deep-level grammatical and semantic analysis usually uses words as …
human languages. Deep-level grammatical and semantic analysis usually uses words as …
Swarm Differential Privacy for Purpose‐Driven Data‐Information‐Knowledge‐Wisdom Architecture
Privacy protection has recently been in the spotlight of attention to both academia and
industry. Society protects individual data privacy through complex legal frameworks. The …
industry. Society protects individual data privacy through complex legal frameworks. The …
A privacy preserving distributed ledger framework for global human resource record management: The blockchain aspect
Blockchain is a technology used with the series of users in peer-to-peer transactions to
utilize the usability properties of the immutable data records. The distributed nature of this …
utilize the usability properties of the immutable data records. The distributed nature of this …
3D semantic map construction using improved ORB-SLAM2 for mobile robot in edge computing environment
X Cui, C Lu, J Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Although the existing localization and map** (SLAM) technology of indoor mobile robot
has made great development, its intelligence and environmental perception ability still …
has made great development, its intelligence and environmental perception ability still …
Categorizing malware via A Word2Vec-based temporal convolutional network scheme
As edge computing paradigm achieves great popularity in recent years, there remain some
technical challenges that must be addressed to guarantee smart device security in Internet …
technical challenges that must be addressed to guarantee smart device security in Internet …