標(biāo)題: Titlebook: Advanced Computing and Systems for Security; Volume 1 Rituparna Chaki,Agostino Cortesi,Nabendu Chaki Book 2016 Springer India 2016 Biometri [打印本頁] 作者: Lincoln 時(shí)間: 2025-3-21 17:49
書目名稱Advanced Computing and Systems for Security影響因子(影響力)
書目名稱Advanced Computing and Systems for Security影響因子(影響力)學(xué)科排名
書目名稱Advanced Computing and Systems for Security網(wǎng)絡(luò)公開度
書目名稱Advanced Computing and Systems for Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advanced Computing and Systems for Security被引頻次
書目名稱Advanced Computing and Systems for Security被引頻次學(xué)科排名
書目名稱Advanced Computing and Systems for Security年度引用
書目名稱Advanced Computing and Systems for Security年度引用學(xué)科排名
書目名稱Advanced Computing and Systems for Security讀者反饋
書目名稱Advanced Computing and Systems for Security讀者反饋學(xué)科排名
作者: 神化怪物 時(shí)間: 2025-3-21 21:18 作者: 松馳 時(shí)間: 2025-3-22 00:29
A Comparative Analysis of Image Segmentation Techniques Toward Automatic Risk Prediction of Solitary978-3-642-51812-6作者: VALID 時(shí)間: 2025-3-22 06:49
Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment978-3-662-09271-2作者: 借喻 時(shí)間: 2025-3-22 12:12 作者: 劇本 時(shí)間: 2025-3-22 13:59
The Design of Hierarchical Routing Protocol for Wireless Sensor Network978-3-642-95974-5作者: 殘酷的地方 時(shí)間: 2025-3-22 17:07
Network Selection Using AHP for Fast Moving Vehicles in Heterogeneous Networks978-3-7091-5330-7作者: Mortal 時(shí)間: 2025-3-22 22:19
2194-5357 ntication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering..978-81-322-2648-2978-81-322-2650-5Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 充氣球 時(shí)間: 2025-3-23 04:55 作者: 寵愛 時(shí)間: 2025-3-23 09:07 作者: Hypopnea 時(shí)間: 2025-3-23 10:11 作者: 寬大 時(shí)間: 2025-3-23 14:48
and post traumatic stress disorder. The complex issues involving the diagnosis and treatment of depression during pregnancy is thoroughly reviewed in Chapter 8 and provides a synthesis of the scientific literature in the area, one that is noted for contradictory and controversial findings, as well 作者: Dungeon 時(shí)間: 2025-3-23 18:13 作者: 頭腦冷靜 時(shí)間: 2025-3-23 22:48 作者: 變態(tài) 時(shí)間: 2025-3-24 05:51 作者: 吸引力 時(shí)間: 2025-3-24 07:01
Securing Service in Remote Healthcareropriately managing such patients, especially long -term. In this chapter, examples of real-life studies about some of these challenging issues will be described,as reported from the post-marketing event-monitoring systems, now known as Modified Prescription-Event Monitoring (M-PEM) and Specialist Cohort Event Monitoring (SCEM).作者: 牢騷 時(shí)間: 2025-3-24 13:50
Inference of Gene Regulatory Networks with Neural-Cuckoo Hybriduture trends, the book also explains in detail methods used in covert and overt observations in pharmacy practice, as well as methods involved in realist research, which are important to countries seeking to produce evidence-based information in this area..作者: 高興去去 時(shí)間: 2025-3-24 15:53 作者: 洞察力 時(shí)間: 2025-3-24 23:02 作者: Mammal 時(shí)間: 2025-3-25 01:12 作者: aviator 時(shí)間: 2025-3-25 03:23
Liver Fibrosis Diagnosis Support System Using Machine Learning Methodsn, and its separation from medicine...The author considers the extent to which the British model of pharmacy shaped pharmacy in the Empire, exploring the situation in the Divisions of Empire where the 1914 .Bri978-3-030-78982-4978-3-030-78980-0作者: 蚊帳 時(shí)間: 2025-3-25 10:42 作者: 膠狀 時(shí)間: 2025-3-25 13:11
Advanced Computing and Systems for Security978-81-322-2650-5Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: NOVA 時(shí)間: 2025-3-25 16:52 作者: 確定方向 時(shí)間: 2025-3-25 23:45
In-Memory Data Management Researchd to generate the guide tree where two different matrices such as edit distance or dynamic distance have been used. The performance of the proposed method has been tested on Bali base with some of the existing methods such as, HMMT, DIALIGN, ML–PIMA, and PILEUP8. It has been observed that the proposed method perform better in most of the cases.作者: 奇思怪想 時(shí)間: 2025-3-26 00:45 作者: 枯萎將要 時(shí)間: 2025-3-26 06:11
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/a/image/145383.jpg作者: 笨重 時(shí)間: 2025-3-26 10:31
Karsten Saller,Kamill Panitzek,Max LehnIn this paper, we propose three new approaches to detect and prevent SQL Injection Attacks (SQLIA), as an alternative to the existing solutions namely: (i) Query Rewriting-based approach, (ii) Encoding-based approach, and (iii) Assertion-based approach. We discuss in detail the benefits and shortcomings of the proposals w.r.t. the literature.作者: Sedative 時(shí)間: 2025-3-26 15:51 作者: PLE 時(shí)間: 2025-3-26 19:16
Christian Gro?,Bj?rn Richerzhagen,Max Lehnt in biometrics it is still in its infancy. This article is intended to present the state of art into heart-based biometrics and also explore the possibility of using HRV in biometric recognition systems. Subsequently, we designed hardware and software for data collection and also developed software作者: 痛恨 時(shí)間: 2025-3-26 23:55 作者: 輕彈 時(shí)間: 2025-3-27 04:38
In-Memory Data Management Researchurce. Securing service is a big concern for this kind of application. Encoding is required before uploading data to remote web server. Identity management is another primary aspect to validate any service. One-time identity verification during login has no importance, because valid session may be hi作者: 相一致 時(shí)間: 2025-3-27 08:02 作者: Console 時(shí)間: 2025-3-27 13:13 作者: JAMB 時(shí)間: 2025-3-27 17:23
https://doi.org/10.1007/978-3-642-38070-9ity—it may stay hidden for many years or rapidly develop into terminal stage called cirrhosis, where liver can no longer fulfill its function. Unfortunately, current methods of diagnosis are either connected with a potential risk for a patient and require a hospitalization or are expensive and not v作者: 不可知論 時(shí)間: 2025-3-27 18:58
https://doi.org/10.1007/978-3-642-38070-9ion computing. As technology is growing much faster, data protection is getting more important and it is necessary to design the unbreakable encryption technology to protect the information. In this paper, we proposed a biotic DNA-based secret key cryptographic mechanism, seeing as DNA computing had作者: jagged 時(shí)間: 2025-3-27 22:54 作者: hair-bulb 時(shí)間: 2025-3-28 02:26
https://doi.org/10.1007/978-3-642-38070-9ases the death rate. With the help of improvement in medical imaging technology, a computer-aided diagnostics system could be an aid to combat this disease. Automatic segmentation of a region of interest is one of the most challenging problem in medical image analysis. An inaccurate segmentation of 作者: conifer 時(shí)間: 2025-3-28 09:57
https://doi.org/10.1007/978-3-642-38070-9ymen. The ready availability of storage, compute, and infrastructure services provides a potentially attractive option for business enterprises to process and store data without investing on computing infrastructure. The attractions of Cloud are accompanied by many concerns among which Data Security作者: HAVOC 時(shí)間: 2025-3-28 11:11
In-Memory Data Management Researchrotocol. However, data aggregation should come with a cost of delay in packet forwarding time. It has been seen that increasing the transmission distance could increase the network lifetime. However, our observation shows that after a certain point, lifetime readings of the network would dip for a d作者: separate 時(shí)間: 2025-3-28 17:17
https://doi.org/10.1007/978-3-642-38070-9 redundancy and a huge amount of energy drainage within the network. Use of a head node for a cluster can be a better solution. The proposed algorithm creates several clusters, selects a cluster head, aggregates the data, and sends that to base station through other cluster heads. Simulation result 作者: 提升 時(shí)間: 2025-3-28 21:38 作者: Fierce 時(shí)間: 2025-3-29 00:03 作者: Entirety 時(shí)間: 2025-3-29 06:11
In-Memory Data Management Researchamework is proposed here to ensure availability of health-care resource to valid end users. This service is capable to reduce time complexity, bandwidth cost, and to increase accuracy and attack resistance capacity. Theoretical analysis shows its efficiency.作者: Thyroid-Gland 時(shí)間: 2025-3-29 10:55
https://doi.org/10.1007/978-3-642-38070-9uckoo Search optimization. The developed technique has been applied on the real-world microarray dataset of Lung Adenocarcinoma for detection of genes which may be directly responsible for the cause of Lung Adenocarcinoma.作者: 切割 時(shí)間: 2025-3-29 15:07
https://doi.org/10.1007/978-3-642-38070-9y individual service providers as well as by a third party identity provider. The proposed two-factor authentication protocols uses password as the first factor and a Smart card or Mobile Phone as the second factor. The protocols are resistant to various known security attacks.作者: OVERT 時(shí)間: 2025-3-29 18:14
In-Memory Data Management Research is distance vector protocol in nature. We have compared its lifetime with some other Fermat point based protocols and studied the effect of aggregation factor on cumulative delay for packet forwarding. Moreover, effect of increased transmission radius on the lifetime of the proposed protocol too was studied.作者: 溫和女孩 時(shí)間: 2025-3-29 22:11
Book 2016Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volume作者: dithiolethione 時(shí)間: 2025-3-30 02:22
2194-5357 cations to provide design, analysis, and model for key areas.The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India作者: Decimate 時(shí)間: 2025-3-30 04:56
Christian Gro?,Bj?rn Richerzhagen,Max Lehnf a users’ data protection, an encryption of keystrokes was implemented. A new method of a computer user profiling based on encrypted keystrokes is introduced. Additionally, an attempt to an intrusion detection based on the .-NN classifier is performed.作者: 支形吊燈 時(shí)間: 2025-3-30 09:41
Book 2016s and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering..作者: encyclopedia 時(shí)間: 2025-3-30 14:54
https://doi.org/10.1007/978-3-642-38070-9 may be used to build an advanced liver fibrosis diagnosis support system based on a nonexpensive and safe routine blood tests. Experiments carried out on a dataset collected by authors, proved usability and satisfactory accuracy of the presented algorithms.作者: Parabola 時(shí)間: 2025-3-30 18:56
https://doi.org/10.1007/978-3-642-38070-9tation techniques, which can automatically segment the solitary pulmonary nodules from high-resolution computed tomography (CT) images and then we propose a computerized lung nodule risk prediction model based on the best segmentation technique.作者: synovitis 時(shí)間: 2025-3-30 22:27 作者: 可商量 時(shí)間: 2025-3-31 03:37
Front Matterencing dysregulation of mood .. Although pregnancy has commonly been considered a time of emotional well-being, recent data indicate that 10% of women of childbearing age experience clinically significant depressive symptoms, and those with a history of major depression are at a greater risk for rec作者: 吞沒 時(shí)間: 2025-3-31 07:47
w chapters by expert contributors. The first chapter reviews the neurobiology of depression, which lays the groundwork for understanding the mechanisms of action of antidepressants. In the next chapter, a review of the general principles guiding the diagnosis and medication treatment of unipolar dep作者: 寒冷 時(shí)間: 2025-3-31 09:18 作者: 代理人 時(shí)間: 2025-3-31 16:11
Heart-Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systemsolved. This book stems from thoughts and ideas discussed in a series of meetings of the International Society of Pharmacovigilance (ISoP), where concerns were raised that the current pharmacovigilance system is not delivering optimally to improve therapeutics in clinical practice...Pharmacovigilance作者: LATHE 時(shí)間: 2025-3-31 21:08
Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses Over Galois Field GF(73)he world. From its foundational principles to cutting-edge advancements and future challenges, this book provides a thorough understanding of the field‘s intricacies. The book begins by establishing the fundamentals of pharmacovigilance, emphasizing its significance in monitoring, detecting, assessi作者: 閃光你我 時(shí)間: 2025-3-31 23:39 作者: Bravado 時(shí)間: 2025-4-1 04:57 作者: Vsd168 時(shí)間: 2025-4-1 06:41