標(biāo)題: Titlebook: Advances in Intelligent Information Hiding and Multimedia Signal Processing; Proceeding of the II Jeng-Shyang Pan,Zhenyu Meng,Maria Virvou [打印本頁(yè)] 作者: JAR 時(shí)間: 2025-3-21 18:52
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing影響因子(影響力)
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing影響因子(影響力)學(xué)科排名
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing網(wǎng)絡(luò)公開度
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing被引頻次
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing被引頻次學(xué)科排名
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing年度引用
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing年度引用學(xué)科排名
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing讀者反饋
書目名稱Advances in Intelligent Information Hiding and Multimedia Signal Processing讀者反饋學(xué)科排名
作者: 難取悅 時(shí)間: 2025-3-21 21:28
Finite geometries and Clifford algebras IIIcessing speed. The results of within-subject and cross-subject experiments on BCI competition dataset and ConnectomeDB dataset show that the classification accuracy and generalization performance of the proposed scheme are superior to traditional schemes based on features extraction.作者: THROB 時(shí)間: 2025-3-22 02:06 作者: sultry 時(shí)間: 2025-3-22 08:27
https://doi.org/10.1007/978-1-4612-1368-0from the network topology From the structural point of view, the attack graph is constructed from the network topology through the attack graph generation algorithm to determine the vulnerability and reachability of each node, and to correspond to the Bayesian network. The method is based on the Bay作者: 搜尋 時(shí)間: 2025-3-22 09:04 作者: Anemia 時(shí)間: 2025-3-22 15:05 作者: 生命 時(shí)間: 2025-3-22 19:21 作者: Lacerate 時(shí)間: 2025-3-23 00:01 作者: 期滿 時(shí)間: 2025-3-23 04:50
Research on Evaluation Method of Network Vulnerability in Power Monitoring System,978-3-662-32597-1作者: 蓋他為秘密 時(shí)間: 2025-3-23 07:11
The Clustering Algorithm Based on Improved Antlion Optimization Algorithm with K-Means Concepts,978-3-658-40063-7作者: 粗鄙的人 時(shí)間: 2025-3-23 10:58
,Reversible Data Hiding Based on?Multiple Strategies,978-3-662-31496-8作者: 包裹 時(shí)間: 2025-3-23 14:20 作者: 榨取 時(shí)間: 2025-3-23 18:57
RGB Image Guided Depth Hole-Filling Using Bidirectional Attention Mechanism,978-3-662-24740-2作者: placebo 時(shí)間: 2025-3-23 22:23
Optimal Design of an Ecological Alarm Display for Automatic Train Supervision System,978-3-663-20257-8作者: 粗糙 時(shí)間: 2025-3-24 05:59
The Investigation of Process Temperature and Infill Rate on Mechanical Characteristic of Polylactic作者: BANAL 時(shí)間: 2025-3-24 07:20
Advances in Intelligent Information Hiding and Multimedia Signal ProcessingProceeding of the II作者: INTER 時(shí)間: 2025-3-24 12:04
Speech Manipulation Detection Method Using Speech Fingerprints and Timestamp Data,ehr einzuleiten, sollten die technischen Hochschulen nicht gegenüber den Universit?ten einerseits und den technischen Mittelschulen anderseits ihre Existenzberechtigung überhaupt verlieren. Die Wiener Hochschule hat jedenfalls die Gelegenheit, die sich vor vier Jahren bot, genützt und eine weitgehende Reform 978-3-7091-3556-3作者: Gyrate 時(shí)間: 2025-3-24 18:54
A PHR Sharing Model Based on Tangle and PRE,thematik treiben hei?t, aus einem gegebenen System von scharf und eindeutig formulierten Aussagen, den ., mit Hilfe bestimmter, logisch einwandfreier Methoden andere Aussagen herzuleiten. Allerdings scheint mir, da? die Juristen ziemlich dasselbe tun; ihre Pr?missen sind die von Parlament und Regier作者: 無(wú)法解釋 時(shí)間: 2025-3-24 19:35 作者: 平靜生活 時(shí)間: 2025-3-25 00:29 作者: Carbon-Monoxide 時(shí)間: 2025-3-25 05:10 作者: Lipoprotein(A) 時(shí)間: 2025-3-25 08:33
Unscented Kalman Filter for UAV Real-Time Localizating Dynamic Target on the Ground,t aus, von diesem kommt man durch Halbierung der vier Kreisbogen zum regelm??igen Achteck, von diesem wieder durch Halbierung der acht Kreisbogen zum Sechzehneck usf. Offenbar wird der Inhalt .. des regelm??igen 2.-Eckes, zu dem man nach . — 2 Schritten gekommen ist, mit wachsendem . den Kreisinhalt作者: 羅盤 時(shí)間: 2025-3-25 14:56
Pattern Matching Method for Q&A Information Retrieval System,n plante, in denen er eine systematische?Darstellung seiner Philosophie entwickeln wollte. In dieser sind Ethik und Kulturphilosophie?Teile eines zusammenh?ngenden Ganzen, neben der Geschichte der?Philosophie, Logik, Naturphilosophie und Erkenntnistheorie.?.作者: EWER 時(shí)間: 2025-3-25 16:12 作者: 開頭 時(shí)間: 2025-3-25 23:44 作者: 哪有黃油 時(shí)間: 2025-3-26 03:00 作者: –FER 時(shí)間: 2025-3-26 07:20
Biregular Quaternionic Functionsequency of dynamic target tracking and positioning trajectory is significantly reduced, and the continuity of the tracking trajectory curve is better. The average velocity estimation error is 1.5?m/s.作者: LATHE 時(shí)間: 2025-3-26 08:51 作者: 詼諧 時(shí)間: 2025-3-26 13:21 作者: ODIUM 時(shí)間: 2025-3-26 16:54
Rafa? Ab?amowicz,Bertfried Fauserergence speed. There are five common datasets selected to test the IALO-K algorithm and compared with the traditional K-means and other algorithms. The test results show that the clustering performance of IALO-K algorithm is better than other algorithms.作者: VEIL 時(shí)間: 2025-3-26 23:31
Vector Continued Fraction Algorithmsinfill rate or the process temperature, the tensile characteristics of the PLA material have significantly improved. The enhancement of the elastic modulus and the reduction of the tensile strength and elongation could be summarized.作者: antidepressant 時(shí)間: 2025-3-27 02:07 作者: 柔聲地說(shuō) 時(shí)間: 2025-3-27 08:53
J. S. R. Chisholm,R. S. FarwellHR is shared with medical institutions through lightweight PRE. The Tangle is adopted to meet the demand of high throughput PHR generated by IoMT, and the lightweight PRE provides effective PHR sharing while protecting patient‘s privacy.作者: 注意力集中 時(shí)間: 2025-3-27 09:45
Artibano Micali,Orlando E. Villamayorl region segmentation search algorithm, combined with the prior probability map to guide the UAV formation search direction. The experimental results show that the multi-UAV collaborative search method using single-side angle region segmentation reduces the invalid search of UAV formations and improves the search efficiency.作者: Notorious 時(shí)間: 2025-3-27 16:12 作者: Digitalis 時(shí)間: 2025-3-27 21:49
Clifford Algebra of Quantum Logicst pixels such that three largest pixels can be embedded with 2 bits at most. Besides, multiple scanning ways are exploited to further improve the number of prediction errors valued 1 and 0. Experimental results also demonstrate the proposed method is effective.作者: Concerto 時(shí)間: 2025-3-27 23:31
Vahlen Matrices for Non-Definite Metricshad six components. In the last stage, the usability of new alarm interface was tested, and the skill-rule-knowledge was analyzed. The new alarm interface had superiorities in preventing alarm floods and reducing dispatcher workload.作者: Spongy-Bone 時(shí)間: 2025-3-28 02:07 作者: 使害羞 時(shí)間: 2025-3-28 06:41 作者: 我的巨大 時(shí)間: 2025-3-28 12:25 作者: 慎重 時(shí)間: 2025-3-28 16:13
Antony Lewis,Anthony Lasenby,Chris Doranstored. In the proposed scheme, the reconstructed secret image has the same size as the original secret image. There is no pixel expansion. The scheme extends the progressive visual secret sharing (PVSS) to the quantum framework, and the experimental results verify the effectiveness and feasibility of the scheme.作者: 轉(zhuǎn)向 時(shí)間: 2025-3-28 20:04
On ,-Deformations of Clifford Algebrasion mechanism which takes the surrounding valid values as the auxiliary information to focus on the process of depth hole-filling from edge to center. The proposed method achieves competitive performance on existing public datasets.作者: Chagrin 時(shí)間: 2025-3-29 02:35
Rafa? Ab?amowicz,Pertti Lounestoults with the previous methods show that the proposed method with EHSA produces total power generation higher and the calculation time faster convergence speed, respectively, than other competitive methods. The proposed method provides a feasible way to solve the optimal dispatching model of cascade reservoir planning in power generation.作者: 失望未來(lái) 時(shí)間: 2025-3-29 06:47
https://doi.org/10.1007/978-981-19-1053-1Information Hiding; Multimedia; Signal Processing; IIH-MSP 2021 Proceedings; Network Security; Big Data; C作者: Campaign 時(shí)間: 2025-3-29 07:55 作者: ANN 時(shí)間: 2025-3-29 12:12
Jeng-Shyang Pan,Zhenyu Meng,Maria VirvouPresents recent innovative research in the field of information technology.Discusses the outcomes of IIHMSP 2021, held in Kaohsiung, Taiwan.Serves as a reference resource for researchers and practitio作者: orthodox 時(shí)間: 2025-3-29 15:59 作者: 擁護(hù) 時(shí)間: 2025-3-29 23:22 作者: JUST 時(shí)間: 2025-3-30 03:38
https://doi.org/10.1007/978-94-015-8090-8fingerprints extracted from audio recordings along with the time stamp data are embedded into audio recordings as watermarks for tamper detection. The decoder uses fingerprints extracted from the audio recording itself to detect tampering. The vector distance between fingerprints obtained from the w作者: Pulmonary-Veins 時(shí)間: 2025-3-30 07:31
J. S. R. Chisholm,R. S. FarwellPHR) generated by the wearable devices in IoMT has become more and more important for the diagnosis and treatment of patients. A PHR sharing model based on Tangle and proxy re-encryption (PRE) is proposed in this paper. In the model, the PHR hash and operation log are stored in the Tangle, and the P作者: 虛構(gòu)的東西 時(shí)間: 2025-3-30 08:40 作者: Fibrinogen 時(shí)間: 2025-3-30 13:10 作者: VEN 時(shí)間: 2025-3-30 17:34
J. S. R. Chisholm,R. S. Farwelltrol management mode and flow management mode. This not only improves the design efficiency of state machine to some extent but also enhances the portability of system sub-modules. Moreover, the article also provides a new thought for state machine design process. Different from the traditional stat作者: Peculate 時(shí)間: 2025-3-31 00:33 作者: obsession 時(shí)間: 2025-3-31 04:50 作者: Volatile-Oils 時(shí)間: 2025-3-31 05:45 作者: myalgia 時(shí)間: 2025-3-31 09:55
Monogenic and Holomorphic Functionsomparing to traditional methods, deep learning could achieve better performances. Challenges of this work include changes of illumination, foreground objects shadows, dynamic background motion, camera motion, camouflage, or subtle regions. In addition, the postures of the workers are flexible, the w作者: Infiltrate 時(shí)間: 2025-3-31 15:51
Wies?aw Królikowski,R. Michael Portercult task. In this paper, we proposed a Q&A Information Retrieval system for computer textbooks based on the Pattern Matching method, called the PM-IR system, which achieves accurate retrieval of textbook information and intelligent Q&A. Firstly, the Term Frequency-Inverse Document Frequency-Inverse作者: 樹膠 時(shí)間: 2025-3-31 17:39
https://doi.org/10.1007/978-1-4612-1368-0wer monitoring system network security. How to understand and evaluate the security of the network has become the focus of the power monitoring system network. In response to this problem, this article proposes a vulnerability assessment method. The purpose is to find out the hidden security risks i作者: Intact 時(shí)間: 2025-4-1 00:00
Rafa? Ab?amowicz,Bertfried Fauserprovement such as its results easily affected by the assigned initial values and prone to fall into a local optimum. In this paper, a clustering algorithm based on an improved Antlion optimization algorithm with K-means concepts (IALO-K) is proposed. First, the elite strategy of the Antlion Optimiza