標題: Titlebook: Applied Computation and Security Systems; Volume Two Rituparna Chaki,Khalid Saeed,Nabendu Chaki Book 2015 Springer India 2015 Biometrics-ba [打印本頁] 作者: 帳簿 時間: 2025-3-21 18:26
書目名稱Applied Computation and Security Systems影響因子(影響力)
書目名稱Applied Computation and Security Systems影響因子(影響力)學科排名
書目名稱Applied Computation and Security Systems網(wǎng)絡公開度
書目名稱Applied Computation and Security Systems網(wǎng)絡公開度學科排名
書目名稱Applied Computation and Security Systems被引頻次
書目名稱Applied Computation and Security Systems被引頻次學科排名
書目名稱Applied Computation and Security Systems年度引用
書目名稱Applied Computation and Security Systems年度引用學科排名
書目名稱Applied Computation and Security Systems讀者反饋
書目名稱Applied Computation and Security Systems讀者反饋學科排名
作者: 表兩個 時間: 2025-3-21 23:17
A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and RestorationA discrete wavelet transform (DWT)-based watermarking scheme for this purpose is proposed in this communication. In our scheme, the original image is first partitioned into blocks of size 2?×?2 in which a 1D DWT is applied to produce a watermark which is embedded in four disjoint partitions of the i作者: 蝕刻 時間: 2025-3-22 02:45 作者: 諂媚于性 時間: 2025-3-22 06:24 作者: epicardium 時間: 2025-3-22 10:36
A Lightweight Implementation of Obstruction-Free Software Transactional Memoryncurrency and faster execution. This paper proposes a simple, lightweight, and yet efficient implementation of OFTM. The major contribution of the paper is in proposing a new STM algorithm that uses simple data structure. This does not require any contention manager toward ensuring progress conditio作者: aneurysm 時間: 2025-3-22 14:09 作者: 枯萎將要 時間: 2025-3-22 18:45 作者: 艱苦地移動 時間: 2025-3-22 22:07 作者: Vsd168 時間: 2025-3-23 01:33 作者: 沙發(fā) 時間: 2025-3-23 07:01
A New Move Toward Parallel Assay Operations in a Restricted Sized Chip in Digital Microfluidicsry experiments, it is also widely known as ‘lab-on-a-chip’ (LOC). Minimization in pin count and avoiding cross-contamination are some of the important design issues for realistic relevance. These days, due to urgent situation and cost efficacy, more than one assay operations are essential to be carr作者: JEER 時間: 2025-3-23 10:36
A 2D Guard Zone Computation Algorithm for Reassignment of Subcircuits to Minimize the Overall Chip Af the major purposes is to find an optimized way to place a set of 2D blocks on a chip floor. In VLSI layout design, the circuit components (or the functional units/modules or groups/blocks of different subcircuits) are not supposed to be placed much closer to each other in order to avoid electrical作者: 討厭 時間: 2025-3-23 17:32
Rituparna Chaki,Khalid Saeed,Nabendu ChakiProvides information on recent research trends in areas of computational intelligence, communications, data mining and computational models.Includes theories and applications to provide design, analys作者: 良心 時間: 2025-3-23 20:54
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/a/image/159682.jpg作者: Musket 時間: 2025-3-24 00:52
Applied Computation and Security Systems978-81-322-1988-0Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: Intruder 時間: 2025-3-24 04:37
https://doi.org/10.1007/978-81-322-1988-0Biometrics-based Authentication; Data Mining; Image Processing Techniques; Next Generation Networking; R作者: babble 時間: 2025-3-24 10:29 作者: ADOPT 時間: 2025-3-24 14:43
Kurosh Madani,Ghislain de TremiollesA discrete wavelet transform (DWT)-based watermarking scheme for this purpose is proposed in this communication. In our scheme, the original image is first partitioned into blocks of size 2?×?2 in which a 1D DWT is applied to produce a watermark which is embedded in four disjoint partitions of the i作者: nugatory 時間: 2025-3-24 15:45
S. J. Almalowi,D. E. Oztekin,A. Oztekin those cloud services is based on the satisfaction of customers with respect to the pre-defined QoS. Deviation of QoS as mentioned in SLA results dissatisfaction among users. A large numbers of business entities and consumers are involved in this service delivery process. In business environment, gu作者: Gleason-score 時間: 2025-3-24 21:36
Xuewen Wang,Bo Li,Rui Xia,Haozhou Mae significantly beneficiary in the software design phase due to their complimentary features. UML diagrams are very useful in communication among different stakeholders, but at the same time, being semiformal in nature, they lack formal syntax and preciseness due to textual description in notations.作者: Urologist 時間: 2025-3-24 23:43 作者: 借喻 時間: 2025-3-25 05:15
https://doi.org/10.1007/978-3-319-34115-6 . is a prime integer and both . and .?≥?2. For GF(2.), the Extended Euclidean Algorithm (EEA) successfully finds multiplicative inverses of all the 255 elemental polynomials under each of 30 irreducible polynomials. However, for GF(7.), the same algorithm cannot find multiplicative inverses of all 作者: ARENA 時間: 2025-3-25 08:58
Optical Physics and Engineeringaditional authentication methods such as passwords and identity documents are not sufficient to combat ID theft or ensure security. Such representations of identity can easily be forgotten, lost, guessed, stolen, or shared. On the contrary, biometric systems recognize individuals based on their anat作者: aqueduct 時間: 2025-3-25 13:48
Travelling gantry crane with suspended mass,esis approaches for reversible circuits have been reported over the last decade. Among these approaches, those based on the exclusive-or sum-of-products (ESOP) realization of functions have been explored by many researchers because of two important reasons: large circuits can be handled, and the map作者: 有其法作用 時間: 2025-3-25 17:42
Studies in Computational Intelligences is one of the most challenging requirements to enhance the performance of a chip to be designed. Interconnection with minimum wire length occupies minimum area and has minimum overall capacitance and resistance present in a circuit. Reducing the total wire length for interconnection minimizes the 作者: 小淡水魚 時間: 2025-3-26 00:01 作者: Musket 時間: 2025-3-26 01:40 作者: 諄諄教誨 時間: 2025-3-26 07:57
2194-5357 graphy.?with two book chapters in it.?Part 6?of this volume is on?.Computer Aided Design.?with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation 978-81-322-1987-3978-81-322-1988-0Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 擴大 時間: 2025-3-26 09:22 作者: 津貼 時間: 2025-3-26 13:57
S. J. Almalowi,D. E. Oztekin,A. Oztekinonsumers is necessary. This paper proposes a novel methodology termed as service insurances, which is incorporated into the service broker as a new module. The proposed concept is expected to ensure customer’s satisfaction in context of a business application domain.作者: 必死 時間: 2025-3-26 19:37
Optical Physics and Engineeringation and the ability to detect whether an individual has multiple identity cards (e.g., passports) under different names. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. In this paper, an attempt has been made t作者: 去才蔑視 時間: 2025-3-26 22:05 作者: WATER 時間: 2025-3-27 02:09
Engineering Applications of Nanotechnologysumes array-based partitioning of modules as pin-constrained design technique, where a constant number of pins have been used for desired scheduling of reagent and sample droplets. To avoid cross-contamination and at the same time to minimize the delay required for washing, wash droplet scheduling a作者: LAST 時間: 2025-3-27 05:18 作者: conception 時間: 2025-3-27 10:24 作者: Clumsy 時間: 2025-3-27 15:24
Service Insurance: A New Approach in Cloud Brokerageonsumers is necessary. This paper proposes a novel methodology termed as service insurances, which is incorporated into the service broker as a new module. The proposed concept is expected to ensure customer’s satisfaction in context of a business application domain.作者: Herd-Immunity 時間: 2025-3-27 20:56 作者: 使困惑 時間: 2025-3-28 00:25 作者: 條約 時間: 2025-3-28 05:41 作者: 惡意 時間: 2025-3-28 06:14 作者: scoliosis 時間: 2025-3-28 11:07 作者: 否認 時間: 2025-3-28 17:26 作者: mechanism 時間: 2025-3-28 21:24
2194-5357 Includes theories and applications to provide design, analys.This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, Ind作者: MORT 時間: 2025-3-28 23:53 作者: Anthrp 時間: 2025-3-29 04:42 作者: Defiance 時間: 2025-3-29 10:07
Kurosh Madani,Ghislain de Tremiollesmage to enhance the chance of restoration of the image from different cropping attack-based tampers. The validity and superiority of the proposed scheme is verified through extensive simulations using different images of two extensively used image databases.