標題: Titlebook: Applied Computing and Information Technology; Roger Lee Conference proceedings 2019 Springer Nature Switzerland AG 2019 Computational Inte [打印本頁] 作者: hormone-therapy 時間: 2025-3-21 17:36
書目名稱Applied Computing and Information Technology影響因子(影響力)
書目名稱Applied Computing and Information Technology影響因子(影響力)學(xué)科排名
書目名稱Applied Computing and Information Technology網(wǎng)絡(luò)公開度
書目名稱Applied Computing and Information Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Applied Computing and Information Technology被引頻次
書目名稱Applied Computing and Information Technology被引頻次學(xué)科排名
書目名稱Applied Computing and Information Technology年度引用
書目名稱Applied Computing and Information Technology年度引用學(xué)科排名
書目名稱Applied Computing and Information Technology讀者反饋
書目名稱Applied Computing and Information Technology讀者反饋學(xué)科排名
作者: 監(jiān)禁 時間: 2025-3-22 00:01 作者: 只有 時間: 2025-3-22 01:03 作者: Hyaluronic-Acid 時間: 2025-3-22 06:55 作者: POLYP 時間: 2025-3-22 12:47
Detection of Replay Attack Traffic in ICS Network,e list based attack detection technology for practical application on ICS. However, current studies on white list based detection technology utilizes a white list based on IP address, service port number information, etc., and thus cannot be utilized to detect attacks exhibiting a replay pattern or 作者: miracle 時間: 2025-3-22 13:57 作者: Overdose 時間: 2025-3-22 20:30
Fracture and Damage of Composite Laminates, the NCS education system has a significant effect on educational satisfaction. Therefore, this study suggested implications for the satisfaction of the values and educational satisfaction of the students in terms of educational service quality provided by the NCS education system.作者: BAIL 時間: 2025-3-23 00:42
Fracture and Damage of Composite Laminates,hat need to be answered are: Which level of abstraction and modeling constructs are adequate for non-expert people to create specialized mobile applications? How can technical details such as device limitations, transmission of information to other devices or to the network, etc., be abstracted from作者: 籠子 時間: 2025-3-23 01:48 作者: 社團 時間: 2025-3-23 08:04
https://doi.org/10.1007/978-3-030-95746-9lood types, in response to external stimulation. The results of this study would provide the basis for classification of subjects, which is necessary for the selection of effective auditory stimulant sound sources in the process of neurofeedback therapy/training, inducing the users to modify their o作者: 祝賀 時間: 2025-3-23 13:32 作者: collagen 時間: 2025-3-23 14:02
Applied Computing and Information Technology978-3-319-98370-7Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 暖昧關(guān)系 時間: 2025-3-23 20:50 作者: 火光在搖曳 時間: 2025-3-24 01:12
Studies in Computational Intelligencehttp://image.papertrans.cn/a/image/159711.jpg作者: 談判 時間: 2025-3-24 06:00
Fracture and Damage of Composite Laminates,or university students A total of 289 college students from Seoul and Gyeonggi provinces were selected for the study and a questionnaire survey was conducted from March to April 2017. The collected questionnaires were analyzed using SPSS 22.0 and AMOS 22.0 statistical programs and the following stud作者: Charitable 時間: 2025-3-24 10:01
Fracture and Damage of Composite Laminates,cation, and automatically transforming this high-level model to platform specific code. The research method is a combination of the model-driven development (MDD) approach in software development and application of techniques in the field of human-computer interaction (HCI) particularly on user cent作者: 夜晚 時間: 2025-3-24 11:40 作者: 廚師 時間: 2025-3-24 18:37 作者: 燈絲 時間: 2025-3-24 20:58
Stress, Strain, and Their Relationships,dy introduces the mixed reality development in architectural design and construction business and suggests design collaboration service platform composed of mixed reality service server, which is a web service system for authoring and managing mixed reality contents, and terminal application that im作者: glomeruli 時間: 2025-3-25 00:27
Adrian Iacovelli,Carine Souveyetl performance of the C4I system and to empirically verify the model. To this end, this study suggested information system quality (system quality, information quality, service quality), perceived usefulness and user satisfaction as antecedent factors affecting the operational performance of the C4I 作者: 亂砍 時間: 2025-3-25 04:54 作者: AVOID 時間: 2025-3-25 08:35
https://doi.org/10.1007/978-3-030-95746-9ns, corporations, culture related businesses, etc., numerous studies have been performed, and the results of such studies have been increasingly applied to the aforementioned organizations. In particular, a book authored by Park Hee-Yeon (2006), titled “Blood Type Reveals the Personality”, showed th作者: coagulation 時間: 2025-3-25 14:23 作者: Blood-Vessels 時間: 2025-3-25 18:48 作者: 墻壁 時間: 2025-3-25 21:56
https://doi.org/10.1007/978-3-030-95746-9ocess and produced a ciphered text. The Data Encryption Standard (DES) algorithm is considerably known for its branded encryption/decryption technique. To explore the advantage of its recognized cycle process and ciphertext representation. This paper presents the new algorithm based on mixed techniq作者: obviate 時間: 2025-3-26 02:19
Frictional Behaviours and Mechanismsty, while accommodating the agglomerative hierarchical clustering paradigm. In comparison to six conventional clustering methods, the proposed method has been shown to achieve better results with cases of clusters of different sizes and varying densities. It successfully replicates the results of th作者: EXUDE 時間: 2025-3-26 07:51
Frictional Behaviours and Mechanismsleep patterns of older infants and adults. Ideal sleep prepares the child to learn when she is awake, and after the learning has taken place during the awake state, the critical processes of memory association occur during sleep. Now Clearly, sleep deprivation, whether it’s for an infant or parents 作者: 勉勵 時間: 2025-3-26 10:29 作者: 拋媚眼 時間: 2025-3-26 16:17
978-3-030-07489-0Springer Nature Switzerland AG 2019作者: 一個攪動不安 時間: 2025-3-26 17:16
Introduction to Component Design,ation. This document is timely because there is significant growth in the use of mobile technology by people around the world, especially in developing countries. This study shows how mobile learning can transform the delivery of education and training.作者: Insensate 時間: 2025-3-26 22:51 作者: 啟發(fā) 時間: 2025-3-27 04:37
Adrian Iacovelli,Carine Souveyeterating effect of use experiences and IS efficacy. This study is meaningful in that it empirically confirmed the factors affecting the operational performance of the C4I system, and suggested the theoretical foundation and the strategic directions for evaluating and improving the operational performance of the C4I system.作者: 暗指 時間: 2025-3-27 06:54 作者: 有危險 時間: 2025-3-27 12:58
E-Learning Adaptation and Mobile Learning for Education,ation. This document is timely because there is significant growth in the use of mobile technology by people around the world, especially in developing countries. This study shows how mobile learning can transform the delivery of education and training.作者: 行業(yè) 時間: 2025-3-27 16:51
A Study on the Architecture of Mixed Reality Application for Architectural Design Collaboration,storing and setting the mixed reality contents on a server, and a collaboration environment can be implemented using an MR device. In addition, proposing a simple mixed reality teleconference system using a relay system to support remote conferencing in mixed reality environment.作者: ALB 時間: 2025-3-27 21:40
Exploring the Improvement of the Defense Information System,erating effect of use experiences and IS efficacy. This study is meaningful in that it empirically confirmed the factors affecting the operational performance of the C4I system, and suggested the theoretical foundation and the strategic directions for evaluating and improving the operational performance of the C4I system.作者: flaunt 時間: 2025-3-27 23:14 作者: 榨取 時間: 2025-3-28 03:13
CipherBit192: Encryption Technique for Securing Data,ue by substituting reverse scheme, swapping and bit-manipulation. This encryption technique is a concept that combines selected cryptographic technique that can reduce and save time processing encryption operation, offers simplicity, and extended mixed encryption key generation.作者: FID 時間: 2025-3-28 08:06
Conference proceedings 2019w ideas and information in a meaningful way. The book includes research findings on all aspects (theory, applications and tools) of computer and information science and discusses the practical challenges encountered and the solutions adopted to address them..The book features 13 of the conference’s most promising papers..作者: CRUC 時間: 2025-3-28 11:10
Conference proceedings 2019 held in Kunming, China on June 13–15, 2018. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange ne作者: 柔美流暢 時間: 2025-3-28 14:58 作者: MEEK 時間: 2025-3-28 19:36
Frictional Behaviours and Mechanismsre that infants are given the comfort they need in order to continuously sleep without disturbing the guardians. To address both issues of deprived sleep for infants and parents and Lasty, a mobile application for the system.作者: incite 時間: 2025-3-29 02:00 作者: connoisseur 時間: 2025-3-29 05:56
Development of Infant Care System Application,re that infants are given the comfort they need in order to continuously sleep without disturbing the guardians. To address both issues of deprived sleep for infants and parents and Lasty, a mobile application for the system.作者: 反叛者 時間: 2025-3-29 07:15 作者: 脾氣暴躁的人 時間: 2025-3-29 12:58 作者: 潰爛 時間: 2025-3-29 16:55
Frictional Behaviours and Mechanismshas been shown to achieve better results with cases of clusters of different sizes and varying densities. It successfully replicates the results of the mutual k-nearest neighbor method, and extends the capability to agglomerative hierarchical clustering.作者: 脫離 時間: 2025-3-29 20:35 作者: LEVER 時間: 2025-3-30 01:40 作者: LURE 時間: 2025-3-30 06:55 作者: 歡樂中國 時間: 2025-3-30 10:35