派博傳思國(guó)際中心

標(biāo)題: Titlebook: Artificial Intelligence and Security; 6th International Co Xingming Sun,Jinwei Wang,Elisa Bertino Conference proceedings 2020 Springer Natu [打印本頁(yè)]

作者: 輕佻    時(shí)間: 2025-3-21 17:24
書目名稱Artificial Intelligence and Security影響因子(影響力)




書目名稱Artificial Intelligence and Security影響因子(影響力)學(xué)科排名




書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開(kāi)度




書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書目名稱Artificial Intelligence and Security被引頻次




書目名稱Artificial Intelligence and Security被引頻次學(xué)科排名




書目名稱Artificial Intelligence and Security年度引用




書目名稱Artificial Intelligence and Security年度引用學(xué)科排名




書目名稱Artificial Intelligence and Security讀者反饋




書目名稱Artificial Intelligence and Security讀者反饋學(xué)科排名





作者: Compass    時(shí)間: 2025-3-21 21:37

作者: 上腭    時(shí)間: 2025-3-22 03:50
Stephan Helmreich,Hartmut Kellerus has become an indirect evidence of image forgery. Therefore, CA blind detection has attracted widespread attention in the field of image forensics in recent years. Considering forensic methods based on first-order statistical features are vulnerable to encountering anti-forensic and other operati
作者: 被告    時(shí)間: 2025-3-22 06:14
https://doi.org/10.1007/978-3-642-13371-8k compression methods based on the low rank characteristics of the network structure are proposed. However, these methods fail to consider the inner similarity structure of the networks, leading to a performance degradation. In this paper, a novel hybrid low rank model based network compression meth
作者: 不愛(ài)防注射    時(shí)間: 2025-3-22 10:09
Stephan Helmreich,Hartmut Kellerve the efficiency of urban rail transit operations and reduce the occurrence of accidents is very necessary to build a model of rail transit safety global factors. For the cases of rail transit accidents, the characteristics are recorded in the form of text. The CNN-LSTM method based on BERT embeddi
作者: critic    時(shí)間: 2025-3-22 14:57
Stephan Helmreich,Hartmut Keller is used for ranging and coherent forwarding is used for carrier. In order to eliminate the error caused by the rapid movement of the aircraft, the relative velocity between the objects is measured and the ranging error is corrected. How to estimate the carrier frequency and pseudo code phase in the
作者: 過(guò)度    時(shí)間: 2025-3-22 17:16
https://doi.org/10.1007/978-3-642-74375-7tion signal. In this algorithm, PMF?+?FFT is used to acquisition the signal and estimate the coarse value of carrier frequency and pseudo code phase. Then LM algorithm is used to solve the maximum likelihood function of the signal, so as to obtain the accurate estimation of carrier Doppler frequency
作者: GRACE    時(shí)間: 2025-3-22 23:14

作者: 單獨(dú)    時(shí)間: 2025-3-23 02:03
Common Faults Found in GRP Mouldings, the message between two remote anticipators. In the free-space quantum communication, atmospheric turbulence causes fluctuations in transmittance, which further affects the quantum bit error rate (QBER) and signal-to-noise ratio (SNR). Under such circumstances, the intensity of some optical signals
作者: 沒(méi)有準(zhǔn)備    時(shí)間: 2025-3-23 05:53

作者: aggravate    時(shí)間: 2025-3-23 13:35
On Clustering Using Random Walksclassifier design. To address this issue, we propose an end-to-end trainable convolutional neural networks (CNN) model for multimodal biometric recognition, where high-level feature can be abundantly extracted by convolution operation. In order to improve the recognition performance by feature level
作者: avulsion    時(shí)間: 2025-3-23 17:42

作者: 富饒    時(shí)間: 2025-3-23 18:06
Subtyping Constraints in Quasi-latticesg method extracts facial features are less robust and the traditional convolutional neural network can not fully extract the expression features, a residual network model integrating CBAM attention mechanism is proposed. Given an intermediate feature map, a attention map is generated on the channel
作者: 放大    時(shí)間: 2025-3-24 01:32

作者: 使厭惡    時(shí)間: 2025-3-24 06:20

作者: hair-bulb    時(shí)間: 2025-3-24 08:46

作者: 狂亂    時(shí)間: 2025-3-24 13:20

作者: adjacent    時(shí)間: 2025-3-24 15:15

作者: 手榴彈    時(shí)間: 2025-3-24 19:08

作者: 多嘴多舌    時(shí)間: 2025-3-24 23:14
https://doi.org/10.1007/978-981-15-8086-4artificial intelligence; communication systems; computer hardware; computer networks; computer security;
作者: 小母馬    時(shí)間: 2025-3-25 04:51
978-981-15-8085-7Springer Nature Singapore Pte Ltd. 2020
作者: Brocas-Area    時(shí)間: 2025-3-25 10:52

作者: AXIS    時(shí)間: 2025-3-25 13:44
GSSM: An Integration Model of?Heterogeneous Factors for?Point-of-Interest Recommendation etc. It has become an important function to recommend points-of-interest (POIs) for users based on their check-in records. However, the user-location matrix generated by check-in records is often very sparse which causes those traditional methods to present a suboptimal recommendation performance.
作者: Insatiable    時(shí)間: 2025-3-25 18:17

作者: Pruritus    時(shí)間: 2025-3-25 20:46

作者: NEXUS    時(shí)間: 2025-3-26 03:33
Research on Rail Traffic Safety Factor Model Based on Deep Learningve the efficiency of urban rail transit operations and reduce the occurrence of accidents is very necessary to build a model of rail transit safety global factors. For the cases of rail transit accidents, the characteristics are recorded in the form of text. The CNN-LSTM method based on BERT embeddi
作者: 暫時(shí)別動(dòng)    時(shí)間: 2025-3-26 06:59

作者: CLAM    時(shí)間: 2025-3-26 10:56
A Study on PN Code Phase and Carrier Frequency Fast Estimation Technology for DSSS Signaltion signal. In this algorithm, PMF?+?FFT is used to acquisition the signal and estimate the coarse value of carrier frequency and pseudo code phase. Then LM algorithm is used to solve the maximum likelihood function of the signal, so as to obtain the accurate estimation of carrier Doppler frequency
作者: 悅耳    時(shí)間: 2025-3-26 14:02
Research of Software Information Hiding Algorithm Based on Packing Technologyles, PE file packing, PE file code encryption, PE file information implantation, PE file information extraction, etc. The system uses the dynamic link library as a shell program, implants the end of the target PE file, implants the given information into the code segment, and encrypts the code segme
作者: 樹(shù)木中    時(shí)間: 2025-3-26 19:21

作者: 健談    時(shí)間: 2025-3-27 00:56
Design of Intelligent Mobile Robot Control System Based on Gesture Recognitionile also avoiding a series of potential hidden dangers. This study aims to design an intelligent mobile robot control system based on gesture recognition which allows people to control the forward, backward and steering of the mobile robot through simple gestures. For gesture recognition, this paper
作者: canonical    時(shí)間: 2025-3-27 04:34
Multimodal Biometric Recognition Based on Convolutional Neural Networksclassifier design. To address this issue, we propose an end-to-end trainable convolutional neural networks (CNN) model for multimodal biometric recognition, where high-level feature can be abundantly extracted by convolution operation. In order to improve the recognition performance by feature level
作者: ineffectual    時(shí)間: 2025-3-27 09:10

作者: 加花粗鄙人    時(shí)間: 2025-3-27 13:21

作者: Formidable    時(shí)間: 2025-3-27 15:59
Behavior Compatibility Analysis for Service Mashup with Model Checkingend-users in both programming technique and domain knowledge, they cannot always find the mismatch of services’ behavior. We present an automatic approach for analyzing the behavioral compatibility of service mashup with verification techniques of Communication Sequence Processes (CSP). The feature
作者: Constrain    時(shí)間: 2025-3-27 17:52
Study on Practical IoT Applications in Civil Aviation Industryimprove its business value as well as management level. For passengers, they can experience more additional quality services. For airline companies, if a commercial air plane is connected to the Internet of things, then the various sensors of the airplane system can be used to constantly provide the
作者: Immunization    時(shí)間: 2025-3-28 01:08

作者: 豐滿有漂亮    時(shí)間: 2025-3-28 03:58

作者: bronchodilator    時(shí)間: 2025-3-28 06:47
Research on Pseudo Code Ranging Technology Using Burst DSSS Signal burst short pulse spread spectrum communication is discussed. Firstly, PMF?+?FFT is used to capture the signal and estimate the initial value of carrier frequency and pseudo code phase, then LM algorithm is used to solve the maximum likelihood function, so as to obtain the accurate value of carrier frequency and pseudo code delay.
作者: 土坯    時(shí)間: 2025-3-28 13:59

作者: Melatonin    時(shí)間: 2025-3-28 16:04

作者: Occlusion    時(shí)間: 2025-3-28 21:37
1865-0929 nce and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS...The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully rev
作者: 水汽    時(shí)間: 2025-3-29 00:14

作者: Conjuction    時(shí)間: 2025-3-29 03:22

作者: 定點(diǎn)    時(shí)間: 2025-3-29 08:18
https://doi.org/10.1007/978-3-642-13371-8to the application of high resolution Synthetic Aperture Radar (SAR) imaging, and experiments show that the proposed method can achieve an outstanding image recovery result comparing to the state-of-the-art methods, with a significant reduction of the number of parameters.
作者: 神圣將軍    時(shí)間: 2025-3-29 14:14
https://doi.org/10.1007/978-3-642-74375-7 segment, mixing the two. Even if adversary obtains this piece of data, it can’t distinguish between the effective information, effectively reduces the density of information, and increases the difficulty of information recognition, so as to achieve the purpose of information hiding.
作者: convulsion    時(shí)間: 2025-3-29 19:38

作者: 充滿人    時(shí)間: 2025-3-29 22:08
Hybrid Low Rank Model Based Deep Neural Network Compression with?Application in Data Recoveryto the application of high resolution Synthetic Aperture Radar (SAR) imaging, and experiments show that the proposed method can achieve an outstanding image recovery result comparing to the state-of-the-art methods, with a significant reduction of the number of parameters.
作者: 演繹    時(shí)間: 2025-3-30 00:27
Research of Software Information Hiding Algorithm Based on Packing Technology segment, mixing the two. Even if adversary obtains this piece of data, it can’t distinguish between the effective information, effectively reduces the density of information, and increases the difficulty of information recognition, so as to achieve the purpose of information hiding.
作者: 男生如果明白    時(shí)間: 2025-3-30 04:18

作者: 兩種語(yǔ)言    時(shí)間: 2025-3-30 08:52
Stephan Helmreich,Hartmut Keller burst short pulse spread spectrum communication is discussed. Firstly, PMF?+?FFT is used to capture the signal and estimate the initial value of carrier frequency and pseudo code phase, then LM algorithm is used to solve the maximum likelihood function, so as to obtain the accurate value of carrier frequency and pseudo code delay.
作者: RUPT    時(shí)間: 2025-3-30 15:53
On Clustering Using Random Walks uses the MPU6050 accelerometer to detect and recognize human gestures. The system adopts the control chip STM32 MCU to collect the acceleration data. The results of the experiments have shown that the proposed gesture recognition device can control the mobile robot maneuvering well and complete the function of forward and backward and steering.
作者: 乳汁    時(shí)間: 2025-3-30 19:52

作者: TATE    時(shí)間: 2025-3-30 21:18
Stephan Helmreich,Hartmut Keller information while the large scale median filtering value is used at the non boundary region for facilitating noise removal. In this paper, 3 remote sensing datasets are used to verify the proposed approach, and the results show that the proposed approach improves the accuracy of remote sensing image change detection.
作者: Fantasy    時(shí)間: 2025-3-31 03:09

作者: Hyperlipidemia    時(shí)間: 2025-3-31 07:35
On Clustering Using Random Walks set. Experimental results demonstrate the proposed CNN model not only can achieve recognition rate of 98.84% in testing, but also is robust to conventional image degradation and applicable to identity recognition task.




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
平邑县| 桐梓县| 禄丰县| 北海市| 定襄县| 万宁市| 武冈市| 班戈县| 巴林右旗| 建始县| 康马县| 安阳县| 连江县| 宁国市| 吉木萨尔县| 夏津县| 阿克陶县| 商南县| 永州市| 浦东新区| 独山县| 重庆市| 麻江县| 栾川县| 汾西县| 慈利县| 新营市| 公安县| 通州区| 永泰县| 巴南区| 永清县| 阳江市| 石嘴山市| 铜山县| 常州市| 常熟市| 句容市| 四平市| 三门县| 鱼台县|