標(biāo)題: Titlebook: Computing and Informatics; 9th International Co Nur Haryani Zakaria,Nur Suhaili Mansor,Fathey Moha Conference proceedings 2024 The Editor(s [打印本頁(yè)] 作者: 漏出 時(shí)間: 2025-3-21 16:49
書目名稱Computing and Informatics影響因子(影響力)
書目名稱Computing and Informatics影響因子(影響力)學(xué)科排名
書目名稱Computing and Informatics網(wǎng)絡(luò)公開度
書目名稱Computing and Informatics網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computing and Informatics被引頻次
書目名稱Computing and Informatics被引頻次學(xué)科排名
書目名稱Computing and Informatics年度引用
書目名稱Computing and Informatics年度引用學(xué)科排名
書目名稱Computing and Informatics讀者反饋
書目名稱Computing and Informatics讀者反饋學(xué)科排名
作者: Irksome 時(shí)間: 2025-3-22 00:11
Conference proceedings 2024urity and privacy, digital media and information literacy, navigating AI development and deployment, harnessing technology for sustainable development, digital healthcare and well-being, education transformation through technology, digital entrepreneurship and innovation..作者: 松軟 時(shí)間: 2025-3-22 00:24
Conference proceedings 2024–15, 2023..The 55 full papers included in this volume were carefully reviewed and selected from 134 submissions. The papers focus on ensuring cybersecurity and privacy, digital media and information literacy, navigating AI development and deployment, harnessing technology for sustainable development作者: Spartan 時(shí)間: 2025-3-22 05:47
1865-0929 evelopment, digital healthcare and well-being, education transformation through technology, digital entrepreneurship and innovation..978-981-99-9588-2978-981-99-9589-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 同來(lái)核對(duì) 時(shí)間: 2025-3-22 10:54
Sericulture and Silk Production,e based on the emotion found in the trailer. This paper contributes to (1) an efficient framework to process the movie trailer and (2) a correlation analysis between the movie trailer and movie genre. We found that every movie genre can be represented by two unique emotions.作者: 旅行路線 時(shí)間: 2025-3-22 13:24 作者: 旅行路線 時(shí)間: 2025-3-22 20:01 作者: 針葉 時(shí)間: 2025-3-22 23:59
Sentiment Analysis of Arabic Dialects: A Review Study field. The authors found that Twitter is the most commonly utilized source for researchers to collect their datasets, and machine learning approaches are the most commonly used for sentiment analysis in Arabic dialects. Overall, this study provides valuable insights into the challenges and opportunities for sentiment analysis in Arabic dialects.作者: Resistance 時(shí)間: 2025-3-23 01:56
https://doi.org/10.1007/978-3-031-63620-2formation assets of government organizations. The Cybersecurity Governance Framework that is applied in the government environment should ideally follow the flow of government management and bureaucracy. Government management and bureaucracy directives are usually interpreted, disseminated, and impl作者: agitate 時(shí)間: 2025-3-23 09:26
Empirical Research in the TPF Market,xt. Due to our complete dependence on search engines for finding information and insights into every aspect of human endeavors, from finding cat videos to the deep mysteries of the universe, we tend to overlook the enormous complexities of today’s search engines powered by the web crawlers to index 作者: HUMP 時(shí)間: 2025-3-23 10:01 作者: Indurate 時(shí)間: 2025-3-23 15:11 作者: 巧思 時(shí)間: 2025-3-23 18:47 作者: larder 時(shí)間: 2025-3-24 00:28
https://doi.org/10.1007/978-3-031-63620-2ergence of big data. After data outsourcing to the cloud, cloud users lose control over data and are always concerned about data privacy and security in adopting the cloud service model. So, to ensure remote data integrity, a trusted auditor can make auditing tasks according to the users’ request, w作者: WAX 時(shí)間: 2025-3-24 05:07 作者: epinephrine 時(shí)間: 2025-3-24 07:58 作者: 不能妥協(xié) 時(shí)間: 2025-3-24 14:34
https://doi.org/10.1007/3-540-28562-8cess, and communicate data from their surrounding environment. Several energy-efficient protocols have been created specifically for WSNs to optimize data transfer rates and prolong network lifespan. Multi-channel protocols in WSN are one of the ways to optimize efficiency and enable seamless commun作者: Trypsin 時(shí)間: 2025-3-24 16:00
The Basis for Liability under German Law,al media users, poses an increasing threat to the propagation and diffusion of fake news over the social network and among users. Low-quality news and misinformation spread on social media had negative impacts on individuals and society. Hence, it is essential to detect fake news to ensure the sprea作者: Outshine 時(shí)間: 2025-3-24 22:34
https://doi.org/10.1007/3-540-28562-8abic dialects are more challenging for NLP tools to analyze than standard Arabic. While most review studies in this field have focused on highly indexed databases such as Scopus, Web of Science, and IEEE, these databases are not accessible to many Arabic researchers in Arabic countries due to financ作者: 有斑點(diǎn) 時(shí)間: 2025-3-24 23:15 作者: MEEK 時(shí)間: 2025-3-25 04:09
S. Nicola?dis,M. El Ghissassi,S. N. Thorntonher fields. However, DNNs have not developed beyond all challenges. For instance, the vanishing gradient problem remains a major challenge. This challenge hinders the ability of the system to capture long-term dependencies in text data. This challenge limits the ability to understand context, implie作者: 表皮 時(shí)間: 2025-3-25 11:00
Thirty Great Inventions of Chinafor free. However, social media also facilitate cyberbullying, and studies have shown that cyberbullying on social media has a severe impact compared to other platforms. In some cases, cyberbullying provokes tragic problems, such as suicide. The information shared on social media services provides a作者: 喚醒 時(shí)間: 2025-3-25 12:46 作者: 形容詞 時(shí)間: 2025-3-25 19:06 作者: 刺耳的聲音 時(shí)間: 2025-3-25 21:19 作者: VEST 時(shí)間: 2025-3-26 01:43
https://doi.org/10.1007/978-981-99-9589-9machine learning; deep learning; online purchasing behavior; phishing; anti-phishing; integrity; security; 作者: 高度贊揚(yáng) 時(shí)間: 2025-3-26 07:31
978-981-99-9588-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: 定點(diǎn) 時(shí)間: 2025-3-26 08:28 作者: 柔聲地說(shuō) 時(shí)間: 2025-3-26 13:05 作者: Ballerina 時(shí)間: 2025-3-26 20:03 作者: Metamorphosis 時(shí)間: 2025-3-27 00:00 作者: hyperuricemia 時(shí)間: 2025-3-27 02:17
Blockchain-Based Supply Chain for a Sustainable Digital Society: Security Challenges and Proposed Apcations among digital societies. The consensus mechanism is the defining technology behind the security and performance of the Blockchain system. Under the Industrial Revolution 4.0, blockchain has been considered for integration into supply chain business as an innovative solution to tackle the cha作者: arcane 時(shí)間: 2025-3-27 06:24 作者: 小官 時(shí)間: 2025-3-27 10:02
Remote Public Data Auditing to Secure Cloud Storageergence of big data. After data outsourcing to the cloud, cloud users lose control over data and are always concerned about data privacy and security in adopting the cloud service model. So, to ensure remote data integrity, a trusted auditor can make auditing tasks according to the users’ request, w作者: amyloid 時(shí)間: 2025-3-27 16:09 作者: BRINK 時(shí)間: 2025-3-27 18:25
A Systematic Literature Review of Intrusion Detection System in Network Securityction Systems (IDS) have emerged as crucial tools for mitigating network security risks. Despite the vast amount of research on IDS methods, there still remains a gap in comprehensive literature reviews that cover recent developments in techniques, datasets, and tools. This study conducted a compreh作者: tackle 時(shí)間: 2025-3-28 00:11
Cross-layer Based Intrusion Detection System for Wireless Sensor Networks: Challenges, Solutions, ancess, and communicate data from their surrounding environment. Several energy-efficient protocols have been created specifically for WSNs to optimize data transfer rates and prolong network lifespan. Multi-channel protocols in WSN are one of the ways to optimize efficiency and enable seamless commun作者: Myosin 時(shí)間: 2025-3-28 03:05 作者: calumniate 時(shí)間: 2025-3-28 07:07
Sentiment Analysis of Arabic Dialects: A Review Studyabic dialects are more challenging for NLP tools to analyze than standard Arabic. While most review studies in this field have focused on highly indexed databases such as Scopus, Web of Science, and IEEE, these databases are not accessible to many Arabic researchers in Arabic countries due to financ作者: 柔美流暢 時(shí)間: 2025-3-28 14:21
Charting Inclusive Digital Society Research Trends: A Bibliometric Analysis of E-Participation Throu The aim was to identify crucial areas and significant contributors within the field and recent research trends. The findings indicate that the trend of e-participation was slow to start, with researchers primarily from Western nations. The field still struggles to establish itself as an independent作者: Pageant 時(shí)間: 2025-3-28 16:04 作者: 安定 時(shí)間: 2025-3-28 20:31 作者: 冬眠 時(shí)間: 2025-3-28 23:14 作者: 管理員 時(shí)間: 2025-3-29 04:33 作者: Microaneurysm 時(shí)間: 2025-3-29 09:46
Nur Haryani Zakaria,Nur Suhaili Mansor,Fathey Moha作者: isotope 時(shí)間: 2025-3-29 11:31
Key Issues in Cybersecurity Implementation in Government Agencies: A Case Study in Jakarta Smart Citation of cyber security in JSC must follow the flow of the prevailing government bureaucracy. Three factors were involved in implementing bureaucracy-based cybersecurity: Legal Fundamental for Cybersecurity Management, Security Management, and Cybersecurity Stakeholders.作者: 摘要 時(shí)間: 2025-3-29 16:15
Large Scale Web Crawling and Distributed Search Engines: Techniques, Challenges, Current Trends, andtext. We also explore distributed search engines and the way forward for finding information in the age of large language models like ChatGPT or Bard. Our primary goal is to explore the junction of large-scale web crawling and search engines in an integrative approach to identify the emerging challe作者: Customary 時(shí)間: 2025-3-29 22:15
Data Archiving Model on Cloud for Video Surveillance Systems with Integrity Checkl elements are developed, tested, and evaluated in this study to guarantee its dependability and efficiency when managing video surveillance data. Coding the archiving module, testing the software with a pertinent dataset, and creating the integrity check module are all included in the scope. The in作者: 玉米棒子 時(shí)間: 2025-3-30 01:57
Blockchain-Based Supply Chain for a Sustainable Digital Society: Security Challenges and Proposed Apr-attacks triggered by malicious nodes. In this paper, we outline the research challenges from the security aspect towards the integration of Blockchain with SCM. Then we design an approach for a private Blockchain-based Supply Chain with security capabilities by proposing an enhancement consensus m作者: 投票 時(shí)間: 2025-3-30 07:26
An Exploratory Study of Automated Anti-phishing Systemtection and prevention systems with a comprehensive review. It is advised to carry out further research to investigate the strengths and limitations of different methods and algorithms used in automated anti-phishing systems to understand their performance and effectiveness better.作者: Harridan 時(shí)間: 2025-3-30 11:33 作者: hankering 時(shí)間: 2025-3-30 14:09 作者: 大猩猩 時(shí)間: 2025-3-30 18:24
A Systematic Literature Review of Intrusion Detection System in Network Securityd datasets, offering researchers and practitioners a holistic understanding of the field. The identified research gaps and unexplored topics will guide future research endeavors, leading to advancements in IDS techniques and bolstering network security.作者: Decongestant 時(shí)間: 2025-3-31 00:29 作者: 沒血色 時(shí)間: 2025-3-31 01:41
A Feature-Based Optimization Approach for Fake News Detection on Social Media Using K-Means Clusteridetection. The proposed techniques are tested on PHEME dataset, and the experimental results are measured in term average of Precision (PR), Recall (R), F-measure (F), and Accuracy (ACC). The experimental results show that the BBA algorithm has outperformed the Social Spider Optimization (SSO) algor作者: 小步舞 時(shí)間: 2025-3-31 08:01