標題: Titlebook: Cyber Intelligence and Information Retrieval; Proceedings of CIIR Jo?o Manuel R. S. Tavares,Paramartha Dutta,Debabra Conference proceeding [打印本頁] 作者: 和善 時間: 2025-3-21 19:59
書目名稱Cyber Intelligence and Information Retrieval影響因子(影響力)
書目名稱Cyber Intelligence and Information Retrieval影響因子(影響力)學科排名
書目名稱Cyber Intelligence and Information Retrieval網(wǎng)絡(luò)公開度
書目名稱Cyber Intelligence and Information Retrieval網(wǎng)絡(luò)公開度學科排名
書目名稱Cyber Intelligence and Information Retrieval被引頻次
書目名稱Cyber Intelligence and Information Retrieval被引頻次學科排名
書目名稱Cyber Intelligence and Information Retrieval年度引用
書目名稱Cyber Intelligence and Information Retrieval年度引用學科排名
書目名稱Cyber Intelligence and Information Retrieval讀者反饋
書目名稱Cyber Intelligence and Information Retrieval讀者反饋學科排名
作者: 禁止,切斷 時間: 2025-3-21 20:49 作者: 慢慢流出 時間: 2025-3-22 02:18 作者: Comedienne 時間: 2025-3-22 04:33 作者: Mystic 時間: 2025-3-22 11:42
Analysis of the Beaufort Cipher Expansion Technique and Its Usage in Providing Data Security in Clouhave been used for providing the data security in the cloud. In this paper, analysis of the Beaufort expansion technique is carried out, and it is used for providing the security for the cloud data. Beaufort expansion technique provides better security against crypt analysis and pattern prediction compared to the original Beaufort cipher.作者: 高度表 時間: 2025-3-22 16:14 作者: 高度表 時間: 2025-3-22 21:03 作者: Osmosis 時間: 2025-3-22 23:22
A Primer in Tensor Analysis and Relativityis being digitally transmitted and another trough the traditional postal services. This system also shows that reconstructed image quality is very good in respect to other visual cryptography schemes.作者: Morphine 時間: 2025-3-23 04:54
Fundamentals of Fractional Transporte data security at cloud environments. Here, a novel framework of cloud computing has been proposed along with algorithms based on quantum mechanics. The quantum superimposition principle has been used to detect data tampering. Experimental results have been proposed to lay bare the effectiveness of proposed approach.作者: optic-nerve 時間: 2025-3-23 07:32 作者: nettle 時間: 2025-3-23 12:59 作者: 膠狀 時間: 2025-3-23 17:43
Secure Cloud Services Using Quantum-Blockchain Technologye data security at cloud environments. Here, a novel framework of cloud computing has been proposed along with algorithms based on quantum mechanics. The quantum superimposition principle has been used to detect data tampering. Experimental results have been proposed to lay bare the effectiveness of proposed approach.作者: Cardiac 時間: 2025-3-23 20:01
Conference proceedings 2022d signal processing, artificial immune systems, information and network security, data science techniques and applications, data warehousing and data mining, data mining in dynamic environment, higher-order neural computing, rough set and fuzzy set theory, and nature-inspired computing techniques.?. .?.作者: Cloudburst 時間: 2025-3-24 00:55
Lotka–Volterra Interspecific Competitionper, a survey of various research efforts has been compiled to develop and enhance handwritten mathematical expressions. Recognition systems of handwritten math text are presented. Comparative analysis in terms of classification technique used, datasets, and their accuracies have been performed.作者: 防御 時間: 2025-3-24 05:55 作者: 抱負 時間: 2025-3-24 10:33 作者: 觀點 時間: 2025-3-24 14:04
Bangla Document Categorization Using Deep RNN Model with Attention Mechanismuated. The deep learning recurrent neural network attention layer and recurrent neural network with BiLSTM attained 97.72% and 86.56% accuracy, respectively, which is compared to the other well-known classification algorithms in Bangla text classification.作者: 態(tài)度暖昧 時間: 2025-3-24 16:54
DTNMA: Identifying Routing Attacks in Delay-Tolerant Networks. However, limited network resources and buffer space, bandwidth issues, high mobility nodes and disconnected paths are the characteristics that lead to network vulnerabilities and potential threats. These malicious attacks by compromised nodes in DTN systems can interrupt and degrade the normal fu作者: 侵略 時間: 2025-3-24 20:28 作者: Organonitrile 時間: 2025-3-24 23:12 作者: archaeology 時間: 2025-3-25 06:03 作者: Intrepid 時間: 2025-3-25 09:00
Distribution of Internet Banking Credentials Using Visual Cryptography and Watermarking Techniquesnd hacking. We proposed a methodology by which banks can distribute the same in a much safer way. This methodology uses visual cryptography and digital watermarking techniques to encrypt the user login password and transactional password to be embedded into the user login ID. One part of the secret 作者: Instinctive 時間: 2025-3-25 12:38 作者: modifier 時間: 2025-3-25 17:37
Facial Expression Recognition Using Convoluted Neural Network (CNN)erpretation has been an effective method for non-verbal communication. It helps to contend human perspectives or to reciprocate feelings and his or her mental state. With the development in science and technology, face detection and face recognition from sources have become relatively more straightf作者: Biofeedback 時間: 2025-3-25 20:47
Next Step to the Future of Restaurants Through Artificial Intelligence and Facial Recognitiond in technology by only imagining our favorite books and watching our favorite sci-fi movies. Through the years, as our resources expanded, so did our technology. Artificial Intelligence technology has developed a lot through the years and is still developing. As our resources grow, we all are surro作者: 微生物 時間: 2025-3-26 00:10 作者: Postulate 時間: 2025-3-26 05:41
A Comparative Study into Stock Market Prediction Through Various Sentiment Analysis Algorithms economic development is dictated by fortunes and vagaries prevalent in share stock markets. Researchers have found that it is possible to make forecasts with large historical data on stock market and up-down in prices of share values. So, the fact that stock markets play a really vital role in nati作者: JUST 時間: 2025-3-26 12:28
The Survey on Handwritten Mathematical Expressions Recognitions have been researched to build a system that produces high-performance mathematical expression recognition systems. Plentiful research has been done on handwritten mathematical text though it is symbols and or two-dimensional mathematical expressions. The amount of research witness the origins and 作者: Itinerant 時間: 2025-3-26 13:33
Bangla Document Categorization Using Deep RNN Model with Attention Mechanismfined space category. In this paper, a new method has classified Bangla text documents which consist of two deep learning models in terms of Bangla text categorization. The main purpose of this research is to text classification from Bangla text documents. This system can easily categorize from a la作者: Neutropenia 時間: 2025-3-26 17:21
Bangla Handwritten Digit Recognitionthms built in this thesis, the rewarded method is used. NumtaDB is the largest dataset. It is a collection for Bengali handwritten digits. This is a massive dataset with over 85,000 images in it. This dataset, however, is incredibly difficult to work with due to its complexity. The aim of this paper作者: Oafishness 時間: 2025-3-26 21:19
Audio Watermarking in Linear Canonical Transform Domain Using Frequency-Dependent Clusteringintact (Dhar PK, Robust FFT based watermarking scheme for copyright protection of digital audio data, IEEE, China, pp. 181–184, 2011). This paper proposes an effective methodology for watermarking of the audio signal using linear canonical transform (LCT), which has found its use in a multitude of s作者: 不規(guī)則 時間: 2025-3-27 01:30 作者: BUMP 時間: 2025-3-27 05:20
DTNMA: Identifying Routing Attacks in Delay-Tolerant Networkck hole attack, etc., affect the network connectivity, thereby increasing the delay in the message delivery rate. Thus, the effective mechanisms need to be identified and implemented to eliminate the different types of vulnerability attacks before implementing anything in DTN. This paper mainly addr作者: 充足 時間: 2025-3-27 09:27
Classification Framework for Fraud Detection Using Hidden Markov Modeling, i.e., classification and regression. In unsupervised learning, we do not supervise model instead we allow machine to work on its own to discover information. Clustering is type of unsupervised learning.作者: thrombosis 時間: 2025-3-27 17:37
A Review on Security Issues in Healthcare Cyber-Physical Systemsto the security of Healthcare CPS have been discussed in general and included the latest updated papers in the domain, later, has extended the focus to Wireless Sensor Networks and the vulnerabilities faced along with their defense as an overview. The concept of Sensor Only Networks, an advancement 作者: 痛苦一生 時間: 2025-3-27 20:25 作者: 荒唐 時間: 2025-3-28 01:39
Next Step to the Future of Restaurants Through Artificial Intelligence and Facial Recognitionrving you food. During the period of normalizing going out in the Covid-19 pandemic, there were many issues regarding this? In this paper, the core point is to avoid physical contact and enhance restaurants’ future with AI and its upcoming potential to deliver a new and safer experience to the custo作者: chuckle 時間: 2025-3-28 03:41
A Comparative Study into Stock Market Prediction Through Various Sentiment Analysis Algorithmss in share markets and can offer more accurate results to analyses data from multiple news sources and historical price movement of individual stocks. By using a two-step process, the model offers a minimum prediction accuracy value of 72%. In the first step, Na?ve Bayes algorithm is used to evaluat作者: BACLE 時間: 2025-3-28 07:41
Bangla Handwritten Digit Recognitionork (CNN) functioning as the classification algorithm. On the NumtaDB image dataset, the performance is systematically evaluated of this process. Finally, 93% accuracy is obtained for NumtaDB dataset, and 92% accuracy rate is obtained for our own dataset using same of the proposed method in experime作者: lacrimal-gland 時間: 2025-3-28 12:38 作者: employor 時間: 2025-3-28 15:14 作者: 體貼 時間: 2025-3-28 18:49
C. Dunn,V. Larsen,J. F. Nordstromck hole attack, etc., affect the network connectivity, thereby increasing the delay in the message delivery rate. Thus, the effective mechanisms need to be identified and implemented to eliminate the different types of vulnerability attacks before implementing anything in DTN. This paper mainly addr作者: 真實的你 時間: 2025-3-29 02:14
https://doi.org/10.1007/978-94-017-0594-3ing, i.e., classification and regression. In unsupervised learning, we do not supervise model instead we allow machine to work on its own to discover information. Clustering is type of unsupervised learning.作者: Nomadic 時間: 2025-3-29 04:21
https://doi.org/10.1007/978-3-030-26895-4to the security of Healthcare CPS have been discussed in general and included the latest updated papers in the domain, later, has extended the focus to Wireless Sensor Networks and the vulnerabilities faced along with their defense as an overview. The concept of Sensor Only Networks, an advancement 作者: 有偏見 時間: 2025-3-29 10:39
https://doi.org/10.1007/978-94-015-7612-3ing those changes with the corresponding combinations has finally successfully seen the underlying emotion. “OpenCV,” an open-source computer vision library, has been used in the classification of the seven primary human emotions: fear, sadness, happiness, anger, disgust, surprise, and neutral. Afte作者: infantile 時間: 2025-3-29 12:52 作者: goodwill 時間: 2025-3-29 18:29 作者: Ceremony 時間: 2025-3-29 20:35 作者: Solace 時間: 2025-3-30 01:39 作者: intolerance 時間: 2025-3-30 05:12
Security Aspects for Mutation Testing in Mobile Applications作者: CODA 時間: 2025-3-30 09:42 作者: ENACT 時間: 2025-3-30 13:50
C. Dunn,V. Larsen,J. F. Nordstroms. However, limited network resources and buffer space, bandwidth issues, high mobility nodes and disconnected paths are the characteristics that lead to network vulnerabilities and potential threats. These malicious attacks by compromised nodes in DTN systems can interrupt and degrade the normal fu作者: Amorous 時間: 2025-3-30 18:05 作者: opalescence 時間: 2025-3-30 23:35
https://doi.org/10.1007/978-3-030-26895-4endous advancements in Cyber-Physical Systems (CPS) especially in health care systems. The competencies for adaptation of advanced healthcare monitoring systems have been raised. In healthcare industries, today CPS ranges from providing smart feedback systems, automated updating of the patient data 作者: 燈絲 時間: 2025-3-31 02:38 作者: Curmudgeon 時間: 2025-3-31 05:40
A Primer in Tensor Analysis and Relativitynd hacking. We proposed a methodology by which banks can distribute the same in a much safer way. This methodology uses visual cryptography and digital watermarking techniques to encrypt the user login password and transactional password to be embedded into the user login ID. One part of the secret 作者: beta-cells 時間: 2025-3-31 10:00
https://doi.org/10.1007/978-94-015-7612-3entional hardware keyboard is a significant limitation in desktops and notebooks. Virtual keyboard prototype solves hardware limitations of the keyboard by presenting an easy and economical alternative using minimum external hardware. In this paper, we have tried to design a virtual keyboard model, 作者: MORPH 時間: 2025-3-31 16:40 作者: Generator 時間: 2025-3-31 21:01 作者: CUMB 時間: 2025-3-31 22:23
https://doi.org/10.1007/978-0-387-89882-7eviating the tedious process of fact checking. In this paper, we try to evaluate various language representation, and statistical similarity technique to discern the best possible mathematical modeling of the sentences for the task of stance evaluation. Our work is based on the dataset of the fake n作者: 圣人 時間: 2025-4-1 04:01
Simple Density-independent Growth economic development is dictated by fortunes and vagaries prevalent in share stock markets. Researchers have found that it is possible to make forecasts with large historical data on stock market and up-down in prices of share values. So, the fact that stock markets play a really vital role in nati