標(biāo)題: Titlebook: Digital Connectivity – Social Impact; 51st Annual Conventi S. Subramanian,R. Nadarajan,Shina Sheen Conference proceedings 2016 Springer Nat [打印本頁] 作者: Boldfaced 時間: 2025-3-21 16:57
書目名稱Digital Connectivity – Social Impact影響因子(影響力)
書目名稱Digital Connectivity – Social Impact影響因子(影響力)學(xué)科排名
書目名稱Digital Connectivity – Social Impact網(wǎng)絡(luò)公開度
書目名稱Digital Connectivity – Social Impact網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Digital Connectivity – Social Impact被引頻次
書目名稱Digital Connectivity – Social Impact被引頻次學(xué)科排名
書目名稱Digital Connectivity – Social Impact年度引用
書目名稱Digital Connectivity – Social Impact年度引用學(xué)科排名
書目名稱Digital Connectivity – Social Impact讀者反饋
書目名稱Digital Connectivity – Social Impact讀者反饋學(xué)科排名
作者: VOK 時間: 2025-3-21 21:46 作者: 反叛者 時間: 2025-3-22 02:28
Gary D. Bouma,Rod Ling,Douglas Prattto authenticate a node. As a first step towards this objective, a lightweight identity based signature for authentication of the sensor nodes is proposed in this paper. The scheme uses “fingerprint”, i.e. a lifetime secure memory fraction in the sensor nodes as a parameter for signature generation. 作者: ARIA 時間: 2025-3-22 05:12 作者: entrance 時間: 2025-3-22 11:50 作者: curriculum 時間: 2025-3-22 15:41 作者: curriculum 時間: 2025-3-22 20:29
Malware Detection Using Higher Order Statistical Parameters as skewness and kurtosis are calculated at the each sub region of band pass frequency image. The region which has the highest skewness and kurtosis value is marked as the malware file. The detection performance of the proposed method has been evaluated by using 1300 portable executable files. The d作者: 協(xié)奏曲 時間: 2025-3-22 21:31
Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signaturesto authenticate a node. As a first step towards this objective, a lightweight identity based signature for authentication of the sensor nodes is proposed in this paper. The scheme uses “fingerprint”, i.e. a lifetime secure memory fraction in the sensor nodes as a parameter for signature generation. 作者: 無思維能力 時間: 2025-3-23 04:20 作者: 爵士樂 時間: 2025-3-23 06:34 作者: CRAFT 時間: 2025-3-23 12:59
S. Subramanian,R. Nadarajan,Shina SheenIncludes supplementary material: 作者: Veneer 時間: 2025-3-23 15:52
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/279180.jpg作者: 相一致 時間: 2025-3-23 19:56
https://doi.org/10.1007/978-981-10-3274-5artificial intelligence; authentication; data security; image processing; image segmentation; signal proc作者: 爭論 時間: 2025-3-24 01:57 作者: GRATE 時間: 2025-3-24 02:58 作者: 值得贊賞 時間: 2025-3-24 10:06
Fear in the Animal and Human Brain information can also be taken out of an image. To extract the information out of the image, the most important feature is the edge. There are many techniques to detect edges. This paper has a detailed study about these different techniques and proposed an intelligent algorithm. Also an analysis of these algorithms on various datasets are done.作者: Migratory 時間: 2025-3-24 14:23
https://doi.org/10.1007/978-3-319-52488-7ave the multiscale framework which allows to efficiently encode anisotropic features in multivariate problem classes. Shearlets are a newly developed extension of wavelets that are better suited to image characterization. In addition the degree of computational complexity of many proposed texture me作者: 表兩個 時間: 2025-3-24 16:49 作者: invulnerable 時間: 2025-3-24 22:28 作者: 緯度 時間: 2025-3-25 02:10
Anna K?rs,Wolfram Weisse,Jean-Paul Willaimese their path to reach the victim system through the internet, infected browsers, injected files, memory devices, etc., highly obscured malwares evade the automated tools installed in the victim. Once the victim system gets affected by the malware, executable processes are controlled by malware. In 作者: 人類 時間: 2025-3-25 03:26 作者: 強(qiáng)壯 時間: 2025-3-25 10:09
Gritt Klinkhammer,Anna Neumaierich morphological patterns than other languages, so Analogy Removal Stemmer (ARS) is proposed in this research, to find stem word for the given inflection Tamil word from text corpora. The performance of the proposed approach is compared with Light Stemmer (LS) and Improved Light Stemmer (ILS) algor作者: 灌輸 時間: 2025-3-25 13:49 作者: 極大的痛苦 時間: 2025-3-25 17:20
Zsófia Windisch,Martin Rothgangel Things would be a mixture of hardware and software independent components. Offering a service in an IoT architecture is challenging problem based on participant registration and logs. A model for Integrating Physical world devices in constrained web environments using Constrained Application Protoc作者: 虛構(gòu)的東西 時間: 2025-3-25 20:44 作者: Aboveboard 時間: 2025-3-26 01:42 作者: SOW 時間: 2025-3-26 05:41 作者: Tidious 時間: 2025-3-26 11:19 作者: ROOF 時間: 2025-3-26 13:18 作者: 有幫助 時間: 2025-3-26 17:38
Gary D. Bouma,Rod Ling,Douglas Pratton and dynamic nature of MANET makes it vulnerable to variety of security attacks. So there is a need to secure the data transmission. The Optimized link state routing protocol is an efficient proactive routing protocol which is suitable for such dense and large scale MANET. In this paper, secure-OL作者: Ruptured-Disk 時間: 2025-3-26 22:39 作者: Medicare 時間: 2025-3-27 04:55
Gary D. Bouma,Rod Ling,Douglas Pratts are exposed as web services based on industry standards, which follows WSDL for service illustration. These services depend on SOAP to handle service request and response. Hence Web services security is one of the important factors which are used to assess cloud system security. While creating a n作者: 并入 時間: 2025-3-27 06:48 作者: 窒息 時間: 2025-3-27 10:33
Texture Classification Using Shearlet Transform Energy Featuresave the multiscale framework which allows to efficiently encode anisotropic features in multivariate problem classes. Shearlets are a newly developed extension of wavelets that are better suited to image characterization. In addition the degree of computational complexity of many proposed texture me作者: 鐵塔等 時間: 2025-3-27 16:49 作者: 凝視 時間: 2025-3-27 21:42
An Enhanced and Efficient Algorithm for Faster, Better and Accurate Edge Detection information can also be taken out of an image. To extract the information out of the image, the most important feature is the edge. There are many techniques to detect edges. This paper has a detailed study about these different techniques and proposed an intelligent algorithm. Also an analysis of 作者: anus928 時間: 2025-3-27 23:21
Malware Detection Using Higher Order Statistical Parametersse their path to reach the victim system through the internet, infected browsers, injected files, memory devices, etc., highly obscured malwares evade the automated tools installed in the victim. Once the victim system gets affected by the malware, executable processes are controlled by malware. In 作者: Opponent 時間: 2025-3-28 04:41
Denoising Iris Image Using a Novel Wavelet Based Thresholdfree image. In this paper, a novel method is proposed to remove Gaussian noise present in the iris image using Undecimated wavelet, a threshold based on Golden Ratio and weighted median. First, decompose the input image using Stationary Wavelet Transform (SWT) and apply the modified Visushrink to th作者: 彎曲的人 時間: 2025-3-28 06:45 作者: seruting 時間: 2025-3-28 11:19 作者: 口訣 時間: 2025-3-28 16:08 作者: ITCH 時間: 2025-3-28 22:19 作者: Proponent 時間: 2025-3-28 23:07
Soft Clustering Based Missing Value Imputationg missing values, etc. Missing value is a common problem in large datasets. Most frequently used method to handle missing values by statistical is discarding the instances with missing values. Sometime deletion of instances with missing values cause loss of essential information, which affects the p作者: 不適 時間: 2025-3-29 06:52
An Optimized Anisotropic Diffusion Approach for Despeckling of SAR Imagesltering. The present work proposes an optimized AD filtering approach for despeckling of Synthetic Aperture Radar (SAR) images using Ant Colony Optimization (ACO). The residual speckle suppression has been attained via optimal parameter selection of parameters of AD using ACO algorithm. Further, com作者: hyperuricemia 時間: 2025-3-29 10:28
Mammogram Classification Using ANFIS with Ant Colony Optimization Based Learningrly stage. Recent studies states that Adaptive Neural Fuzzy Inference System (ANFIS) classifier achieves notable performance than the other classifiers. The major forte of ANFIS is that it has the robust learning mechanism with fuzzy data. However, the connections between the layers are not pruned f作者: 軟弱 時間: 2025-3-29 11:56
Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signaturesrding of observed data. WSNs nodes may possess sensitive data that are prone to various attacks. For such a network to be viable, integrity and authenticity should be provided to the data generated by the sensor nodes. For example, in military surveillance and enemy tracking applications, the locali作者: 民間傳說 時間: 2025-3-29 19:38 作者: 固執(zhí)點(diǎn)好 時間: 2025-3-29 22:16 作者: 乳汁 時間: 2025-3-30 03:43 作者: magnanimity 時間: 2025-3-30 07:53 作者: 金哥占卜者 時間: 2025-3-30 10:42
Gritt Klinkhammer,Anna Neumaiertion Tamil word from text corpora. The performance of the proposed approach is compared with Light Stemmer (LS) and Improved Light Stemmer (ILS) algorithms based on correctly and incorrectly predicted stem words. The experimental result clearly shows that the proposed approach ARS for Tamil corpora performs better than the LS and ILS algorithm.作者: Hiatus 時間: 2025-3-30 13:13 作者: flammable 時間: 2025-3-30 19:50 作者: Inculcate 時間: 2025-3-30 23:58
https://doi.org/10.1007/978-3-030-31856-7 on MovieLens data set show that the proposed technique is efficient in expanding the rating matrix and outperforms state of the art collaborative filtering techniques for providing more efficient predictions.作者: 飛來飛去真休 時間: 2025-3-31 02:11 作者: organic-matrix 時間: 2025-3-31 06:57 作者: Lineage 時間: 2025-3-31 11:31
Item Refinement for Improved Recommendations on MovieLens data set show that the proposed technique is efficient in expanding the rating matrix and outperforms state of the art collaborative filtering techniques for providing more efficient predictions.作者: Alopecia-Areata 時間: 2025-3-31 13:38
Analogy Removal Stemmer Algorithm for Tamil Text Corporation Tamil word from text corpora. The performance of the proposed approach is compared with Light Stemmer (LS) and Improved Light Stemmer (ILS) algorithms based on correctly and incorrectly predicted stem words. The experimental result clearly shows that the proposed approach ARS for Tamil corpora performs better than the LS and ILS algorithm.