派博傳思國際中心

標(biāo)題: Titlebook: Digital Connectivity – Social Impact; 51st Annual Conventi S. Subramanian,R. Nadarajan,Shina Sheen Conference proceedings 2016 Springer Nat [打印本頁]

作者: Boldfaced    時間: 2025-3-21 16:57
書目名稱Digital Connectivity – Social Impact影響因子(影響力)




書目名稱Digital Connectivity – Social Impact影響因子(影響力)學(xué)科排名




書目名稱Digital Connectivity – Social Impact網(wǎng)絡(luò)公開度




書目名稱Digital Connectivity – Social Impact網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Digital Connectivity – Social Impact被引頻次




書目名稱Digital Connectivity – Social Impact被引頻次學(xué)科排名




書目名稱Digital Connectivity – Social Impact年度引用




書目名稱Digital Connectivity – Social Impact年度引用學(xué)科排名




書目名稱Digital Connectivity – Social Impact讀者反饋




書目名稱Digital Connectivity – Social Impact讀者反饋學(xué)科排名





作者: VOK    時間: 2025-3-21 21:46

作者: 反叛者    時間: 2025-3-22 02:28
Gary D. Bouma,Rod Ling,Douglas Prattto authenticate a node. As a first step towards this objective, a lightweight identity based signature for authentication of the sensor nodes is proposed in this paper. The scheme uses “fingerprint”, i.e. a lifetime secure memory fraction in the sensor nodes as a parameter for signature generation.
作者: ARIA    時間: 2025-3-22 05:12

作者: entrance    時間: 2025-3-22 11:50

作者: curriculum    時間: 2025-3-22 15:41

作者: curriculum    時間: 2025-3-22 20:29
Malware Detection Using Higher Order Statistical Parameters as skewness and kurtosis are calculated at the each sub region of band pass frequency image. The region which has the highest skewness and kurtosis value is marked as the malware file. The detection performance of the proposed method has been evaluated by using 1300 portable executable files. The d
作者: 協(xié)奏曲    時間: 2025-3-22 21:31
Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signaturesto authenticate a node. As a first step towards this objective, a lightweight identity based signature for authentication of the sensor nodes is proposed in this paper. The scheme uses “fingerprint”, i.e. a lifetime secure memory fraction in the sensor nodes as a parameter for signature generation.
作者: 無思維能力    時間: 2025-3-23 04:20

作者: 爵士樂    時間: 2025-3-23 06:34

作者: CRAFT    時間: 2025-3-23 12:59
S. Subramanian,R. Nadarajan,Shina SheenIncludes supplementary material:
作者: Veneer    時間: 2025-3-23 15:52
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/279180.jpg
作者: 相一致    時間: 2025-3-23 19:56
https://doi.org/10.1007/978-981-10-3274-5artificial intelligence; authentication; data security; image processing; image segmentation; signal proc
作者: 爭論    時間: 2025-3-24 01:57

作者: GRATE    時間: 2025-3-24 02:58

作者: 值得贊賞    時間: 2025-3-24 10:06
Fear in the Animal and Human Brain information can also be taken out of an image. To extract the information out of the image, the most important feature is the edge. There are many techniques to detect edges. This paper has a detailed study about these different techniques and proposed an intelligent algorithm. Also an analysis of these algorithms on various datasets are done.
作者: Migratory    時間: 2025-3-24 14:23
https://doi.org/10.1007/978-3-319-52488-7ave the multiscale framework which allows to efficiently encode anisotropic features in multivariate problem classes. Shearlets are a newly developed extension of wavelets that are better suited to image characterization. In addition the degree of computational complexity of many proposed texture me
作者: 表兩個    時間: 2025-3-24 16:49

作者: invulnerable    時間: 2025-3-24 22:28

作者: 緯度    時間: 2025-3-25 02:10
Anna K?rs,Wolfram Weisse,Jean-Paul Willaimese their path to reach the victim system through the internet, infected browsers, injected files, memory devices, etc., highly obscured malwares evade the automated tools installed in the victim. Once the victim system gets affected by the malware, executable processes are controlled by malware. In
作者: 人類    時間: 2025-3-25 03:26

作者: 強(qiáng)壯    時間: 2025-3-25 10:09
Gritt Klinkhammer,Anna Neumaierich morphological patterns than other languages, so Analogy Removal Stemmer (ARS) is proposed in this research, to find stem word for the given inflection Tamil word from text corpora. The performance of the proposed approach is compared with Light Stemmer (LS) and Improved Light Stemmer (ILS) algor
作者: 灌輸    時間: 2025-3-25 13:49

作者: 極大的痛苦    時間: 2025-3-25 17:20
Zsófia Windisch,Martin Rothgangel Things would be a mixture of hardware and software independent components. Offering a service in an IoT architecture is challenging problem based on participant registration and logs. A model for Integrating Physical world devices in constrained web environments using Constrained Application Protoc
作者: 虛構(gòu)的東西    時間: 2025-3-25 20:44

作者: Aboveboard    時間: 2025-3-26 01:42

作者: SOW    時間: 2025-3-26 05:41

作者: Tidious    時間: 2025-3-26 11:19

作者: ROOF    時間: 2025-3-26 13:18

作者: 有幫助    時間: 2025-3-26 17:38
Gary D. Bouma,Rod Ling,Douglas Pratton and dynamic nature of MANET makes it vulnerable to variety of security attacks. So there is a need to secure the data transmission. The Optimized link state routing protocol is an efficient proactive routing protocol which is suitable for such dense and large scale MANET. In this paper, secure-OL
作者: Ruptured-Disk    時間: 2025-3-26 22:39

作者: Medicare    時間: 2025-3-27 04:55
Gary D. Bouma,Rod Ling,Douglas Pratts are exposed as web services based on industry standards, which follows WSDL for service illustration. These services depend on SOAP to handle service request and response. Hence Web services security is one of the important factors which are used to assess cloud system security. While creating a n
作者: 并入    時間: 2025-3-27 06:48

作者: 窒息    時間: 2025-3-27 10:33
Texture Classification Using Shearlet Transform Energy Featuresave the multiscale framework which allows to efficiently encode anisotropic features in multivariate problem classes. Shearlets are a newly developed extension of wavelets that are better suited to image characterization. In addition the degree of computational complexity of many proposed texture me
作者: 鐵塔等    時間: 2025-3-27 16:49

作者: 凝視    時間: 2025-3-27 21:42
An Enhanced and Efficient Algorithm for Faster, Better and Accurate Edge Detection information can also be taken out of an image. To extract the information out of the image, the most important feature is the edge. There are many techniques to detect edges. This paper has a detailed study about these different techniques and proposed an intelligent algorithm. Also an analysis of
作者: anus928    時間: 2025-3-27 23:21
Malware Detection Using Higher Order Statistical Parametersse their path to reach the victim system through the internet, infected browsers, injected files, memory devices, etc., highly obscured malwares evade the automated tools installed in the victim. Once the victim system gets affected by the malware, executable processes are controlled by malware. In
作者: Opponent    時間: 2025-3-28 04:41
Denoising Iris Image Using a Novel Wavelet Based Thresholdfree image. In this paper, a novel method is proposed to remove Gaussian noise present in the iris image using Undecimated wavelet, a threshold based on Golden Ratio and weighted median. First, decompose the input image using Stationary Wavelet Transform (SWT) and apply the modified Visushrink to th
作者: 彎曲的人    時間: 2025-3-28 06:45

作者: seruting    時間: 2025-3-28 11:19

作者: 口訣    時間: 2025-3-28 16:08

作者: ITCH    時間: 2025-3-28 22:19

作者: Proponent    時間: 2025-3-28 23:07
Soft Clustering Based Missing Value Imputationg missing values, etc. Missing value is a common problem in large datasets. Most frequently used method to handle missing values by statistical is discarding the instances with missing values. Sometime deletion of instances with missing values cause loss of essential information, which affects the p
作者: 不適    時間: 2025-3-29 06:52
An Optimized Anisotropic Diffusion Approach for Despeckling of SAR Imagesltering. The present work proposes an optimized AD filtering approach for despeckling of Synthetic Aperture Radar (SAR) images using Ant Colony Optimization (ACO). The residual speckle suppression has been attained via optimal parameter selection of parameters of AD using ACO algorithm. Further, com
作者: hyperuricemia    時間: 2025-3-29 10:28
Mammogram Classification Using ANFIS with Ant Colony Optimization Based Learningrly stage. Recent studies states that Adaptive Neural Fuzzy Inference System (ANFIS) classifier achieves notable performance than the other classifiers. The major forte of ANFIS is that it has the robust learning mechanism with fuzzy data. However, the connections between the layers are not pruned f
作者: 軟弱    時間: 2025-3-29 11:56
Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signaturesrding of observed data. WSNs nodes may possess sensitive data that are prone to various attacks. For such a network to be viable, integrity and authenticity should be provided to the data generated by the sensor nodes. For example, in military surveillance and enemy tracking applications, the locali
作者: 民間傳說    時間: 2025-3-29 19:38

作者: 固執(zhí)點(diǎn)好    時間: 2025-3-29 22:16

作者: 乳汁    時間: 2025-3-30 03:43

作者: magnanimity    時間: 2025-3-30 07:53

作者: 金哥占卜者    時間: 2025-3-30 10:42
Gritt Klinkhammer,Anna Neumaiertion Tamil word from text corpora. The performance of the proposed approach is compared with Light Stemmer (LS) and Improved Light Stemmer (ILS) algorithms based on correctly and incorrectly predicted stem words. The experimental result clearly shows that the proposed approach ARS for Tamil corpora performs better than the LS and ILS algorithm.
作者: Hiatus    時間: 2025-3-30 13:13

作者: flammable    時間: 2025-3-30 19:50

作者: Inculcate    時間: 2025-3-30 23:58
https://doi.org/10.1007/978-3-030-31856-7 on MovieLens data set show that the proposed technique is efficient in expanding the rating matrix and outperforms state of the art collaborative filtering techniques for providing more efficient predictions.
作者: 飛來飛去真休    時間: 2025-3-31 02:11

作者: organic-matrix    時間: 2025-3-31 06:57

作者: Lineage    時間: 2025-3-31 11:31
Item Refinement for Improved Recommendations on MovieLens data set show that the proposed technique is efficient in expanding the rating matrix and outperforms state of the art collaborative filtering techniques for providing more efficient predictions.
作者: Alopecia-Areata    時間: 2025-3-31 13:38
Analogy Removal Stemmer Algorithm for Tamil Text Corporation Tamil word from text corpora. The performance of the proposed approach is compared with Light Stemmer (LS) and Improved Light Stemmer (ILS) algorithms based on correctly and incorrectly predicted stem words. The experimental result clearly shows that the proposed approach ARS for Tamil corpora performs better than the LS and ILS algorithm.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
大荔县| 江安县| 富顺县| 天镇县| 巴彦县| 桦南县| 枣阳市| 武冈市| 夹江县| 杭州市| 八宿县| 富阳市| 分宜县| 万宁市| 张掖市| 武汉市| 浮梁县| 蓝田县| 大名县| 德化县| 于都县| 邹平县| 盐边县| 尤溪县| 盱眙县| 历史| 喀喇沁旗| 锡林浩特市| 安西县| 屏东县| 常熟市| 库尔勒市| 平罗县| 马关县| 苍梧县| 九江县| 商南县| 孝感市| 边坝县| 古浪县| 丹东市|