派博傳思國際中心

標(biāo)題: Titlebook: Digital Information Processing and Communications; International Confer Vaclav Snasel,Jan Platos,Eyas El-Qawasmeh Conference proceedings 20 [打印本頁]

作者: fundoplication    時(shí)間: 2025-3-21 18:39
書目名稱Digital Information Processing and Communications影響因子(影響力)




書目名稱Digital Information Processing and Communications影響因子(影響力)學(xué)科排名




書目名稱Digital Information Processing and Communications網(wǎng)絡(luò)公開度




書目名稱Digital Information Processing and Communications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Digital Information Processing and Communications被引頻次




書目名稱Digital Information Processing and Communications被引頻次學(xué)科排名




書目名稱Digital Information Processing and Communications年度引用




書目名稱Digital Information Processing and Communications年度引用學(xué)科排名




書目名稱Digital Information Processing and Communications讀者反饋




書目名稱Digital Information Processing and Communications讀者反饋學(xué)科排名





作者: TEN    時(shí)間: 2025-3-21 23:29

作者: 吃掉    時(shí)間: 2025-3-22 03:33

作者: 手段    時(shí)間: 2025-3-22 07:57
Towards a Generic Cloud-Based Modeling Environmentas designed to serve as a platform for online services and collaborative environments where users typically work on remotely stored, shared data through a browser-based user interface. The paper summarizes the common requirements towards such services, overviews related approaches and gives insights
作者: 商業(yè)上    時(shí)間: 2025-3-22 11:00
Tool for Sun Power Calculation for Solar Systemsnd proper orientation and slope of photovoltaic panels in relation with the type and inclination of the landscape is discussed. The first part of the work focuses on the EU’s interactive maps (Photovoltaic Geographical Information System) and describes the calculations and the input data used for de
作者: Prostaglandins    時(shí)間: 2025-3-22 16:17

作者: Prostaglandins    時(shí)間: 2025-3-22 18:43

作者: 單片眼鏡    時(shí)間: 2025-3-22 22:49
XML Documents – Publishing from Relational Databases of this applications store their information in relational databases. This fact is unlikely to be changed considering many advantages of the relational database systems like: fiability, scalability, performance and working tools. Thus, while XML language is under development, the necessity of some
作者: 松軟無力    時(shí)間: 2025-3-23 02:34
Simple Rules for Syllabification of Arabic Textsmost widely used alphabet around the world. Therefore, the computer processing of Arabic language or Arabic alphabet is more and more important task. In the past, several books about analyzing of the Arabic language were published. But the language analysis is only one step in the language processin
作者: SPASM    時(shí)間: 2025-3-23 05:37

作者: intuition    時(shí)間: 2025-3-23 11:33

作者: 擔(dān)憂    時(shí)間: 2025-3-23 16:12
Traffic Profiling in Mobile Networks Using Machine Learning Techniques demonstrate how this can be done through clustering of vast amounts of network monitoring data, and show how discovered clusters can be used to mathematically model the PS traffic. We also demonstrate accuracy of the models obtained using this methodology. This problem is important for accurate dim
作者: 脫落    時(shí)間: 2025-3-23 19:37
A Deterministic Approach to Association Rule Mining without Attribute Discretizationning proper intervals. But the type and parameters of the discretization can affect notably the quality of the rules generated. This work presents a method based on a deterministic exploration of the interval search space, with no use of a previous discretization but the dynamic generation of interv
作者: Infraction    時(shí)間: 2025-3-23 22:35

作者: 萬花筒    時(shí)間: 2025-3-24 05:23

作者: 河潭    時(shí)間: 2025-3-24 08:47
View from Inside One Neuronological systems work. New areas of neural computing are trying to make at least one step beyond what digital computing means. The key point is based on learning rather than programming. We designed a mathematical model for information processing. The neuron model is viewed from inside as a feedback
作者: discord    時(shí)間: 2025-3-24 13:40

作者: HPA533    時(shí)間: 2025-3-24 17:18
A Bee Colony Task Scheduling Algorithm in Computational Gridsts is an NP-complete problem. Therefore, using heuristic approaches to solve the scheduling problem is a very common and also acceptable method in these environments. In this paper, a new task scheduling algorithm based on bee colony optimization approach is proposed. The algorithm uses artificial b
作者: 煤渣    時(shí)間: 2025-3-24 19:46

作者: Genetics    時(shí)間: 2025-3-25 02:06

作者: Inveterate    時(shí)間: 2025-3-25 05:48

作者: CANON    時(shí)間: 2025-3-25 07:37
Simple Rules for Syllabification of Arabic Textsl known, but syllabification algorithms for Arabic and their usage in text compression has not been deeply investigated. This paper describes a new and very simple algorithm for syllabification of Arabic and its usage in text compression.
作者: palpitate    時(shí)間: 2025-3-25 12:15
Digital Information Processing and Communications978-3-642-22389-1Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: MAIM    時(shí)間: 2025-3-25 16:48

作者: debouch    時(shí)間: 2025-3-25 23:53
FWebQ – A Framework for Websites Quality Evaluationre for a global quality evaluation of a website. This structure is based in three main dimensions (contents, services, technical), characteristics, sub-characteristics and attributes, that will substantiate the development of broad websites quality evaluation, comparison and improvement methodologies, according to particular sectors of activity.
作者: 暴露他抗議    時(shí)間: 2025-3-26 00:54
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/279461.jpg
作者: 有偏見    時(shí)間: 2025-3-26 07:17
https://doi.org/10.1007/978-3-642-22389-1evolutionary computing; genetic algorithms; medical information system; multiagent systems; pervasive co
作者: LUT    時(shí)間: 2025-3-26 11:59

作者: Malcontent    時(shí)間: 2025-3-26 12:47

作者: 符合國情    時(shí)間: 2025-3-26 16:53
https://doi.org/10.1007/978-3-663-08932-2and formalization of documents. One of the main problems faced by reviewers is recognizing counterfeit documents. The electronic signature of documents is a preliminary solution to the problem. In our research we are interested in developing a web service that allows to sign documents and verify the
作者: Circumscribe    時(shí)間: 2025-3-26 21:32
https://doi.org/10.1007/978-3-540-73250-1ng. The Network Layer in WMN is responsible for routing packets delivery and intruders take a deep interest in sabotaging this layer. Black-hole attack is a type of Denial-of-Service (DoS) attack which when carried out can disrupt the services of this layer. When the malicious nodes collude, the att
作者: GROSS    時(shí)間: 2025-3-27 01:21
Thilo Enders,Thomas Vetter,Uwe Wagneras designed to serve as a platform for online services and collaborative environments where users typically work on remotely stored, shared data through a browser-based user interface. The paper summarizes the common requirements towards such services, overviews related approaches and gives insights
作者: 移動(dòng)    時(shí)間: 2025-3-27 06:14

作者: progestin    時(shí)間: 2025-3-27 10:43
Risikoaggregation in der Praxisre for a global quality evaluation of a website. This structure is based in three main dimensions (contents, services, technical), characteristics, sub-characteristics and attributes, that will substantiate the development of broad websites quality evaluation, comparison and improvement methodologie
作者: dragon    時(shí)間: 2025-3-27 16:39
Holger Sommerfeld,Elmar Steurert this infrastructure by combining the Java based Cipango SIP/HTTP Servlet Application Server with the Ruby on Rails Web development framework. We provide detailed explanations of the steps required to build this infrastructure and produce a SIP registrar example application with a simple Web interf
作者: 忙碌    時(shí)間: 2025-3-27 21:40

作者: BLANC    時(shí)間: 2025-3-28 00:35
Matrix der Risikoaversion im Friedensprozessmost widely used alphabet around the world. Therefore, the computer processing of Arabic language or Arabic alphabet is more and more important task. In the past, several books about analyzing of the Arabic language were published. But the language analysis is only one step in the language processin
作者: resuscitation    時(shí)間: 2025-3-28 03:50

作者: savage    時(shí)間: 2025-3-28 09:07

作者: 遺產(chǎn)    時(shí)間: 2025-3-28 10:33

作者: Recessive    時(shí)間: 2025-3-28 16:49

作者: degradation    時(shí)間: 2025-3-28 19:44

作者: bizarre    時(shí)間: 2025-3-28 23:23
Risikojournalismus und Risikogesellschaftblem in case of insufficient memory for all vectors from the training set for computation of SOM by CUDA on YearPredictionMSD Data Set. The algorithm, presented in previous paper pre-selects potential centroids of data clusters and uses them as weight vectors in the final SOM network. The sutability
作者: 教唆    時(shí)間: 2025-3-29 06:39

作者: grovel    時(shí)間: 2025-3-29 07:16
Risikokommunikation von Unternehmenare subject to failure. In this paper, a fault tolerant task scheduling algorithm is proposed for mapping task graphs to heterogeneous processing nodes in cluster computing systems. The starting point of the algorithm is a DAG representing an application with information about the tasks. This inform
作者: indifferent    時(shí)間: 2025-3-29 13:00
Risikomanagement in der Bauwirtschaftts is an NP-complete problem. Therefore, using heuristic approaches to solve the scheduling problem is a very common and also acceptable method in these environments. In this paper, a new task scheduling algorithm based on bee colony optimization approach is proposed. The algorithm uses artificial b
作者: 凹槽    時(shí)間: 2025-3-29 15:38

作者: REIGN    時(shí)間: 2025-3-29 23:09
https://doi.org/10.1007/978-3-663-08932-2 authenticate digital documents. We have verified formally this protocol and found out that it provides the fourth level of authentication according to Lowe’s hierarchy. In addition, we also address security aspects that must be taken into account to avoid attacks in these kinds of applications and some implementations we are developing.
作者: 中子    時(shí)間: 2025-3-30 01:20
Risikomanagement in der Bauwirtschaft proposed algorithm not only minimizes the makespan of the environment, but also satisfies the deadline and priority requirements of the tasks. Simulation results obtained from applying the algorithm to different grid environments show the prominence of the algorithm to other similar scheduling algorithms.
作者: 去才蔑視    時(shí)間: 2025-3-30 07:27
Symmetric Cryptography Protocol for Signing and Authenticating Digital Documents authenticate digital documents. We have verified formally this protocol and found out that it provides the fourth level of authentication according to Lowe’s hierarchy. In addition, we also address security aspects that must be taken into account to avoid attacks in these kinds of applications and some implementations we are developing.
作者: PET-scan    時(shí)間: 2025-3-30 09:23

作者: 緩和    時(shí)間: 2025-3-30 13:03
1865-0929 essing and Communications, ICDIPC 2011, held in Ostrava, Czech Republic, in July 2011. The 91 revised full papers of both volumes presented together with 4 invited talks were carefully reviewed and selected from 235 submissions. The papers are organized in topical sections on network security; Web a
作者: licence    時(shí)間: 2025-3-30 19:25
Das klassische Risikomanagement,ion of the initial safety conditions and absence of services providing devices rating capability with further content error corrections in real time. The main solution would consist of secure middleware based software tools integration in the main service providing systems with devices rating based on the priority settings.
作者: Antioxidant    時(shí)間: 2025-3-30 22:56

作者: 極少    時(shí)間: 2025-3-31 04:10

作者: 控訴    時(shí)間: 2025-3-31 07:13

作者: capsaicin    時(shí)間: 2025-3-31 11:53

作者: 善變    時(shí)間: 2025-3-31 17:01

作者: 搏斗    時(shí)間: 2025-3-31 19:47





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
理塘县| 驻马店市| 天镇县| 斗六市| 莆田市| 揭东县| 厦门市| 边坝县| 梅河口市| 乐昌市| 顺平县| 宾川县| 肇州县| 龙川县| 岗巴县| 安泽县| 乌兰浩特市| 天台县| 蒲江县| 孟连| 霍林郭勒市| 江安县| 淮阳县| 微山县| 资兴市| 鱼台县| 芜湖县| 准格尔旗| 扶绥县| 垦利县| 马关县| 绿春县| 博兴县| 叙永县| 安远县| 清原| 盈江县| 娄烦县| 始兴县| 拜城县| 新田县|