派博傳思國(guó)際中心

標(biāo)題: Titlebook: E-Business and Telecommunications; 15th International J Mohammad S. Obaidat Conference proceedings 2019 Springer Nature Switzerland AG 2019 [打印本頁(yè)]

作者: 贊美    時(shí)間: 2025-3-21 19:04
書(shū)目名稱(chēng)E-Business and Telecommunications影響因子(影響力)




書(shū)目名稱(chēng)E-Business and Telecommunications影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)E-Business and Telecommunications網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)E-Business and Telecommunications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)E-Business and Telecommunications被引頻次




書(shū)目名稱(chēng)E-Business and Telecommunications被引頻次學(xué)科排名




書(shū)目名稱(chēng)E-Business and Telecommunications年度引用




書(shū)目名稱(chēng)E-Business and Telecommunications年度引用學(xué)科排名




書(shū)目名稱(chēng)E-Business and Telecommunications讀者反饋




書(shū)目名稱(chēng)E-Business and Telecommunications讀者反饋學(xué)科排名





作者: 流動(dòng)性    時(shí)間: 2025-3-21 20:41
Anonymity in Complex Transactions for e-Business,t to reveal sensitive data of his identity (as credit card number, information about customer’s bank, customer’s account number) so that this information can not be used by merchant in commercial purpose to build spending habits of the customer. Also, a merchant may want to remain anonymous. For exa
作者: Urgency    時(shí)間: 2025-3-22 02:44
Generation of High Quality Microwave Signal Using Different Optoelectronic Techniques,implemented experimentally. The experimental results of signal generation using optoelectronic oscillator (OEO) are taken for three different long delay optical fiber lengths. The generated signal has a narrow bandwidth (less than 200?Hz) at carrier frequency of 2.31?GHz with phase noise less than ?
作者: 砍伐    時(shí)間: 2025-3-22 05:48

作者: FICE    時(shí)間: 2025-3-22 12:33
Automated Verification of E-Commerce Protocols for Complex Transactions,rce protocol for complex transactions in that the customer wants to buy several different physical products from different merchants ensuring strong fair exchange, atomicity, effectiveness, timeliness, non-repudiation, integrity and confidentiality. In this paper, we improve the protocol for complex
作者: 聲明    時(shí)間: 2025-3-22 16:26
Security for Distributed Machine Learning Based Software,data, decentralizing applications and integrating novel components seamlessly to the central systems. Distributively deployed AI capabilities will thrust this transition..Several non-functional requirements arise along with these developments, security being at the center of the discussions. Bearing
作者: 聲明    時(shí)間: 2025-3-22 18:07

作者: Delectable    時(shí)間: 2025-3-22 23:28
Compile-Time Security Certification of Imperative Programming Languages,techniques in programming languages to enforce a finer-grained restriction on the propagation of information among untrusted objects. In this paper, we introduce a . (DL) algorithm (This paper is an extended version of the article [.] presented in SECRYPT’18.) for security certification of imperativ
作者: 為敵    時(shí)間: 2025-3-23 05:00
Real-Time Noise Reduction Algorithm for Video with Non-linear FIR Filter, under poor lighting conditions for security purposes or night time news gathering. Videos shot under poor lighting conditions are afflicted by significant noise which degrades the image quality. The process of noise removal from videos is called noise reduction (NR). Although many NR methods are pr
作者: 浪費(fèi)時(shí)間    時(shí)間: 2025-3-23 05:47
Cloudless Friend-to-Friend Middleware for Smartphones,hich usually reside in the cloud, are necessary for brokering communication between peers, and all communication must pass through them. A reason for this is that smartphones lack publicly reachable IP addresses. Also, because people carry their smartphones with them, smartphones will often disconne
作者: 不要不誠(chéng)實(shí)    時(shí)間: 2025-3-23 09:53

作者: 大猩猩    時(shí)間: 2025-3-23 14:26

作者: 彎腰    時(shí)間: 2025-3-23 20:01

作者: 過(guò)份好問(wèn)    時(shí)間: 2025-3-24 00:26
,Die geistigen F?higkeiten der Bienen,to the RF signal. A jitter in the cavity resonances due to temperature variations is completely eliminated from the output beat signal. There is a 10?dB increase in the phase noise at the FSR frequency and its harmonics. The setup is tested with signals generated by two different microwave sources a
作者: Little    時(shí)間: 2025-3-24 04:51
https://doi.org/10.1007/978-3-642-51347-3ifying group-level differences between (1) the sample of CEOs and the general population, and (2) between two groups of CEOs, when a history of rule-breaking behavior is considered. The predictive performance evaluation conducted on the current sample shows that the binary logistic regression model
作者: magenta    時(shí)間: 2025-3-24 06:47

作者: 原始    時(shí)間: 2025-3-24 13:24

作者: 過(guò)份艷麗    時(shí)間: 2025-3-24 15:25

作者: Genetics    時(shí)間: 2025-3-24 20:03
1865-0929 data communication networking, e-business, optical communication systems, security andcryptography, signal processing and multimedia applications, and wireless networks and mobile systems..978-3-030-34865-6978-3-030-34866-3Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: obstinate    時(shí)間: 2025-3-24 23:28

作者: 敬禮    時(shí)間: 2025-3-25 05:19
Generation of High Quality Microwave Signal Using Different Optoelectronic Techniques,to the RF signal. A jitter in the cavity resonances due to temperature variations is completely eliminated from the output beat signal. There is a 10?dB increase in the phase noise at the FSR frequency and its harmonics. The setup is tested with signals generated by two different microwave sources a
作者: Root494    時(shí)間: 2025-3-25 11:00

作者: Bricklayer    時(shí)間: 2025-3-25 14:51

作者: Itinerant    時(shí)間: 2025-3-25 18:53
Real-Time Noise Reduction Algorithm for Video with Non-linear FIR Filter,ite impulse response (IIR) filter to reduce noise. This approach is known as the inter-frame relation, and the noise reducer comprises a temporal recursive filter. Temporal recursive filters are widely used in digital TV sets to reduce the noise affecting images. Although the temporal recursive filt
作者: Banquet    時(shí)間: 2025-3-25 23:39
A Mixed Traffic Sharing and Resource Allocation for V2X Communication,source Allocation (MSRA) Algorithm to guarantee the low latency and the stringent reliability requirements of Safety V-UEs, and to maximize the sum rate capacity and respect the delay constraint of C-UEs and non Safety V-UEs, respectively, while respecting the signal-to-interference-plus-noise ratio
作者: 省略    時(shí)間: 2025-3-26 03:57
Steganogaphy Using Mac-Independent Opportunistic Routing and Encoding (MORE) Protocol Based Communi to a 50% reduced time/computation complexity. Furthermore, we analyse the proposed schemes and discuss their vulnerability to steganalysis attacks, then we propose an enhancement against these attacks.
作者: 極小量    時(shí)間: 2025-3-26 06:53
https://doi.org/10.1007/978-3-7091-3602-7 transactions from [.] by providing a more efficient protocol for each subtransaction from complex transaction. Also, we formally verify our improved solution using AVISPA. The verification results obtained using AVISPA demonstrate that our improved solution preserves all security requirements obtained in [.].
作者: podiatrist    時(shí)間: 2025-3-26 12:00

作者: 新義    時(shí)間: 2025-3-26 15:32

作者: 獨(dú)特性    時(shí)間: 2025-3-26 17:39
Cloudless Friend-to-Friend Middleware for Smartphones,y of known peers, authentication mechanisms, and secure communication channels. In this paper, we propose a peer-to-peer middleware that provides these features without the need for centralized services.
作者: Ledger    時(shí)間: 2025-3-26 23:54
Aus dem Gebiet der Funktionalgleichungenroducts from different merchants is proposed. This solution provides customer anonymity, non-repudiation, integrity and confidentiality of data exchanged between the parties. In this paper, we extend the solution from [.] obtaining both anonymity of customer and each merchant, while preserving all properties obtained in [.].
作者: 公理    時(shí)間: 2025-3-27 04:49

作者: jeopardize    時(shí)間: 2025-3-27 09:04

作者: LUMEN    時(shí)間: 2025-3-27 12:51
Security for Distributed Machine Learning Based Software,yption (FHE), our approach enables the protection of Distributed Neural Networks, while processing encrypted data. On that respect we evaluate the feasibility of this solution on a Convolutional Neuronal Network (CNN) for image classification deployed on distributed infrastructures.
作者: AROMA    時(shí)間: 2025-3-27 14:49

作者: Ringworm    時(shí)間: 2025-3-27 17:50
1865-0929 held in Porto, Portugal, in July 2018..ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; Internation
作者: Mediocre    時(shí)間: 2025-3-27 22:56

作者: coalition    時(shí)間: 2025-3-28 05:26

作者: 警告    時(shí)間: 2025-3-28 06:35
Aus dem Gebiet der Funktionalgleichungent to reveal sensitive data of his identity (as credit card number, information about customer’s bank, customer’s account number) so that this information can not be used by merchant in commercial purpose to build spending habits of the customer. Also, a merchant may want to remain anonymous. For exa
作者: Limerick    時(shí)間: 2025-3-28 12:49
,Die geistigen F?higkeiten der Bienen,implemented experimentally. The experimental results of signal generation using optoelectronic oscillator (OEO) are taken for three different long delay optical fiber lengths. The generated signal has a narrow bandwidth (less than 200?Hz) at carrier frequency of 2.31?GHz with phase noise less than ?
作者: neologism    時(shí)間: 2025-3-28 18:02

作者: gorgeous    時(shí)間: 2025-3-28 21:23
https://doi.org/10.1007/978-3-7091-3602-7rce protocol for complex transactions in that the customer wants to buy several different physical products from different merchants ensuring strong fair exchange, atomicity, effectiveness, timeliness, non-repudiation, integrity and confidentiality. In this paper, we improve the protocol for complex
作者: Ebct207    時(shí)間: 2025-3-29 02:09

作者: AWE    時(shí)間: 2025-3-29 04:52

作者: Obvious    時(shí)間: 2025-3-29 09:07
https://doi.org/10.1007/978-3-7091-2369-0techniques in programming languages to enforce a finer-grained restriction on the propagation of information among untrusted objects. In this paper, we introduce a . (DL) algorithm (This paper is an extended version of the article [.] presented in SECRYPT’18.) for security certification of imperativ
作者: Infantry    時(shí)間: 2025-3-29 13:01
https://doi.org/10.1007/978-3-662-40323-5 under poor lighting conditions for security purposes or night time news gathering. Videos shot under poor lighting conditions are afflicted by significant noise which degrades the image quality. The process of noise removal from videos is called noise reduction (NR). Although many NR methods are pr
作者: neologism    時(shí)間: 2025-3-29 19:33





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
晋城| 嘉黎县| 托克托县| 永春县| 恭城| 芜湖县| 大荔县| 喀喇沁旗| 沁源县| 巫山县| 深州市| 望奎县| 星座| 洪雅县| 兰考县| 左权县| 贵南县| 潜山县| 手机| 西华县| 达尔| 浦北县| 体育| 杭锦后旗| 洪雅县| 竹北市| 西平县| 宜宾市| 临夏市| 集贤县| 桐梓县| 伊宁市| 安图县| 咸丰县| 文昌市| 安岳县| 汕尾市| 宜昌市| 肃宁县| 浦江县| 洮南市|