標(biāo)題: Titlebook: Emerging Technologies in Data Mining and Information Security; Proceedings of IEMIS Ajith Abraham,Paramartha Dutta,Soumi Dutta Conference p [打印本頁] 作者: intrinsic 時(shí)間: 2025-3-21 18:38
書目名稱Emerging Technologies in Data Mining and Information Security影響因子(影響力)
書目名稱Emerging Technologies in Data Mining and Information Security影響因子(影響力)學(xué)科排名
書目名稱Emerging Technologies in Data Mining and Information Security網(wǎng)絡(luò)公開度
書目名稱Emerging Technologies in Data Mining and Information Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Emerging Technologies in Data Mining and Information Security被引頻次
書目名稱Emerging Technologies in Data Mining and Information Security被引頻次學(xué)科排名
書目名稱Emerging Technologies in Data Mining and Information Security年度引用
書目名稱Emerging Technologies in Data Mining and Information Security年度引用學(xué)科排名
書目名稱Emerging Technologies in Data Mining and Information Security讀者反饋
書目名稱Emerging Technologies in Data Mining and Information Security讀者反饋學(xué)科排名
作者: 數(shù)量 時(shí)間: 2025-3-21 21:38 作者: 蒸發(fā) 時(shí)間: 2025-3-22 04:15
Ajith Abraham,Paramartha Dutta,Soumi DuttaComprises original research work by academics, scientists, and research scholars as well as professionals, decision makers, and industrial practitioners.Inspires young scholars to discover newly creat作者: Assignment 時(shí)間: 2025-3-22 05:19
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/e/image/308450.jpg作者: 瘋狂 時(shí)間: 2025-3-22 08:50 作者: Oscillate 時(shí)間: 2025-3-22 14:19 作者: Oscillate 時(shí)間: 2025-3-22 18:39
Vasile Marinca,Nicolae Herisanuistic. Furthermost advanced algorithms are general-purpose and do not fulfill the requirements of real-time systems. Additionally, a few allocators combining with real-time systems do not focus well on multiprocessor architecture. The emergent needs for high-performance computational processing can 作者: Verify 時(shí)間: 2025-3-23 01:01 作者: 描繪 時(shí)間: 2025-3-23 05:25 作者: 恭維 時(shí)間: 2025-3-23 08:23 作者: 危機(jī) 時(shí)間: 2025-3-23 10:23 作者: Cardioversion 時(shí)間: 2025-3-23 14:14 作者: Self-Help-Group 時(shí)間: 2025-3-23 20:16 作者: 流動(dòng)性 時(shí)間: 2025-3-24 01:36
Nonlinear Dynamics in Equilibrium Modelstal role in the field of security with any system or environment that can be implemented more efficiently. The model is developed for the distance-based security system which can ensure low power usage with portability, mobility and installation facility. In this modern era, almost every device need作者: 透明 時(shí)間: 2025-3-24 03:08
https://doi.org/10.1007/978-0-387-34918-3mputation-intensive problem-solving. In computational grid, resources are classified based on their load factors. Utilization of these resources through co-ordination of various loads is always considered an optimization problem. In order to achieve this, approach of adaptive resource ranking is app作者: 不怕任性 時(shí)間: 2025-3-24 08:47 作者: 商議 時(shí)間: 2025-3-24 13:42
https://doi.org/10.1007/978-3-662-08992-7s a considerable role in the development of the agricultural countries. Securing agricultural data is also a challenging issue in the agricultural field. In this paper, we focus on securing agriculture data from hackers. Especially in the agriculture field, due to lack of manpower, farmers are going作者: 尖酸一點(diǎn) 時(shí)間: 2025-3-24 16:36
Joseph Brizar Okaly,Théodule Nkoa Nkomomr networks, servers, storage, applications, and services) and rapidly provisioned with least effort. Cloud computing implementation in traditional ways is done using virtual machines, but nowadays a new concept of Docker containers is also gaining popularity due to its features. Containerization in 作者: frenzy 時(shí)間: 2025-3-24 20:35
Marcelo Messias,Alisson C. Reinolnsed through the Internet of smart social things. In recent years, humans act as a social sensor to disseminate the information via microblogs in Online Social Networks (OSNs) such as Twitter, Weibo. At times, the reaction to certain microblogging prompts thousands of people to rethink and impulsive作者: 不能約 時(shí)間: 2025-3-25 02:58
Business Cycles: Continuous Space, image encryption schemes has become a major research topic. During the last few decades, there has been an increase in chaos-based cryptography. This paper proposes an attack on a recently proposed chaos-based image encryption scheme. The cryptosystem under study proceeded by first shuffling the or作者: 有毒 時(shí)間: 2025-3-25 06:52
https://doi.org/10.1007/978-3-642-97291-1orientations. Depending on a threshold value for the Kirsch operator and the intensity value of each pixel of cover image, a scale with 3 ranges would be created. This scale is the basis for choosing flexible, i.e., 2, 3, or 4?LSB replacements for steganographic encoding. The threshold value is shar作者: 停止償付 時(shí)間: 2025-3-25 08:32
https://doi.org/10.1007/978-3-642-97450-2t and cover image in three color planes (red, green, blue). Then among those color planes, the actual color value of an image pixel has been hidden within the same color plane of the cover image using discrete cosine transformation. To hide the secret bit, here the desired cover bit can be chosen fr作者: LATER 時(shí)間: 2025-3-25 13:46 作者: CAGE 時(shí)間: 2025-3-25 17:47 作者: 或者發(fā)神韻 時(shí)間: 2025-3-26 00:01
2194-5357 ractitioners.Inspires young scholars to discover newly creat.The book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25作者: eulogize 時(shí)間: 2025-3-26 02:52
Conference proceedings 2019industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, case studies related to all the areas of data mining, machine learning, IoT and information security..作者: 木質(zhì) 時(shí)間: 2025-3-26 07:40
Vasile Marinca,Nicolae Herisanube satisfied by NUMA architecture-based systems having multicore system. In this paper, memory allocation algorithm has been proposed for soft real-time operating system for NUMA-based architecture which will be useful to achieve constant execution time and less fragmentation.作者: 斜谷 時(shí)間: 2025-3-26 12:28
https://doi.org/10.1007/978-3-642-97450-2om a set of 8 bits, which provides better security. This proposed technique has been tested using different color images, and experimental results have been analyzed by various quality metrics which assures better imperceptibility.作者: expository 時(shí)間: 2025-3-26 16:37 作者: averse 時(shí)間: 2025-3-26 17:25
Chaotic Dynamics in Spin-Wave Instabilities,sized mostly on conceptualizing the university as a whole and was developed using standard tools protégé 4.3. This paper tries to fill the gap between existing works by including all the concepts and their related data and object properties. The reasoning of our created ontology was done through Fact++ and Hermit 1.3.8 reasoner.作者: Cumulus 時(shí)間: 2025-3-27 00:00 作者: maverick 時(shí)間: 2025-3-27 02:33 作者: MORPH 時(shí)間: 2025-3-27 06:07 作者: obstruct 時(shí)間: 2025-3-27 10:55
Ontology-Based Information Retrieval System for University: Methods and Reasoningsized mostly on conceptualizing the university as a whole and was developed using standard tools protégé 4.3. This paper tries to fill the gap between existing works by including all the concepts and their related data and object properties. The reasoning of our created ontology was done through Fact++ and Hermit 1.3.8 reasoner.作者: ARK 時(shí)間: 2025-3-27 15:30 作者: semiskilled 時(shí)間: 2025-3-27 19:03 作者: Fresco 時(shí)間: 2025-3-28 00:33 作者: 仔細(xì)檢查 時(shí)間: 2025-3-28 05:20
2194-5357 rs, research-in-progress papers, case studies related to all the areas of data mining, machine learning, IoT and information security..978-981-13-1500-8978-981-13-1501-5Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: SHRIK 時(shí)間: 2025-3-28 07:52
Muhammed Emin Dogan,Ender Cigerogluing any QoS-aware architecture for fog computing. The mathematical formulation for the presented model has also been proposed, and hence, the performance analysis of the system is shown in terms of the QoS metrics.作者: 矛盾 時(shí)間: 2025-3-28 14:00
Angelo Antoci,Paolo Russu,Elisa Ticcie smart Wheelchair control unit consists of an integration of AVR microcontroller ATmega328 with Bluetooth module, GSM module SIM900, ultrasonic and infrared sensors, temperature sensor LM35 and motor driving circuit for controlling motor’s speed.作者: 擁擠前 時(shí)間: 2025-3-28 16:30 作者: 可憎 時(shí)間: 2025-3-28 22:05 作者: fulmination 時(shí)間: 2025-3-29 02:32
Ramaprasad Bhar,A. G. Malliarisventional cryptography scheme. The experimental results ensure the acceptable results in terms of decent quality of stego-images. In addition, the proposed scheme provides a high level of security since the embedding process is realized based on the secret key sequence.作者: 深陷 時(shí)間: 2025-3-29 03:11
Mathematical Modeling of QoS-Aware Fog Computing Architecture for IoT Servicesing any QoS-aware architecture for fog computing. The mathematical formulation for the presented model has also been proposed, and hence, the performance analysis of the system is shown in terms of the QoS metrics.作者: 不規(guī)則 時(shí)間: 2025-3-29 07:50 作者: 圓錐體 時(shí)間: 2025-3-29 12:16
A Predictive Resource Management Technique in Gridncing load in the computational grid. Jobs are scheduled for adaptively ranked resources, thus meeting the service quality agreement (SQA). The grid test bed experimental set-up is made by Globus Toolkit 5.2, and benchmark codes of matrix multiplication and fast Fourier transform are executed to demonstrate the results in this paper.作者: 公理 時(shí)間: 2025-3-29 18:50 作者: A保存的 時(shí)間: 2025-3-29 20:16 作者: CON 時(shí)間: 2025-3-30 01:29
Proposed Memory Allocation Algorithm for NUMA-Based Soft Real-Time Operating Systembe satisfied by NUMA architecture-based systems having multicore system. In this paper, memory allocation algorithm has been proposed for soft real-time operating system for NUMA-based architecture which will be useful to achieve constant execution time and less fragmentation.作者: Amorous 時(shí)間: 2025-3-30 08:07
Blind RGB Image Steganography Using Discrete Cosine Transformationom a set of 8 bits, which provides better security. This proposed technique has been tested using different color images, and experimental results have been analyzed by various quality metrics which assures better imperceptibility.作者: 認(rèn)為 時(shí)間: 2025-3-30 11:53 作者: Laconic 時(shí)間: 2025-3-30 15:37
Matthew B. Kennel,Alistair I. Mees and integrity of road network. In this study, to design better travel routes in city for enhance efficiency by GIS to develop model for collection and transportation of waste using Esri’s ArcGIS 3.2, Network Analyst software. The ArcGIS is used to determine optimal zones and optimal routes for each作者: aesthetic 時(shí)間: 2025-3-30 18:37 作者: 尾隨 時(shí)間: 2025-3-31 00:09
https://doi.org/10.1007/978-3-662-08992-7 and processing time for both with and without using proposed encryption method for securing agriculture data. In this system, we convert the raw data into JSON format, split the data, and also jumbled it. We claim that our method is more secure, reliable, and efficient compared to the existing meth作者: 干涉 時(shí)間: 2025-3-31 04:43
Marcelo Messias,Alisson C. Reinol to various sliding window from diversified geographic event locations during disasters are aggregated. In addition, the crowdsourced photographs are added with geo-tags (location) during the period of analysis stood up as supplementary evidence to detect an event which acts as crisis recovery. The 作者: 一窩小鳥 時(shí)間: 2025-3-31 06:49 作者: prick-test 時(shí)間: 2025-3-31 10:23
GIS-Based Model for Optimal Collection and Transportation System for Solid Waste in Allahabad City and integrity of road network. In this study, to design better travel routes in city for enhance efficiency by GIS to develop model for collection and transportation of waste using Esri’s ArcGIS 3.2, Network Analyst software. The ArcGIS is used to determine optimal zones and optimal routes for each作者: 花爭(zhēng)吵 時(shí)間: 2025-3-31 15:01 作者: cipher 時(shí)間: 2025-3-31 20:50
Methodology to Secure Agricultural Data in IoT and processing time for both with and without using proposed encryption method for securing agriculture data. In this system, we convert the raw data into JSON format, split the data, and also jumbled it. We claim that our method is more secure, reliable, and efficient compared to the existing meth作者: 妨礙議事 時(shí)間: 2025-3-31 22:06
Social IoT-Enabled Emergency Event Detection Framework Using Geo-Tagged Microblogs and Crowdsourced to various sliding window from diversified geographic event locations during disasters are aggregated. In addition, the crowdsourced photographs are added with geo-tags (location) during the period of analysis stood up as supplementary evidence to detect an event which acts as crisis recovery. The