派博傳思國際中心

標(biāo)題: Titlebook: Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf; Part I Leszek Borzemski,Jerzy ?wi?tek [打印本頁]

作者: ALOOF    時間: 2025-3-21 16:16
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf影響因子(影響力)




書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf影響因子(影響力)學(xué)科排名




書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf網(wǎng)絡(luò)公開度




書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf被引頻次




書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf被引頻次學(xué)科排名




書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf年度引用




書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf年度引用學(xué)科排名




書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf讀者反饋




書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf讀者反饋學(xué)科排名





作者: alcoholism    時間: 2025-3-22 00:16

作者: enumaerate    時間: 2025-3-22 03:03

作者: 小蟲    時間: 2025-3-22 08:28

作者: 機構(gòu)    時間: 2025-3-22 09:20
Evaluation of Gated Recurrent Neural Networks in Music Classification Tasksces of the vector sequences in the training set. We examine the effect of this training approach on both architectures and discuss the implications for the potential use of RNN in music information retrieval.
作者: 嫌惡    時間: 2025-3-22 13:51

作者: 想象    時間: 2025-3-22 19:42
Speaker Diarization Using Deep Recurrent Convolutional Neural Networks for Speaker Embeddingsse for the public an additional dataset of over 6?h of fully annotated broadcast material. The results of our evaluation on the new dataset and three other benchmark datasets show that our proposed method significantly outperforms the competitors and reduces diarization error rate by a large margin of over 30% with respect to the baseline.
作者: subordinate    時間: 2025-3-22 23:12

作者: blithe    時間: 2025-3-23 02:52
Community Detection in Bibsonomy Using Data Clusteringor similar user detection in Bibsonomy. To realize that, we have compared three clustering algorithms: The k-means, the k-medoids and the Agglomerative clustering algorithms. Experimental results demonstrate that k-means performs better than the other algorithms, for community detection in Bibsonomy.
作者: 個人長篇演說    時間: 2025-3-23 09:04
A Deep Learning Approach for Valve Defect Recognition in Heart Acoustic SignalPhysioNet/Computing in Cardiology Challenge 2016 was used for verification of developed algorithms. We obtained 99.1% sensitivity and 91.6% specificity on the test data, which is motivational for further research.
作者: Facet-Joints    時間: 2025-3-23 13:00

作者: 懶洋洋    時間: 2025-3-23 17:12
Classification Tree for Material Defect Detection Using Active Thermography. Advantages of classification tree is an automatic feature selection and strong reduction of the pattern dimensionality. On the basis of simulation study, it can be concluded that classification tree is a useful tool for the characterisation and detection of material defects.
作者: 積習(xí)已深    時間: 2025-3-23 19:50
Interactive Visualization of Query Results Set from Information Retrieval Using Concept Latticesntain different types of attributes representing fuzzy sets. Thus, the concept lattice is then shown as an interactive graph on which reductions can be applied, increasing the clarity of the output visualization.
作者: Defense    時間: 2025-3-24 01:13

作者: Radiation    時間: 2025-3-24 02:22

作者: meritorious    時間: 2025-3-24 09:52
Conference proceedings 2018ation system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of
作者: keloid    時間: 2025-3-24 11:22

作者: minion    時間: 2025-3-24 14:54
Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf978-3-319-67220-5Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: Saline    時間: 2025-3-24 21:34

作者: Mortar    時間: 2025-3-25 01:49

作者: hedonic    時間: 2025-3-25 05:41
https://doi.org/10.1007/978-3-319-67220-5Risk Management; Information Systems; Information Systems Architecture; Computer Networks; ISAT 2017
作者: 夾死提手勢    時間: 2025-3-25 10:03

作者: circumvent    時間: 2025-3-25 13:11

作者: 娘娘腔    時間: 2025-3-25 17:09
Evaluation of Gated Recurrent Neural Networks in Music Classification Tasksnd Gated Recurrent Unit (GRU), in music classification tasks. We examine the performance on four datasets concerning genre, emotion and dance style recognition. Our key result is a significant improvement of classification accuracy achieved by training the recurrent network on random short subsequen
作者: 樸素    時間: 2025-3-25 20:15
Neuro-Fuzzy System for Medium-Term Electric Energy Demand Forecastingacts. This paper proposes a solution to medium-term energy demand forecasting that covers definition of input and output variables and the forecasting model based on a neuro-fuzzy system. As predictors patterns of the yearly periods of the time series are defined, which unify input data and filter o
作者: 一瞥    時間: 2025-3-26 00:19

作者: 貧困    時間: 2025-3-26 05:34

作者: BRINK    時間: 2025-3-26 09:08

作者: Daily-Value    時間: 2025-3-26 12:42

作者: ULCER    時間: 2025-3-26 20:35

作者: 聲明    時間: 2025-3-27 00:29

作者: Interregnum    時間: 2025-3-27 02:40
Classification Tree for Material Defect Detection Using Active Thermography sample and recording the thermal response using an infrared camera. In this work a simple variant of the time-resolved infrared radiometry method was used. The study was conducted for a sample made of the low thermal diffusivity material with artificially produced aerial defects. As a result of exp
作者: 女歌星    時間: 2025-3-27 08:59
Interactive Visualization of Query Results Set from Information Retrieval Using Concept Latticesn which the process is realized from the query input, the creation of the concept lattice and then its visualization. The concept lattices are created using Formal Concept Analysis which hierarchically organizes the results in the form of clusters of particular objects composed of the documents with
作者: Lipohypertrophy    時間: 2025-3-27 13:15
PID-Fuzzy Controllers with Dynamic Structure and Evolutionary Method for Their Constructiond error method, which can be time-consuming. In this paper a controller structure, which is an ensemble of PID controller and fuzzy system, and an automatic evolutionary method for its construction is presented. The significant feature of proposed method is that the controller elements, that increas
作者: 直覺沒有    時間: 2025-3-27 16:13

作者: Ingest    時間: 2025-3-27 19:17
Using Predictive Data Mining Models for Data Analysis in a Logistics Company, to identify the key factors that affect fuel consumption of vehicles and also to identify best practices and driving styles of drivers. For this purpose different models have been proposed to provide an overview of the key factors affecting fuel consumption for individual vehicles and their driver
作者: 審問    時間: 2025-3-27 23:45

作者: 性冷淡    時間: 2025-3-28 05:51
m using binary Goppa codes. Our key-generator implementation requires as few as 896,052 cycles to produce both public and private portions of a key, and can achieve an estimated frequency Fmax of over 240?MHz when synthesized for Stratix V FPGAs. To the best of our knowledge, this work is the first
作者: 代替    時間: 2025-3-28 09:46
such gate-level locking techniques are vulnerable to Boolean satisfiability (SAT) attacks. In order to thwart such attacks, several SAT-resistant logic locking techniques have been proposed, which minimize the discriminating ability of input patterns to rule out incorrect keys. In this work, we show
作者: Truculent    時間: 2025-3-28 12:29

作者: 煩憂    時間: 2025-3-28 17:08

作者: OVERT    時間: 2025-3-28 21:02
Jan Jakubik attacks. Masking provides high resistance against SCA at an adjustable level of security. A high level of SCA resistance, however, goes hand in hand with an increasing demand for fresh randomness which drastically increases the implementation costs. Since hardware based masking schemes have other s
作者: Arbitrary    時間: 2025-3-29 00:18
Pawe? Pe?ka,Grzegorz Dudekficient implementation of the modular arithmetic. This paper presents the basic concepts and design considerations of the RSA. crypto chip, a high-speed hardware accelerator for long integer modular exponentiation. The major design goal with the RSA was the maximization of performance on several lev
作者: 憤怒歷史    時間: 2025-3-29 04:53
Marcin Studniarski,Radhwan Al-Jawadi,Aisha Younusware implementations of cryptographic algorithms. In an attempt to reduce the resulting memory and execution time overhead, a general method was recently proposed, consisting in “masking” all the intermediate data..This masking strategy is possible if all the fundamental operations used in a given a
作者: aphasia    時間: 2025-3-29 10:22
Ma?gorzata Plechawska-Wójcik,Magdalena Borys,Mikhail Tokovarov,Monika KaczorowskaWhile side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured side-channel parameter, such as supply current. Besid
作者: 壓碎    時間: 2025-3-29 11:34

作者: 考得    時間: 2025-3-29 17:37
Dariusz Pa?ka,Marek Zachara,Krzysztof Wójcike idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of th
作者: 荒唐    時間: 2025-3-29 21:30

作者: Cholesterol    時間: 2025-3-30 00:02

作者: 挖掘    時間: 2025-3-30 04:58

作者: 愛了嗎    時間: 2025-3-30 11:23

作者: 藥物    時間: 2025-3-30 12:35

作者: 參考書目    時間: 2025-3-30 17:04
yptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. ...This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models a
作者: STALL    時間: 2025-3-30 23:58
Miroslava Muchová,Ján Parali?,Michael Nem?íks the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. ...This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis
作者: 認識    時間: 2025-3-31 02:33





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
平南县| 甘德县| 南木林县| 华坪县| 游戏| 眉山市| 平山县| 明溪县| 澄城县| 凤冈县| 秭归县| 德庆县| 镇宁| 吴旗县| 四川省| 双柏县| 宁阳县| 屯留县| 苗栗市| 曲水县| 武安市| 桃源县| 兴和县| 万盛区| 郁南县| 宜春市| 商洛市| 安庆市| 岐山县| 淮北市| 德格县| 敦化市| 泌阳县| 手机| 静乐县| 瑞金市| 新津县| 福泉市| 东港市| 蒙阴县| 枞阳县|