標(biāo)題: Titlebook: Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf; Part I Leszek Borzemski,Jerzy ?wi?tek [打印本頁] 作者: ALOOF 時間: 2025-3-21 16:16
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf影響因子(影響力)
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf影響因子(影響力)學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf網(wǎng)絡(luò)公開度
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf被引頻次
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf被引頻次學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf年度引用
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf年度引用學(xué)科排名
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf讀者反饋
書目名稱Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf讀者反饋學(xué)科排名
作者: alcoholism 時間: 2025-3-22 00:16 作者: enumaerate 時間: 2025-3-22 03:03 作者: 小蟲 時間: 2025-3-22 08:28 作者: 機構(gòu) 時間: 2025-3-22 09:20
Evaluation of Gated Recurrent Neural Networks in Music Classification Tasksces of the vector sequences in the training set. We examine the effect of this training approach on both architectures and discuss the implications for the potential use of RNN in music information retrieval.作者: 嫌惡 時間: 2025-3-22 13:51 作者: 想象 時間: 2025-3-22 19:42
Speaker Diarization Using Deep Recurrent Convolutional Neural Networks for Speaker Embeddingsse for the public an additional dataset of over 6?h of fully annotated broadcast material. The results of our evaluation on the new dataset and three other benchmark datasets show that our proposed method significantly outperforms the competitors and reduces diarization error rate by a large margin of over 30% with respect to the baseline.作者: subordinate 時間: 2025-3-22 23:12 作者: blithe 時間: 2025-3-23 02:52
Community Detection in Bibsonomy Using Data Clusteringor similar user detection in Bibsonomy. To realize that, we have compared three clustering algorithms: The k-means, the k-medoids and the Agglomerative clustering algorithms. Experimental results demonstrate that k-means performs better than the other algorithms, for community detection in Bibsonomy.作者: 個人長篇演說 時間: 2025-3-23 09:04
A Deep Learning Approach for Valve Defect Recognition in Heart Acoustic SignalPhysioNet/Computing in Cardiology Challenge 2016 was used for verification of developed algorithms. We obtained 99.1% sensitivity and 91.6% specificity on the test data, which is motivational for further research.作者: Facet-Joints 時間: 2025-3-23 13:00 作者: 懶洋洋 時間: 2025-3-23 17:12
Classification Tree for Material Defect Detection Using Active Thermography. Advantages of classification tree is an automatic feature selection and strong reduction of the pattern dimensionality. On the basis of simulation study, it can be concluded that classification tree is a useful tool for the characterisation and detection of material defects.作者: 積習(xí)已深 時間: 2025-3-23 19:50
Interactive Visualization of Query Results Set from Information Retrieval Using Concept Latticesntain different types of attributes representing fuzzy sets. Thus, the concept lattice is then shown as an interactive graph on which reductions can be applied, increasing the clarity of the output visualization.作者: Defense 時間: 2025-3-24 01:13 作者: Radiation 時間: 2025-3-24 02:22 作者: meritorious 時間: 2025-3-24 09:52
Conference proceedings 2018ation system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of作者: keloid 時間: 2025-3-24 11:22 作者: minion 時間: 2025-3-24 14:54
Information Systems Architecture and Technology: Proceedings of 38th International Conference on Inf978-3-319-67220-5Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: Saline 時間: 2025-3-24 21:34 作者: Mortar 時間: 2025-3-25 01:49 作者: hedonic 時間: 2025-3-25 05:41
https://doi.org/10.1007/978-3-319-67220-5Risk Management; Information Systems; Information Systems Architecture; Computer Networks; ISAT 2017作者: 夾死提手勢 時間: 2025-3-25 10:03 作者: circumvent 時間: 2025-3-25 13:11 作者: 娘娘腔 時間: 2025-3-25 17:09
Evaluation of Gated Recurrent Neural Networks in Music Classification Tasksnd Gated Recurrent Unit (GRU), in music classification tasks. We examine the performance on four datasets concerning genre, emotion and dance style recognition. Our key result is a significant improvement of classification accuracy achieved by training the recurrent network on random short subsequen作者: 樸素 時間: 2025-3-25 20:15
Neuro-Fuzzy System for Medium-Term Electric Energy Demand Forecastingacts. This paper proposes a solution to medium-term energy demand forecasting that covers definition of input and output variables and the forecasting model based on a neuro-fuzzy system. As predictors patterns of the yearly periods of the time series are defined, which unify input data and filter o作者: 一瞥 時間: 2025-3-26 00:19 作者: 貧困 時間: 2025-3-26 05:34 作者: BRINK 時間: 2025-3-26 09:08 作者: Daily-Value 時間: 2025-3-26 12:42 作者: ULCER 時間: 2025-3-26 20:35 作者: 聲明 時間: 2025-3-27 00:29 作者: Interregnum 時間: 2025-3-27 02:40
Classification Tree for Material Defect Detection Using Active Thermography sample and recording the thermal response using an infrared camera. In this work a simple variant of the time-resolved infrared radiometry method was used. The study was conducted for a sample made of the low thermal diffusivity material with artificially produced aerial defects. As a result of exp作者: 女歌星 時間: 2025-3-27 08:59
Interactive Visualization of Query Results Set from Information Retrieval Using Concept Latticesn which the process is realized from the query input, the creation of the concept lattice and then its visualization. The concept lattices are created using Formal Concept Analysis which hierarchically organizes the results in the form of clusters of particular objects composed of the documents with作者: Lipohypertrophy 時間: 2025-3-27 13:15
PID-Fuzzy Controllers with Dynamic Structure and Evolutionary Method for Their Constructiond error method, which can be time-consuming. In this paper a controller structure, which is an ensemble of PID controller and fuzzy system, and an automatic evolutionary method for its construction is presented. The significant feature of proposed method is that the controller elements, that increas作者: 直覺沒有 時間: 2025-3-27 16:13 作者: Ingest 時間: 2025-3-27 19:17
Using Predictive Data Mining Models for Data Analysis in a Logistics Company, to identify the key factors that affect fuel consumption of vehicles and also to identify best practices and driving styles of drivers. For this purpose different models have been proposed to provide an overview of the key factors affecting fuel consumption for individual vehicles and their driver作者: 審問 時間: 2025-3-27 23:45 作者: 性冷淡 時間: 2025-3-28 05:51
m using binary Goppa codes. Our key-generator implementation requires as few as 896,052 cycles to produce both public and private portions of a key, and can achieve an estimated frequency Fmax of over 240?MHz when synthesized for Stratix V FPGAs. To the best of our knowledge, this work is the first 作者: 代替 時間: 2025-3-28 09:46
such gate-level locking techniques are vulnerable to Boolean satisfiability (SAT) attacks. In order to thwart such attacks, several SAT-resistant logic locking techniques have been proposed, which minimize the discriminating ability of input patterns to rule out incorrect keys. In this work, we show作者: Truculent 時間: 2025-3-28 12:29 作者: 煩憂 時間: 2025-3-28 17:08 作者: OVERT 時間: 2025-3-28 21:02
Jan Jakubik attacks. Masking provides high resistance against SCA at an adjustable level of security. A high level of SCA resistance, however, goes hand in hand with an increasing demand for fresh randomness which drastically increases the implementation costs. Since hardware based masking schemes have other s作者: Arbitrary 時間: 2025-3-29 00:18
Pawe? Pe?ka,Grzegorz Dudekficient implementation of the modular arithmetic. This paper presents the basic concepts and design considerations of the RSA. crypto chip, a high-speed hardware accelerator for long integer modular exponentiation. The major design goal with the RSA was the maximization of performance on several lev作者: 憤怒歷史 時間: 2025-3-29 04:53
Marcin Studniarski,Radhwan Al-Jawadi,Aisha Younusware implementations of cryptographic algorithms. In an attempt to reduce the resulting memory and execution time overhead, a general method was recently proposed, consisting in “masking” all the intermediate data..This masking strategy is possible if all the fundamental operations used in a given a作者: aphasia 時間: 2025-3-29 10:22
Ma?gorzata Plechawska-Wójcik,Magdalena Borys,Mikhail Tokovarov,Monika KaczorowskaWhile side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured side-channel parameter, such as supply current. Besid作者: 壓碎 時間: 2025-3-29 11:34 作者: 考得 時間: 2025-3-29 17:37
Dariusz Pa?ka,Marek Zachara,Krzysztof Wójcike idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of th作者: 荒唐 時間: 2025-3-29 21:30 作者: Cholesterol 時間: 2025-3-30 00:02 作者: 挖掘 時間: 2025-3-30 04:58 作者: 愛了嗎 時間: 2025-3-30 11:23 作者: 藥物 時間: 2025-3-30 12:35 作者: 參考書目 時間: 2025-3-30 17:04
yptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. ...This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models a作者: STALL 時間: 2025-3-30 23:58
Miroslava Muchová,Ján Parali?,Michael Nem?íks the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. ...This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis 作者: 認識 時間: 2025-3-31 02:33