派博傳思國際中心

標題: Titlebook: Information Systems Design and Intelligent Applications; Proceedings of Fifth Suresh Chandra Satapathy,Vikrant Bhateja,Roman Sen Conference [打印本頁]

作者: morphology    時間: 2025-3-21 17:12
書目名稱Information Systems Design and Intelligent Applications影響因子(影響力)




書目名稱Information Systems Design and Intelligent Applications影響因子(影響力)學(xué)科排名




書目名稱Information Systems Design and Intelligent Applications網(wǎng)絡(luò)公開度




書目名稱Information Systems Design and Intelligent Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Systems Design and Intelligent Applications被引頻次




書目名稱Information Systems Design and Intelligent Applications被引頻次學(xué)科排名




書目名稱Information Systems Design and Intelligent Applications年度引用




書目名稱Information Systems Design and Intelligent Applications年度引用學(xué)科排名




書目名稱Information Systems Design and Intelligent Applications讀者反饋




書目名稱Information Systems Design and Intelligent Applications讀者反饋學(xué)科排名





作者: Fibroid    時間: 2025-3-21 21:24

作者: 公司    時間: 2025-3-22 02:11

作者: Irrepressible    時間: 2025-3-22 05:58

作者: inhibit    時間: 2025-3-22 12:44

作者: habile    時間: 2025-3-22 15:21

作者: 熱情贊揚    時間: 2025-3-22 20:45

作者: 業(yè)余愛好者    時間: 2025-3-23 01:17
Cognitive Modeling of Mindfulness Therapy by Autogenic Training,individual to develop an extreme stressful emotion. In the second phase, the therapy with the two goals is shown to make the stressed individual relaxed. Hebbian learning is used to increase the influence of the therapy.
作者: 比喻好    時間: 2025-3-23 03:05
Identifying the Reusable Components from Component-Based System: Proposed Metrics and Model,odifiable, fully modifiable as well as for off-the-shelf components. Using reusability-metric, we draw a reusability-matrix containing the reusability ratios of all the different classes of components. This paper introduces selection criteria for components by using the reusability features of component-based software.
作者: Isthmus    時間: 2025-3-23 07:17
Cloud Forensics in Relation to Criminal Offences and Industrial Attacks in Mauritius,Mauritius for computer misuse are also being described. It is obvious that the cloud provides many advantages as described in this paper. However, along with this service, there are several challenges before extracting evidence in case of attacks. These include acquisition of evidence and its preservation, chain of custody and legislation.
作者: Militia    時間: 2025-3-23 12:21

作者: 暫停,間歇    時間: 2025-3-23 13:58

作者: sacrum    時間: 2025-3-23 18:33

作者: flaunt    時間: 2025-3-24 02:10

作者: 狂熱文化    時間: 2025-3-24 06:05
Dolphin Swarm Algorithm for Cryptanalysis,utions with higher fitness in a shorter period of time and with fewer individuals. The DSA can also be used to attack other block ciphers like Advanced Encryption Standard or Elliptic Curve Cryptography due to the independence of the fitness function with respect to the cipher.
作者: 迫擊炮    時間: 2025-3-24 08:21
A Secured Communication Model for IoT,ternet, the major concern arises around the security aspects of IoT. In this paper, we address a publish/subscribe security model for IoT which can usefully contribute to secured communications on IoT.
作者: 厚顏無恥    時間: 2025-3-24 11:28

作者: 減弱不好    時間: 2025-3-24 18:06

作者: 松軟    時間: 2025-3-24 19:48
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/465489.jpg
作者: Addictive    時間: 2025-3-25 02:15
https://doi.org/10.1007/978-981-13-3338-5Bio-informatics; Business Intelligence; Communication Technology; INDIA; INDIA Proceedings; Image Process
作者: 恃強凌弱的人    時間: 2025-3-25 04:03
978-981-13-3337-8Springer Nature Singapore Pte Ltd. 2019
作者: 縮減了    時間: 2025-3-25 09:46
Information Systems Design and Intelligent Applications978-981-13-3338-5Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 有危險    時間: 2025-3-25 12:43

作者: 勾引    時間: 2025-3-25 16:11

作者: Diluge    時間: 2025-3-25 23:18
Randhir Roopchund,Vani Ramesh,Vishal Jaunkylish secure (point-to-point and/or broadcast) communication channels among the nodes of a wireless sensor network is a fundamental security task. To this end, a plethora of so-called . schemes have been proposed in the past, e.g., [25][9][19][8][5]. All these schemes, however, rely on shared secret(
作者: Anterior    時間: 2025-3-26 03:15
Nirmal Kumar Betchoo are generated, and do not have unified format. How to organize and utilize those alerts to enhance network security becomes a hot topic of research. Network-warning system, which can correlate alerts and predict future attacks, appears as one promising solution for the problem. In this paper, an in
作者: 使成波狀    時間: 2025-3-26 06:35
David Bastien,Radhakhrishna Somanahing with other (non-short) digital signatures, it has the advantage of small data size of communication. This kind of signature schemes have been widely investigated a decade ago, but, no ID-based message recovery signature is proposed until 2005 by Zhang et al. Since, up to the present, no method c
作者: euphoria    時間: 2025-3-26 09:28
Swaleha Peerooabase. In case of server compromise the secrets are vulnerable to theft. A possible solution to this problem to apply distributed systems. We propose a mutual authentication protocol with key agreement, where identity verification is carried out by multiple servers applying secret sharing technology
作者: 彎彎曲曲    時間: 2025-3-26 13:16
S. Sahand Mohammadi Ziabari,Jan Treurn-interactive, short and cheap to verify. This property makes them suitable for recursive proof composition, that is proofs attesting to the validity of other proofs. To achieve this, one . the arithmetic operations .. Recursive proof composition has been empirically demonstrated for pairing-based S
作者: 歡樂中國    時間: 2025-3-26 17:14

作者: 高歌    時間: 2025-3-26 22:15
Nagaratna B. Chittaragi,Asavari Limaye,N. T Chandana,B Annappa,Shashidhar G. Koolagudin-interactive, short and cheap to verify. This property makes them suitable for recursive proof composition, that is proofs attesting to the validity of other proofs. To achieve this, one . the arithmetic operations .. Recursive proof composition has been empirically demonstrated for pairing-based S
作者: Bucket    時間: 2025-3-27 04:21

作者: reaching    時間: 2025-3-27 07:45
Dhanush Leelodharryand Japan. MULTI2 uses the Feistel structure and operates on the 64-bit blocks. The encryption key has 256 bits..This paper studies the linear analysis on MULTI2. We give a detailed bias analysis on MULTI2 round functions. For the first time formal proofs on their bias properties are given. This all
作者: OTTER    時間: 2025-3-27 10:04

作者: Cleave    時間: 2025-3-27 15:50

作者: finale    時間: 2025-3-27 21:33
Kanayah Saurty,Pierre C. Catherine,Krishnaraj M. S. Soyjaudahrithmetic, e.g., for multiplying large integers and large degree polynomials. It is commonly used in cryptographic schemes that are based on the hardness of the Ring Learning With Errors (R-LWE) problem to efficiently implement modular polynomial multiplication..We present a new modular reduction te
作者: 顯示    時間: 2025-3-27 22:43

作者: Irritate    時間: 2025-3-28 05:45

作者: ABASH    時間: 2025-3-28 10:19

作者: cocoon    時間: 2025-3-28 12:59

作者: Highbrow    時間: 2025-3-28 14:50

作者: SPECT    時間: 2025-3-28 20:50
Sanjeev K. Cowlessur,B. Annappa,M. V. Manoj Kumar,Likewin Thomas,M. M. Sneha,B. H. Puneethaand simultaneously control the spread of the disease, the implementation of contact tracing and digital vaccine passport technologies has been introduced. While contact tracing methods have been extensively studied and scrutinized for security concerns through numerous publications, vaccine passport
作者: 擴張    時間: 2025-3-29 02:04

作者: Brittle    時間: 2025-3-29 05:42
,Use of Social Media for Improving Student Engagement at Université des Mascareignes (UDM),rch ontology adopted is that students may benefit from a more interactive approach of learning in classes. The methodology used is the use of a pre-designed questionnaire to test the readiness of students and faculty members for the use of social media. Three components were extracted based on EFA w
作者: photopsia    時間: 2025-3-29 09:29
,Conceptualising an Online Resource Platform for Business Students at Université des Mascareignes,r their instruction and research during their university years. So far, resources abound in the form of textbooks, CDs and online resources like EBSCO along with an online library facility from Université de Limoges (Unilim, France). Business students in human resource management, banking and relate
作者: inflame    時間: 2025-3-29 12:14
An Unsupervised Machine Learning Analysis of the FIRST Radio Sources,ng (ML) to do a morphological segmentation of 1000 radio sources. Through techniques like shapelets decomposition, we were able to decompose each radio sources into a series of 256 coefficients that were input into unsupervised ML techniques like Isometric Mapping (ISOMAP) for dimensionality reducti
作者: 有發(fā)明天才    時間: 2025-3-29 17:21
Customer-Initiated Conversations on Facebook Pages of Tesco and Walmart, sites of businesses but there is scant research as to why customers interact with businesses on social media in the grocery sector. This paper sets out to explore why customers initiate conversations and how do the other members of the online brand community react to those customer posts. Netnograp
作者: 輕快來事    時間: 2025-3-29 23:27
Cognitive Modeling of Mindfulness Therapy by Autogenic Training,ining that can be used when under stress; it has as two main goals to achieve feeling heavy and warm body parts (limbs). Mantras have been used in therapies since long ago to make stressed individuals more relaxed, and they are also used in Autogenic Training. The presented cognitive temporal-causal
作者: 時代錯誤    時間: 2025-3-30 02:25

作者: antipsychotic    時間: 2025-3-30 06:29
Automatic Text-Independent Kannada Dialect Identification System,ing spoken has a wide variety of applications. However, not many Automatic Speech Recognition (ASR) and dialect identification tasks are carried out in majority of the Indian languages. Further, there are only a few good quality annotated audio datasets available. In this paper, a new dataset for 5
作者: 背景    時間: 2025-3-30 09:16
Identifying the Reusable Components from Component-Based System: Proposed Metrics and Model,asurement to discover and investigate the static activities of the module. This paper proposed a set of reusability metrics especially partly adaptable, completely changeable and moderately capable modules. The process of reusability can be measured to degree of module in component-based system. Thi
作者: Classify    時間: 2025-3-30 15:35

作者: 時代    時間: 2025-3-30 18:14
HECMI: Hybrid Ensemble Technique for Classification of Multiclass Imbalanced Data,e this problem, most of them assume binary classes. However, occurrence of multiple classes in most of the applications is not uncommon. Multiclass classification with imbalanced data poses additional challenges. This paper proposes a hybrid ensemble approach for classification of multiclass imbalan
作者: 紅潤    時間: 2025-3-30 22:28

作者: progestogen    時間: 2025-3-31 02:55

作者: 造反,叛亂    時間: 2025-3-31 05:10

作者: enchant    時間: 2025-3-31 11:28

作者: 含糊其辭    時間: 2025-3-31 13:40
A Cloud-Based Energy Monitoring System Using IoT and Machine Learning, production. The current proposal employs cloud computing and machine learning to analyze energy data collected from a nonintrusive IoT system to display energy consumption from several appliances connected to the same power line. For scalability purpose, all collected data from sensors are processe
作者: 山間窄路    時間: 2025-3-31 19:09
A Prototype Mobile Augmented Reality Systems for Cultural Heritage Sites,ed AR as a state-of-the-art technology in the last decade giving rise to more and more Location-Based Mobile AR (LBMAR) systems. This technology is widely been used by heritage industry to create the missing sparks from their static environment thus making it livelier and entertaining. Yet, current
作者: PATRI    時間: 2025-4-1 00:31

作者: Immunization    時間: 2025-4-1 04:05
Alphabetic Cryptography: Securing Communication Over Cloud Platform,ation and secure communication over the cloud computing platform, and second supports the exchange of complete UNICODE character set. Alphabetic cryptography has been implemented on mobile and desktop platforms. Through experimental studies, it has been observed that randomness of encryption increas
作者: 擦掉    時間: 2025-4-1 08:32
Integrating Information Technology and Marketing for Better Customer Value,omer values, different business analytics are developed and tested. Innovation in technology has brought new methods in which data can be sorted and analysed for organisational strategic development. The online environment is dynamic and this paper captures how marketers are using information techno
作者: Ige326    時間: 2025-4-1 10:23





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
玉林市| 寻甸| 玛多县| 灵武市| 鲜城| 桑日县| 富顺县| 南昌市| 江川县| 荔波县| 德钦县| 宣威市| 甘南县| 濮阳市| 嘉定区| 怀宁县| 锡林浩特市| 社会| 延边| 饶河县| 会泽县| 历史| 南汇区| 天峨县| 汤原县| 西昌市| 万年县| 南岸区| 连南| 奎屯市| 玉环县| 淮滨县| 油尖旺区| 内黄县| 奎屯市| 新竹市| 晋中市| 沧州市| 宜兴市| 桃园市| 华蓥市|