派博傳思國際中心

標(biāo)題: Titlebook: Information Systems Design and Intelligent Applications; Proceedings of Fourt Vikrant Bhateja,Bao Le Nguyen,Dac-Nhuong Le Conference procee [打印本頁]

作者: 不服從    時(shí)間: 2025-3-21 17:55
書目名稱Information Systems Design and Intelligent Applications影響因子(影響力)




書目名稱Information Systems Design and Intelligent Applications影響因子(影響力)學(xué)科排名




書目名稱Information Systems Design and Intelligent Applications網(wǎng)絡(luò)公開度




書目名稱Information Systems Design and Intelligent Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Systems Design and Intelligent Applications被引頻次




書目名稱Information Systems Design and Intelligent Applications被引頻次學(xué)科排名




書目名稱Information Systems Design and Intelligent Applications年度引用




書目名稱Information Systems Design and Intelligent Applications年度引用學(xué)科排名




書目名稱Information Systems Design and Intelligent Applications讀者反饋




書目名稱Information Systems Design and Intelligent Applications讀者反饋學(xué)科排名





作者: geometrician    時(shí)間: 2025-3-21 23:38
se requirements, we present two efficient constructions that enable . to function effectively across various environments while upholding user privacy. By estimating its performance, we demonstrate the practical feasibility of . . Our findings suggest that . can efficiently verify a passenger’s vacc
作者: 旅行路線    時(shí)間: 2025-3-22 04:06

作者: Arthropathy    時(shí)間: 2025-3-22 05:59
P. Vijayaragavan,R. Ponnusamy,M. ArramuthanDPR-like Opt-In model. Our results indicate that even though very few consumers actually exercised their right to Opt-Out, the majority of US consumers desire more transparent privacy policies that the current implementation of CCPA on websites lacks.
作者: BET    時(shí)間: 2025-3-22 10:31
P. Vijayaragavan,R. Ponnusamy,M. Arramuthan,T. Vijila evaluation and divide-and-conquer techniques used for superpoly recovery, we further propose new cube attack results on . reduced to 898, 899 and 900 rounds. Such new results not only mount to the maximal number of rounds so far but also are implementation independent.
作者: G-spot    時(shí)間: 2025-3-22 16:16

作者: 無能的人    時(shí)間: 2025-3-22 19:56
Trinh T. T. Tran,Giang L. Nguyen,Chau N. Truong,Thuan T. Nguyen algorithm safer. In addition, we find an RX-colliding characteristic with probability . for a revised version of SipHash-1-x with one message block, and an RX-colliding characteristic with probability . for a revised version of SipHash-1-x with two message blocks. With the SMT-based technique, whic
作者: 緯度    時(shí)間: 2025-3-22 23:20

作者: SEMI    時(shí)間: 2025-3-23 04:35

作者: 事情    時(shí)間: 2025-3-23 07:02

作者: 傲慢物    時(shí)間: 2025-3-24 01:47
Manh Chinh Dang,Antoni Martínez-Ballesté,Ngoc Minh Pham,Thanh Trung Dangresent the users’ credentials to a third-party . accessing the attributes in the clear. This enables new privacy-preserving applications of ABCs “in the cloud.”.This is achieved by carefully integrating proxy re-encryption with structure-preserving signatures and zero-knowledge proofs of knowledge.
作者: 充氣女    時(shí)間: 2025-3-24 04:02

作者: 同時(shí)發(fā)生    時(shí)間: 2025-3-24 08:46
Thiem V. Pham,Du Dao Huy contents to third parties. SMPC is generic and allows to apply further processing like aggregation to query results..We measure the performance of our approach for realistic parameters and achieve convincingly fast runtimes that render our protocol applicable to real-world medical data integration
作者: 慢跑鞋    時(shí)間: 2025-3-24 14:41
Pham Quoc Thang,Nguyen Thanh Thuy,Hoang Thi Lam can also prove the origin of a signature. We show that the notion of strong accountability is important in practice. Finally, we prove the security properties of . (including strong accountability) and . under the Decisional Diffie-Hellman (DDH) assumption in the random oracle model.
作者: endarterectomy    時(shí)間: 2025-3-24 17:38

作者: 淡紫色花    時(shí)間: 2025-3-24 22:49

作者: 音樂學(xué)者    時(shí)間: 2025-3-25 01:46

作者: debris    時(shí)間: 2025-3-25 05:18
Trung Ha Duyen,Tuan Do Trongle paradigm. We prove that there exist protocols for secure . - oblivious transfer without an honest majority and in the presence of static malicious adversaries that rely only on black-box access to a homomorphic encryption scheme. By applying the well-known results of Kilian, we further claim that
作者: 啜泣    時(shí)間: 2025-3-25 07:36
Eye Blink Artefact Cancellation in EEG Signal Using Sign-Based Nonlinear Adaptive Filtering Techniqhis, a comparison of the filtered output signal is done with the output from the conventional LMS filter. Based on the parameters such as signal-to-noise ratio (SNR), misadjustment ratio (Madj) and excess mean square error (EMSE), we noticed that the filtered output from the Nonlinear adaptive filte
作者: hysterectomy    時(shí)間: 2025-3-25 12:58

作者: hegemony    時(shí)間: 2025-3-25 17:44

作者: thalamus    時(shí)間: 2025-3-25 21:20

作者: 后來    時(shí)間: 2025-3-26 02:23
Vikrant Bhateja,Bao Le Nguyen,Dac-Nhuong LeCovers novel and original research in computer science and information technology.Focuses on topics like natural language processing, artificial intelligence, cyber forensics, software engineering and
作者: Tremor    時(shí)間: 2025-3-26 07:02

作者: arcane    時(shí)間: 2025-3-26 10:42

作者: Bother    時(shí)間: 2025-3-26 15:30

作者: 發(fā)炎    時(shí)間: 2025-3-26 18:31

作者: Aids209    時(shí)間: 2025-3-27 00:55
Mining Frequent Fuzzy Itemsets Using Node-List,ain uncertain and imprecise data. To solve the above-mentioned problem, fuzzy association rule mining algorithms are developed to handle quantitative data using fuzzy set. In this paper, we present proposed algorithm NFFP, an improved fuzzy version of PPV algorithm for discovering frequent fuzzy itemsets using Node-List structure.
作者: 場所    時(shí)間: 2025-3-27 02:14

作者: 潛移默化    時(shí)間: 2025-3-27 06:45
Energy-Efficient Resource Allocation for Virtual Service in Cloud Computing Environment, was designed to solve and evaluate through CloudSim simulation tool compared with an . algorithm. The experimental results indicate that the proposed . algorithm yields a higher performance in comparison with an . algorithm.
作者: 相互影響    時(shí)間: 2025-3-27 12:13

作者: 毛細(xì)血管    時(shí)間: 2025-3-27 13:48

作者: GLIDE    時(shí)間: 2025-3-27 18:23
Sociopsycho-Economic Knowledge-Based System in E-Commerce Using Soft Set Theory Technique,state of a client. Earlier frameworks do not thoroughly investigate the human sociopsycho based Web-based promoting. The designed structure provides investigating the human sociopsycho completely with the assistance of soft set theoretic hypothesis technique. The strategy assesses every single substance of the client request and investigates it.
作者: 燒瓶    時(shí)間: 2025-3-27 23:59

作者: STENT    時(shí)間: 2025-3-28 02:46
JCIA: A Tool for Change Impact Analysis of Java EE Applications,t sets by applying the change impact analysis (CIA) based on change types and Wave-CIA method. The calculated impact sets help managers in planning and estimating changes, developers in implementing changes, and testers with regression testing.
作者: EVADE    時(shí)間: 2025-3-28 07:17

作者: 令人作嘔    時(shí)間: 2025-3-28 13:31

作者: 散布    時(shí)間: 2025-3-28 16:29

作者: 逃避責(zé)任    時(shí)間: 2025-3-28 20:34
Pharmacophore Modeling and Docking Studies of SNCA Receptor with Some Active Phytocompounds from Se from BLAST were downloaded from PDB. The 3D structure of SNCA was modeled; the 3D structures of phytocompounds (unknown ligands) were taken from various online databases; phytocompounds were virtually screened against the SNCA receptor, and the best ligand was selected.
作者: 彈藥    時(shí)間: 2025-3-29 00:51
Automatic Target Acquisition and Discreet Close Surveillance Using Quad Copter with Raspberry Pi Suforce (QRF) to effectively neutralize threats without taking too much risks and damages. The application is made in a way so that it is compatible with any handheld device and can be used anywhere. Thus, we make a drone which is modular, does not require air eld and much knowledge to operate, and can be used in border with fewer resources.
作者: Charade    時(shí)間: 2025-3-29 06:18
Implementation and Analysis of BBO Algorithm for Better Damping of Rotor Oscillations of a Synchron PSS, BBO-based PID-PSS and conventional PSS are performed by using MATLAB/Simulink. The results show that BBO-based PID-PSS method improves the system performance and provides better dynamic performance.
作者: 植物學(xué)    時(shí)間: 2025-3-29 10:27

作者: Precursor    時(shí)間: 2025-3-29 12:03
A Modification of Solution Optimization in Support Vector Machine Simplification for Classificationriginal one. To ameliorate this similarity, in this paper, we present a modification of solution optimization in SimpSVM. The proposed approach is based on stochastic optimization. Experiments on benchmark and sign language datasets show improved results by our modification.
作者: 有組織    時(shí)間: 2025-3-29 18:21
An Effective FP-Tree-Based Movie Recommender System,e). The FP-tree is then modified with rating data and an effective recommendation strategy can improve the recommendation performance of the FP-tree. A MovieLens dataset which is public and popular for evaluating movie recommender systems is observed and examined for assessing the proposed method.
作者: pacifist    時(shí)間: 2025-3-29 23:01
RSSI-Based ZIGBEE Independent Monitoring System in Prison for Prisoners,e prisoners from escaping the prison by using the method of received signal strength indicator (RSSI) which monitors the distance between a pair of nodes in a network. Another method called Electron-ICS enables the development of microsensor which manages the wireless communication network.
作者: 不妥協(xié)    時(shí)間: 2025-3-30 02:26

作者: progestin    時(shí)間: 2025-3-30 06:58

作者: 漫步    時(shí)間: 2025-3-30 10:26
Sociopsycho-Economic Knowledge-Based System in E-Commerce Using Soft Set Theory Technique,ation to the punter. The prerequisite from client satisfaction is made as a design to achieve sociopsycho-economic knowledge. The substance structure approach gathers the informational collection to accomplish the objective of consumer necessity. The system contains the client fulfillment to online
作者: –吃    時(shí)間: 2025-3-30 16:00

作者: 宇宙你    時(shí)間: 2025-3-30 18:47
Automatic Target Acquisition and Discreet Close Surveillance Using Quad Copter with Raspberry Pi Su maintain discreet close surveillance. A simple quad copter is used to maintain contact with the hostiles. To acquire targets, we use a PI sensor camera which is programmed by Raspberry Pi to automatically acquire targets. For real-time tracking and surveillance, we use a cloud to store coordinates
作者: 軟弱    時(shí)間: 2025-3-30 21:21

作者: 蜈蚣    時(shí)間: 2025-3-31 02:39
A New Approach for Query Processing and Optimization in Fuzzy Object-Oriented Database,ng. This paper proposes a new model for the Fuzzy Object-Oriented DBMS (FOO-DBMS), which optimizes the query statements and processes the data before returning back to users based on fuzzy object algebra and equivalent transformation rules. Discussions on this model are also presented with computati
作者: Neuralgia    時(shí)間: 2025-3-31 06:03
A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority,s in case of dispute internally and internal integrity of multisignature generation process. In practical, the proposed scheme has more controls to an organization by using the threshold mechanism and allowing a limited number of members who can authorize transactions while allowing the group to gro
作者: 積云    時(shí)間: 2025-3-31 09:58
Implementation and Analysis of BBO Algorithm for Better Damping of Rotor Oscillations of a Synchron Derivative (PID) controller and power system stabilizer (PSS) parameters. The efficiency of BBO algorithm is verified on the single-machine infinite-bus (SMIB) system for various operating conditions. The proposed method suppresses the (0.1–2.5?Hz) low-frequency electromechanical oscillations and i
作者: Maximize    時(shí)間: 2025-3-31 14:54

作者: 恃強(qiáng)凌弱    時(shí)間: 2025-3-31 20:12
No-Key Protocol for Deniable Encryption,n protocol resistant to the passive coercive attacks, which uses no pre-shared secret keys and no pre-exchanged public keys. The protocol begins with the stage at which the sender and receiver exchange their single-use public keys and compute the single-use shared secret key. Then, it is performed p
作者: AVOID    時(shí)間: 2025-3-31 22:00

作者: CYT    時(shí)間: 2025-4-1 02:22

作者: accessory    時(shí)間: 2025-4-1 10:00
Energy-Efficient Resource Allocation for Virtual Service in Cloud Computing Environment,hine number providing resources for virtual service in cloud computing is one of the efficient ways to decrease the energy consumption amount which in turn enhance the performance of data centers. In this study, we propose the resource allocation problem to reduce the energy consumption. . algorithm
作者: 脫毛    時(shí)間: 2025-4-1 12:57
Novel Adaptive Neural Sliding Mode Control for Uncertain Nonlinear System with Disturbance Estimati tracking control is taken into account as an adaptive neural sliding mode. A chattering phenomenon will be eliminated by reducing a norm of disturbance based on disturbance estimation and feed-forward correction. The set of controller’s parameter, which is a satisfy Hurwitz polynomial, is then upda
作者: heckle    時(shí)間: 2025-4-1 16:59

作者: 死貓他燒焦    時(shí)間: 2025-4-1 21:21

作者: 慟哭    時(shí)間: 2025-4-2 00:21
An Effective FP-Tree-Based Movie Recommender System,they want in a large numerous of various movies on the Web quickly. The performance of movie recommendation is influenced by many factors, such as user behavior, user ratings. Therefore, the aim of this study is to mine datasets of user ratings and user behaviors in order to recommend the most suita
作者: CLAIM    時(shí)間: 2025-4-2 02:56

作者: antidepressant    時(shí)間: 2025-4-2 09:03
and simultaneously control the spread of the disease, the implementation of contact tracing and digital vaccine passport technologies has been introduced. While contact tracing methods have been extensively studied and scrutinized for security concerns through numerous publications, vaccine passport
作者: 無孔    時(shí)間: 2025-4-2 12:31
Preenon Bagchi,M. Anuradha,Ajit Karechanisms that potentially do not capture the user’s true choices. We investigated the user choices in Cookie Consent Banner of US residents, the plurality of whom were from California, through an online experiment of 257 participants and compared the results with how they perceived to these Cookie




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
赤壁市| 乌拉特中旗| 昌江| 宁陕县| 敦煌市| 卫辉市| 阳朔县| 虞城县| 枣强县| 子洲县| 阿合奇县| 哈尔滨市| 东阳市| 静海县| 贺兰县| 临沂市| 化隆| 云南省| 清丰县| 巢湖市| 广宗县| 阳春市| 吉木萨尔县| 平山县| 普安县| 曲沃县| 唐河县| 永寿县| 合肥市| 达州市| 长岛县| 镇安县| 花莲市| 杨浦区| 汝阳县| 班戈县| 历史| 左云县| 漯河市| 安庆市| 黄冈市|