標(biāo)題: Titlebook: International Conference on Applications and Techniques in Cyber Security and Intelligence; Applications and Tec Jemal Abawajy,Kim-Kwang Ra [打印本頁] 作者: 手或腳 時間: 2025-3-21 16:34
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence影響因子(影響力)
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence影響因子(影響力)學(xué)科排名
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence網(wǎng)絡(luò)公開度
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence被引頻次
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence被引頻次學(xué)科排名
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence年度引用
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence年度引用學(xué)科排名
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence讀者反饋
書目名稱International Conference on Applications and Techniques in Cyber Security and Intelligence讀者反饋學(xué)科排名
作者: infatuation 時間: 2025-3-21 22:39 作者: Enzyme 時間: 2025-3-22 03:59
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/471364.jpg作者: 不可思議 時間: 2025-3-22 07:39 作者: COUCH 時間: 2025-3-22 09:24 作者: definition 時間: 2025-3-22 14:17 作者: CRATE 時間: 2025-3-22 18:04
Research on the Architecture of Road Traffic Accident Analysis Platform Based on Big Data,er presents a road traffic accident analysis platform based on big data technology. It discusses the key technologies, including content data processing, security, and data analysis. Improvement on public security traffic management can be expected.作者: packet 時間: 2025-3-22 22:48
Conference proceedings 2018 on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence..作者: Substance 時間: 2025-3-23 01:53
lecules, especially peptides and proteins, as well as DNA therapeutics.? In .Drug Design and Discovery: Methods and Protocols., leading experts provide an in-depth view of key protocols that are commonly used in drug discovery laboratories.? Covering both classic and cutting-edge techniques, this vo作者: STALL 時間: 2025-3-23 05:56 作者: Allure 時間: 2025-3-23 10:18 作者: Bricklayer 時間: 2025-3-23 16:19 作者: 盤旋 時間: 2025-3-23 22:05
Zhuoyan Wangcal targets and the subsequent development of the so-called targeted drugs. In order to maximize their efficacy, as well as that of the other drugs, it is imperative to identify those patients that are more prone to experience a therapeutic benefit. In the pharmacogenetic area, several strategies ma作者: 冬眠 時間: 2025-3-24 01:24 作者: Scintigraphy 時間: 2025-3-24 02:57
Qili Xiao,Jiqiu Li,Changfan Xiao different from any of the endogenous compounds known at that time. Quantitative estimations of the novel principle were made by comparing the activity of extracts with the effect of a standard preparation referred to as “P” on the tracings and in the protocols, so that, since 1934, the term “substa作者: 神圣在玷污 時間: 2025-3-24 08:13 作者: micturition 時間: 2025-3-24 12:50
Li Li,Xiao Wei,Zheng Xual models have been essential in the in vivo validation of novel drug targets, establishment of lead compound pharmacokinetic to pharmacodynamic relationships, optimization of lead compounds through preclinical candidate selection, and development of translational measures of target occupancy and fu作者: 確定 時間: 2025-3-24 16:04
Duan Huixian,Wang Jun,Song Lei,Zhao Yixin,Na Liunt approaches for prescribing these treatments. The selection of treatments continues to be subjective and often results in a trial-and-error approach. Emerging research suggests that biological markers (or biomarkers) can be used to develop precision medicine approaches for psychiatric disorders. F作者: occurrence 時間: 2025-3-24 20:26 作者: 獨輪車 時間: 2025-3-25 00:06
Juan Du,Hengqing Jing) at the Ettore Majorana Centre for Scientific Culture from October 3 through 12, 1980. The course, which consisted of lectures and teaching seminars, examined issues of international importance in all phases of drug development, assessment, and regu- lation. In order to recreate both the atmosphere作者: agnostic 時間: 2025-3-25 06:08
The Fast Lane Detection of Road Using RANSAC Algorithm, important part of the system. Fast and stable lane detection is a prerequisite for Lane detection under complex background. In this paper, we propose a new lane detection method through a bird’s eye view maps and modified RANSAC (random sampling) based on inspiration from the road feature extractio作者: THE 時間: 2025-3-25 11:32
Face Detection and Description Based on Video Structural Description Technologies,face of the positive view. Alternative method, the image of face angle to the direction of knowledge can improve performance based on non-frontal view technology. Human face location detection in the city plays an important role in the continuous application of the surveillance video, such as face r作者: Forage飼料 時間: 2025-3-25 11:54
Cloud Based Image Retrieval Scheme Using Feature Vector,eal of storage space. In order to protect privacy of outsourcing information, customer information must be encrypted, and redaction. However, it is difficult to search for information in the encrypted file. In this paper, we study the encrypted image retrieval technique of outsourcing. An image retr作者: Nonflammable 時間: 2025-3-25 17:23
Research on Security Outsourcing Privacy in Cloud Environments,the emergence of large data poses new challenges to traditional data security. This project mainly focuses on data security in the cloud computing environment outsourcing and retrieval, the key technology for solving the outsourcing of data processing, saving local computing resources, reduce comput作者: 起波瀾 時間: 2025-3-25 22:47 作者: Irascible 時間: 2025-3-26 00:31
Research on the Architecture of Road Traffic Accident Analysis Platform Based on Big Data,er presents a road traffic accident analysis platform based on big data technology. It discusses the key technologies, including content data processing, security, and data analysis. Improvement on public security traffic management can be expected.作者: 事先無準(zhǔn)備 時間: 2025-3-26 04:34 作者: 爵士樂 時間: 2025-3-26 09:44
Deep Neural Network with Limited Numerical Precision,aper trains convolutional neural network with three different data formats (float point, fixed point and dynamic fixed point) on two different datasets (MNIST, CIFAR-10). For each data set and each data format, the paper assesses the impact of the multiplication accuracy to the error rate at the end作者: 暖昧關(guān)系 時間: 2025-3-26 13:00 作者: 榨取 時間: 2025-3-26 18:45 作者: Grasping 時間: 2025-3-27 00:13
Risk Evaluation of Financial Websites Based on Structure Mining,customers to achieve online financing, payment, investment and lending, becomes more and more popular. Risk of internet finance is much higher than that of traditional financial system because of the rapid fund flowing, lack of personal credit audit, deficiency of standard network operation and impe作者: 寵愛 時間: 2025-3-27 02:27
Word Vector Computation Based on Implicit Expression, similarity when clustering with word vectors. (2) Number of all kinds of name entities, such as person name, location name, and organization name is infinite while the number of one specific name entity in corpus is limited. As the result, the vectors for these name entities are not fully trained. 作者: 連詞 時間: 2025-3-27 08:39 作者: Inkling 時間: 2025-3-27 10:04 作者: 吵鬧 時間: 2025-3-27 16:38
Textual Keyword Optimization Using Priori Knowledge,rove the precision of textual keyword extraction. To solve the problem, this paper proposes a method to optimize the textual keyword using priori knowledge. First, some priori knowledge for keyword extraction is discussed. Then, a keyword quality evaluation method based on semantic distance between 作者: 修改 時間: 2025-3-27 19:57
A Speed Estimation Method of Vehicles Based on Road Monitoring Video-Images,tation law and traffic conditions. In this paper, we present a speed estimation method of vehicles based on road monitoring video-images. Firstly, we set up a word coordinate system on the license plate in one vehicle image. Next, for small vehicles in China, according to the known length and width 作者: CULP 時間: 2025-3-27 22:34 作者: vanquish 時間: 2025-3-28 04:50 作者: STEER 時間: 2025-3-28 08:09
Conference proceedings 2018 on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electr作者: Gullible 時間: 2025-3-28 14:07 作者: 調(diào)整校對 時間: 2025-3-28 14:37
Operating the Public Information Platform for Logistics with Internet Thinking,significance of development. In addition, for the current common problems of the platform, this paper proposes related countermeasures and suggestions on operating the public information platform for logistics with Internet thinking.作者: 上漲 時間: 2025-3-28 20:31 作者: Carminative 時間: 2025-3-29 02:19
Cloud Based Image Retrieval Scheme Using Feature Vector,ieval based on content encryption scheme is proposed. In this scenario, using blind method based on discrete logarithm problem of eigenvectors to maintain confidentiality and a clever retrieval method is used. This is a dynamic programme, support a fuzzy search. Clients can control the search. During the search, the original image does not leak.作者: 大溝 時間: 2025-3-29 04:10 作者: jaunty 時間: 2025-3-29 08:39 作者: maverick 時間: 2025-3-29 12:18 作者: Modify 時間: 2025-3-29 16:59
Fuzzy Keyword Search Based on Comparable Encryption, achieved. However, fuzzy keywords search is difficulty. In this paper, a fuzzy keyword search scheme is proposed based on comparable encryption technique. In the proposed scheme is flexible, the users can set the similarity of the keywords so as to control the search range.作者: corn732 時間: 2025-3-29 21:50 作者: 做方舟 時間: 2025-3-30 01:47
Textual Keyword Optimization Using Priori Knowledge,keywords is proposed to judge whether a keyword is good or bad. Next, a textual keyword optimization method is proposed based on the keyword evaluation. Finally, some experiments are carried out, the results of which show that the proposed method can improve the accuracy of keyword extraction on domain texts.作者: 一夫一妻制 時間: 2025-3-30 05:54
2194-5357 igence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electronic security and intelligence..978-3-319-67070-6978-3-319-67071-3Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: Anterior 時間: 2025-3-30 12:17 作者: 矛盾心理 時間: 2025-3-30 13:49 作者: 持久 時間: 2025-3-30 16:47 作者: Diatribe 時間: 2025-3-30 22:12
The Fast Lane Detection of Road Using RANSAC Algorithm, field. Each field, Lane the RANSAC algorithm is improved and the dual-model fitting. Therefore, the curvature of the road direction can be predicted and the slope of the line. Finally, our results show that lane detection algorithm is robust and real-time performance in a variety of road conditions.作者: anchor 時間: 2025-3-31 00:54 作者: Harrowing 時間: 2025-3-31 08:08 作者: Infirm 時間: 2025-3-31 11:58
Face Detection and Description Based on Video Structural Description Technologies,k classifier classifies the face direction. Based on the results, our algorithm can detect up to 95%. Through the implementation of face direction, we can get the best upright frontal face image recognition and most distinctive quality for further application.作者: PALMY 時間: 2025-3-31 15:13 作者: BLA 時間: 2025-3-31 21:27 作者: Mets552 時間: 2025-4-1 00:06 作者: BAIT 時間: 2025-4-1 04:01 作者: Self-Help-Group 時間: 2025-4-1 08:49 作者: cringe 時間: 2025-4-1 11:17 作者: 深淵 時間: 2025-4-1 16:32
ir respective topics, lists of the necessary materials, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls..?.Thorough and accessible, .Drug Design and Discovery: Methods and Protocols. serve as a vital laboratory reference for pharmaceut作者: Cerebrovascular 時間: 2025-4-1 20:31 作者: Institution 時間: 2025-4-1 23:37