標(biāo)題: Titlebook: International Conference on Information Technology and Communication Systems; Gherabi Noreddine,Janusz Kacprzyk Conference proceedings 201 [打印本頁(yè)] 作者: 水平 時(shí)間: 2025-3-21 17:33
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems影響因子(影響力)
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems被引頻次
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems被引頻次學(xué)科排名
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems年度引用
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems年度引用學(xué)科排名
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems讀者反饋
書(shū)目名稱(chēng)International Conference on Information Technology and Communication Systems讀者反饋學(xué)科排名
作者: OMIT 時(shí)間: 2025-3-21 22:19
Conference proceedings 2018ofessors, scientists, PhD students and engineers with a readily available guide to various approaches in Engineering Science.?.The book is divided into two major sections, the first of which covers Information Technology topics, including E-Learning, E-Government (egov), Data Mining, Text Mining, On作者: 抗生素 時(shí)間: 2025-3-22 02:08 作者: 不持續(xù)就爆 時(shí)間: 2025-3-22 08:32
Automation of a Fault Management System for Bahraini Telecommunication Companiespe, and geo-location of the fault (customer), specialty and current geo-location of the staff member. The proposed algorithm assigns faults to field staff members such that all faults are resolved within the planned fixing time, and minimum distance travelled by each staff member, and with a workload fairly distributed among field staff members.作者: 玩笑 時(shí)間: 2025-3-22 09:04 作者: separate 時(shí)間: 2025-3-22 15:53
An Adaptation of GRA Method for Network Selection in Vertical Handover Contexto be used in this context. We compared the decisions returned by different MADM algorithms, changing their normalization to determine which one is the best, and we found a new adaptation of the Gray Relational Analysis (GRA) to the VH decision making context.作者: 誓言 時(shí)間: 2025-3-22 18:57
Toward Cluster Head Selection Criterions in Mobile Ad Hoc Networkt challenging research issues to be resolved. It presents a various techniques and recent work to make cluster and elect cluster head in Manet, then we pinpoint on some prominent algorithms in the literature.作者: 愛(ài)國(guó)者 時(shí)間: 2025-3-22 22:06 作者: Antecedent 時(shí)間: 2025-3-23 02:43 作者: 頭腦冷靜 時(shí)間: 2025-3-23 07:49 作者: colostrum 時(shí)間: 2025-3-23 11:20
An Enhanced Method to Compute the Similarity Between Concepts of Ontologye hierarchy of ontology. Afterward, we base on this result to compute the semantic similarity. Finally, we present an experimental comparison between our method and other methods of similarity measuring.作者: 冒失 時(shí)間: 2025-3-23 16:43
Towards a Completeness Prediction Based on the Complexity and Impaction our current paper addresses the first problem to a dimension that is completeness..This improvement will be have a cost that we cannot calculate clearly, but we can measure her complexity, because the complexity increases with the cost, the approach here is implemented under a Java EE environment.作者: 周興旺 時(shí)間: 2025-3-23 18:48 作者: Fatten 時(shí)間: 2025-3-23 22:35 作者: CESS 時(shí)間: 2025-3-24 04:11
A New Method of IPv6 Addressing Based on RFID in Small Objects Networkse between the network prefix and the tag ID to derive an IPv6 address of the tag from its ID. In this way, RFID-IPv6 mapping provides better solution for objects because it minimizes the chances of address conflicts in the network.作者: Onerous 時(shí)間: 2025-3-24 07:21
2194-5357 l School of Applied Sciences of Khouribga, Hassan 1st UniverThis book reports on advanced methods and theories in two related fields of research, Information Technology and Communication Systems. It provides professors, scientists, PhD students and engineers with a readily available guide to various作者: monogamy 時(shí)間: 2025-3-24 14:27 作者: PAC 時(shí)間: 2025-3-24 18:25
Collecting and Processing Multilingual Streaming Tweets for Sentiment Analysisrobing consumer opinion or direct advertising campaigns. Many studies have focused on the sentiment analysis for the English language. However, few studies have focused on the Arabic language which is a native language for Millions of people who use social network. This paper addresses some approach作者: Emasculate 時(shí)間: 2025-3-24 20:58 作者: disrupt 時(shí)間: 2025-3-24 23:25 作者: 拱墻 時(shí)間: 2025-3-25 05:19 作者: Flawless 時(shí)間: 2025-3-25 11:14
Automation of a Fault Management System for Bahraini Telecommunication Companiesanagement from reporting a fault until its resolution and collecting of a customer signature. The proposed system consists of two parts: the web-based subsystem and the mobile app. The web-based subsystem is responsible for accomplishing the following tasks: maintaining faults, assigning faults to s作者: 突變 時(shí)間: 2025-3-25 14:19
Towards Classification of Web Ontologies Using the Horizontal and Vertical Segmentatione bigger these ontologies, the greater their exploitation. However, when these ontologies become too big other problems may appear, such as the complexity to charge big files in memory, the time it needs to download such files and especially the time it needs to make reasoning on them. We discuss in作者: TRACE 時(shí)間: 2025-3-25 18:28 作者: FLACK 時(shí)間: 2025-3-25 23:28 作者: 迫擊炮 時(shí)間: 2025-3-26 03:59 作者: Gyrate 時(shí)間: 2025-3-26 06:12
Toward the Development of a General Semantic Repository for the Interoperability of Information Systand to be more open to their environment. Today, the IS is the pillar of all businesses enabling the interaction between them in a strategy “winner/winner”. To deal with these new requirements, the companies are often recourse to the concept of integration and in more specific way, to the concept of作者: 時(shí)代錯(cuò)誤 時(shí)間: 2025-3-26 11:59
Modeling Aircraft Landing Scheduling in Event Blex problems in this domain, Due to the huge increase of aircrafts number in the world..One of the main challenges to develop landing system is specifying it in the first place. In this paper, we focus on modeling aircrafts scheduling in the Traffic Management Advisor, our approach is based on deadl作者: labile 時(shí)間: 2025-3-26 13:45
Load Signatures Identification Based on Real Power Fluctuationsenerate energy awareness and improve efficiency of available energy resources usage. This paper proposes a solution based on Multilayer Perceptron and the change of real power to distinguish and identify appliances from the raw load signatures directly without features extraction. Our simulation ind作者: Indecisive 時(shí)間: 2025-3-26 17:55
A New Secure SIP Authentication Scheme Based on Elliptic Curve Cryptographyor establishing, maintaining and terminating sessions between different participants. Authentication is the most security service required for SIP. To provide secure communication, many authentication schemes for SIP have been proposed. In 2013 Farash et al. proposed an enhanced authenticated key ag作者: parasite 時(shí)間: 2025-3-26 23:29
An Adaptation of GRA Method for Network Selection in Vertical Handover Contextpt (Always Best Connected). We can count several wireless networks technologies, namely 3GPP (GPRS, UMTS,?...), Wi-Fi technologies, and WiMAX. In such heterogeneous environment, the mobile device must ensure a seamless vertical handover (VH), which means the switching of communication between differ作者: 真實(shí)的你 時(shí)間: 2025-3-27 03:03 作者: 向外供接觸 時(shí)間: 2025-3-27 07:33 作者: 音樂(lè)會(huì) 時(shí)間: 2025-3-27 10:50 作者: 案發(fā)地點(diǎn) 時(shí)間: 2025-3-27 17:38
Abdeljalil Elouardighi,Hafdalla Hammia,Mohcine Maghfourto synthesize arbitrary virtual views from color-plus-depth 3D data. In this work, a novel semi-blind watermarking scheme is proposed to protect DIBR 3D images. The watermarking system utilizes image descriptors as side information to compensate the distortion produced by DIBR operations. The compen作者: Diatribe 時(shí)間: 2025-3-27 21:28
Abdennour Jalil,Noureddine Aboutabit,Imad HafidiHowever, when applied to modified stego audio, the technique is not reversible. Here, a novel technique that is both reversible and robust is proposed for hiding data in audio. It is perfectly reversible for unmodified stego signals and is semi-reversible for perceptually coded stego signals. A robu作者: atopic 時(shí)間: 2025-3-28 01:06
Nabil Alami,Yassine El Adlouni,Noureddine En-nahnahi,Mohammed Meknassift frame can be reconstructed with high visual quality. Utilizing the similarity between two frames in a stereo image pair the required size of storage and transmission bandwidth for the stereo image pair can be reduced to 50?%. A residual error matrix with a dynamic range of [?255, 255] is obtained作者: 里程碑 時(shí)間: 2025-3-28 03:31 作者: institute 時(shí)間: 2025-3-28 08:47
Abdul Fattah Salman,Mahmood Majeed,Ahmed Alsahlawiength . in a binary sequence, and Eve wants to detect whether a secret message is present. The individual positions of all binary sequences are independently distributed, but have different levels of predictability. Using knowledge of this distribution, Alice randomizes over all possible size-. subs作者: Debrief 時(shí)間: 2025-3-28 11:53
Redouane Nejjahi,Noreddine Gherabi,Abderrahim Marzouk sharpening which aims to enhance the image edge contrast for a clear view is considered to be one of the most fundamental editing techniques. However, only a few works have been reported on the detection of image sharpening. From a perspective of texture analysis, the over-shoot artifact caused by 作者: 銀版照相 時(shí)間: 2025-3-28 17:47
Redouane Esbai,Mohammed Erramdani,Fouad Elotmani,Mohamed Atountiength . in a binary sequence, and Eve wants to detect whether a secret message is present. The individual positions of all binary sequences are independently distributed, but have different levels of predictability. Using knowledge of this distribution, Alice randomizes over all possible size-. subs作者: 中世紀(jì) 時(shí)間: 2025-3-28 19:26 作者: 可轉(zhuǎn)變 時(shí)間: 2025-3-29 00:20 作者: ethereal 時(shí)間: 2025-3-29 04:41
Meryem Fakhouri Amr,Khalifa Mansouri,Mohammed Qbadou,Bouchaib Riyamimy aus dem Markt ausscheiden. Ein wesentlicher Grund für dieses Scheitern liegt in einer erfolglosen Markenpolitik. Es ist diesen Anbietern nicht gelungen, ihr Gesch?ftsmodell in ein übergreifendes Markenkonzept zu integrieren, welches sich klar gegenüber den Wettbewerbern abgrenzt und positioniert 作者: 符合你規(guī)定 時(shí)間: 2025-3-29 07:35 作者: 侵略 時(shí)間: 2025-3-29 15:04 作者: 北極人 時(shí)間: 2025-3-29 15:37
Mouad Mansouri,Cherkaoui Leghristen ?von innen‘ heraus aus der Sicht der handelnden Menschen zu beschreiben“ (Flick/von Kardorff/Steinke 2000: 14). Subjektive Handlungsmuster k?nnen nicht losgel?st von generellen Aussagen über das Sozialverhalten in der Gesellschaft analysiert werden. Wissenschaftliche Aussagen, die mit qualitativ作者: Fermentation 時(shí)間: 2025-3-29 22:00 作者: Gesture 時(shí)間: 2025-3-30 02:55 作者: LUDE 時(shí)間: 2025-3-30 04:02
El Bouazzaoui Cherraqi,Abdelilah Maachdigt werden müssen, um maximal integrierte und digital transformierte Prozesse gestalten zu k?nnen. Zusammenfassend stellt Streicher zehn grundlegende Prinzipien der Transformation in der ?ffentlichen Verwaltun978-3-662-60937-8978-3-662-60938-5作者: avarice 時(shí)間: 2025-3-30 11:10 作者: NAVEN 時(shí)間: 2025-3-30 14:17
Lahcen Ouknine,Hanane Bais,Fouad Khiri,Mustapha Machkour,Abderrahmane Ibhi,Lahcen Koutti作者: heart-murmur 時(shí)間: 2025-3-30 18:57 作者: 別炫耀 時(shí)間: 2025-3-30 21:11
Abdeljalil Elouardighi,Hafdalla Hammia,Mohcine Maghfourntal results show that the proposed scheme is robust to against JPEG compression plus DIBR attack (i.e., DIBR operation performed on the JPEG compressed 3D images). Finally, the robustness of our work against HEVC (i.e., H.265) 3D compression plus DIBR is also investigated.作者: 付出 時(shí)間: 2025-3-31 02:43 作者: DOLT 時(shí)間: 2025-3-31 06:12 作者: 卷發(fā) 時(shí)間: 2025-3-31 10:46
Lamiae Alami,Imad Hafidi,Abdelmotalib MetranePEG2000 lossy compressed data into the right frame. Compared with the prior art, which uses a block-based disparity estimation algorithm and a location map based reversible data hiding, the proposed method has demonstrated that the stereo image can be reconstructed with higher visual quality and wit作者: MIRTH 時(shí)間: 2025-3-31 14:29 作者: 紳士 時(shí)間: 2025-3-31 18:51 作者: insular 時(shí)間: 2025-4-1 01:07
Redouane Esbai,Mohammed Erramdani,Fouad Elotmani,Mohamed Atountiher to consider all positions. We give defining formulas for each player’s best response strategy and minimax strategy; and we present additional structural constraints on the game’s equilibria. For the special case of length-two binary sequences, we compute explicit equilibria and provide numerical作者: Aggrandize 時(shí)間: 2025-4-1 02:25
Abdelhadi Daoui,Noreddine Gherabi,Abderrahim Marzoukant LBP was applied to the detected edge pixels of images for feature extraction. Then features extracted from sharpened and unsharpened images are fed into a support vector machine (SVM) classifier for classification. Experimental results on digital images with different coefficients for sharpening作者: 陰謀小團(tuán)體 時(shí)間: 2025-4-1 08:34
Jaouad Maqboul,Bouchaib Bounabatr. Experimental results demonstrate that our improved EAMR (I-EAMR) can efficiently defeat the targeted steganalyzer presented by Tan .. [.]. Furthermore, it can still preserve the statistics of the carrier image well enough to resist today’s blind steganalyzers.作者: Inordinate 時(shí)間: 2025-4-1 14:12