標題: Titlebook: Mathematics and Computing; Third International Debasis Giri,Ram N. Mohapatra,Mohammad S. Obaidat Conference proceedings 2017 Springer Natu [打印本頁] 作者: onychomycosis 時間: 2025-3-21 19:09
書目名稱Mathematics and Computing影響因子(影響力)
書目名稱Mathematics and Computing影響因子(影響力)學科排名
書目名稱Mathematics and Computing網(wǎng)絡公開度
書目名稱Mathematics and Computing網(wǎng)絡公開度學科排名
書目名稱Mathematics and Computing被引頻次
書目名稱Mathematics and Computing被引頻次學科排名
書目名稱Mathematics and Computing年度引用
書目名稱Mathematics and Computing年度引用學科排名
書目名稱Mathematics and Computing讀者反饋
書目名稱Mathematics and Computing讀者反饋學科排名
作者: HEPA-filter 時間: 2025-3-21 21:42
Accommodative FAS-FMG Multilevel Based Meshfree Augmented RBF-FD Method for Navier-Stokes Equations is based on accommodative FAS-FMG multigrid method. The axi-symmetric spherical polar Navier-Stokes equations are solved without using transformation. The non-linear convective terms are handled efficiently by considering upwind type of RBF nodes. The developed scheme saves around 34. of the CPU time than the usual RBF-FD method.作者: 逃避現(xiàn)實 時間: 2025-3-22 02:38
Finiteness of Criss-Cross Method in Complementarity Problems. We present a numerical illustration to show a comparison between criss-cross method and Lemke’s algorithm with respect to number of iterations before finding a solution. Finally we raise an open problem in the context of criss-cross method.作者: watertight, 時間: 2025-3-22 05:19
1865-0929 nd selected from 129 submissions. They were organized in topical sections named: security and privacy; computing; applied mathematics; and pure mathematics.?.978-981-10-4641-4978-981-10-4642-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 孤獨無助 時間: 2025-3-22 10:00 作者: Indecisive 時間: 2025-3-22 16:12
Conference proceedings 2017 2017.?. The 35 papers presented in this volume were carefully reviewed and selected from 129 submissions. They were organized in topical sections named: security and privacy; computing; applied mathematics; and pure mathematics.?.作者: Influx 時間: 2025-3-22 20:11
On the Security of a Searchable Anonymous Attribute Based Encryption weakness and does not ensure anonymity feature, which is the?main claim of the scheme. We then present an improved scheme for mitigating the weaknesses of the scheme. The improved scheme retains the security claims of the original scheme [.] without adding any computation and communication overhead.作者: 一個姐姐 時間: 2025-3-22 23:00
A Deep Learning Based Artificial Neural Network Approach for Intrusion Detectionk as a classifier for the different types of intrusion attacks. A comparative study has also been carried out with Support Vector Machine (SVM). The experimental results show that the accuracy of intrusion detection using Deep Neural Network is satisfactory.作者: 支架 時間: 2025-3-23 03:43 作者: 有危險 時間: 2025-3-23 07:00 作者: 嘲弄 時間: 2025-3-23 10:26
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesisdiffusion properties can be increased with the increase of the size of neighborhood radius of the CA cell. In this work, we study a class of 5-neighborhood null boundary linear CA. We present an algorithm for synthesizing 5-neighborhood linear CA from its characteristic polynomial by assuming that some of the CA sub-polynomials are available.作者: 黃油沒有 時間: 2025-3-23 14:43 作者: Meditative 時間: 2025-3-23 18:24 作者: grovel 時間: 2025-3-24 00:39
Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme which is indexed by important or related keyword(s) available in the data. Once the data is stored, the client supplies some keywords to the cloud server and requests the corresponding data. If the data is stored in plaintext form, data privacy will be violated. Thus the client encrypts the data al作者: Offset 時間: 2025-3-24 03:02
On the Security of a Searchable Anonymous Attribute Based Encryptioniated with secret key and the access policy connected with ciphertext matches. Although CP-ABE provides both confidentiality and fine-grained access control to the data stored in public cloud, anonymous CP-ABE adds interesting feature of sender and/or receiver anonymity. In this paper, we discuss a 作者: 描述 時間: 2025-3-24 07:03
Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”n scheme to access remote server over insecure channels. They also claimed that their scheme is able to resist various attacks. However, in this paper we demonstrate that Kumar et al. scheme is still vulnerable to various malicious attacks and is aslo unable to provide several essential security pro作者: 輕而薄 時間: 2025-3-24 13:31
Design of Secure and Efficient Electronic Payment System for Mobile Usersfacilitate users, hand held devices such as a mobile phone application for the payment method should be accepted for practical implementation. Recently, Yang et?al. proposed an electronic payment protocol using payment gateway and claims that this scheme is suitable for cloud computing, where paymen作者: forbid 時間: 2025-3-24 16:29
A Deep Learning Based Artificial Neural Network Approach for Intrusion Detectiont may reduce the utility of any network or systems. Constantly changing and the complicated nature of intrusion activities on computer networks cannot be dealt with IDSs that are currently operational. Identifying and preventing such attacks is one of the most challenging tasks. Deep Learning is one作者: 連接 時間: 2025-3-24 22:29
A Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic Attacksriable Boolean function against fast algebraic attacks, one may need to compute the ranks of a series of matrices of size . over binary field . for each positive integer . less than . and corresponding .. In this paper, for an .-variable balanced Boolean function, exploiting the combinatorial proper作者: 單挑 時間: 2025-3-25 00:58
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesis error-correcting codes, test pattern generation, cryptography etc. Most of these applications use 3-neighborhood one dimensional CA. Cellular automata have been chosen as a better crypto-primitives for providing very good pseudorandom sequences and their high diffusion property. The randomness and 作者: Offensive 時間: 2025-3-25 04:00 作者: ciliary-body 時間: 2025-3-25 09:25
Connected Fair Domination in Graphs set . such that . is connected in . and all vertices not in . are dominated by the same number of vertices from ., i.e., every two vertices not in . has the same number of neighbours in .. The connected fair domination number of . (.) is the minimum cardinality of a .-set in .. Apart from finding .作者: FLORA 時間: 2025-3-25 13:19 作者: anticipate 時間: 2025-3-25 19:45 作者: PHAG 時間: 2025-3-25 22:40 作者: Ptosis 時間: 2025-3-26 00:22
Accommodative FAS-FMG Multilevel Based Meshfree Augmented RBF-FD Method for Navier-Stokes Equations basis function (RBF-FD) method has been developed for steady incompressible Navier-Stokes equations in spherical geometry with unbounded domain which is based on accommodative FAS-FMG multigrid method. The axi-symmetric spherical polar Navier-Stokes equations are solved without using transformation作者: RLS898 時間: 2025-3-26 05:25 作者: 樂器演奏者 時間: 2025-3-26 10:43 作者: CRATE 時間: 2025-3-26 12:48
Imprecise Constrained Covering Solid Travelling Salesman Problem with Credibilitying Salesman Problem (CSP), in fuzzy environment. A salesman begins from an initial node, visits a subset of nodes exactly once using any one of appropriate vehicles available at each step, so that unvisited nodes are within a predetermined distance from the visited nodes, and returns to the initial作者: deceive 時間: 2025-3-26 20:49
Design of a Certificateless Designated Server Based Searchable Public Key Encryption Schemeertext to the client provided that the trapdoor is verified. Hence, the client gets the data from the ciphertext. However, an adversary will not get any information on the data or the keywords. A certificateless dPEKS (CL-dPEKS) scheme is proposed in this paper. It provides indistinguishability to t作者: 音樂會 時間: 2025-3-26 23:54
Cache Optimized Solution for Sparse Linear System over Large Order Finite Fieldse of the cache, decreases the number of memory accesses and therefore reduces the time taken for the algorithms to provide a solution. The results show an improvement of 16% in Lanczos and 13% in Wiedemann in the execution time, with number of equations as 105 and same numbers of variables over the作者: charisma 時間: 2025-3-27 01:07
Coordinating Particle Swarm Optimization, Ant Colony Optimization and K-Opt Algorithm for Traveling observed that algorithm is more efficient with respect to accuracy as well as execution time to solve standard TSPs (Symmetric as well as Asymmetric) compared to existing algorithms. Details of the proposed algorithm along with swap operation, swap sequence and K-opt operation for the algorithm are 作者: EXUDE 時間: 2025-3-27 08:06
Imprecise Constrained Covering Solid Travelling Salesman Problem with Credibility Problem (USCP) using Random Insertion-Deletion (RID). These reduced Constrained Solid Travelling Salesman Problems (CSTSPs) are solved by an Improved Genetic Algorithm (IGA), which consists of probabilistic selection, order crossover, proposed generation dependent inverse mutation. A random mutatio作者: 我還要背著他 時間: 2025-3-27 10:45
SK Hafizul Islam,Mohammad S. Obaidat,Varun Rajeev,Ruhul Amin作者: Affirm 時間: 2025-3-27 15:20 作者: 心胸開闊 時間: 2025-3-27 18:38
Sanjiban Sekhar Roy,Abhinav Mallik,Rishab Gulati,Mohammad S. Obaidat,P. V. Krishna作者: 敲詐 時間: 2025-3-27 23:53
Anupam Mukherjee,Samir Maity,Goutam Panigrahi,Manoranjan Maiti作者: Neutropenia 時間: 2025-3-28 05:47 作者: anthropologist 時間: 2025-3-28 07:10 作者: 補充 時間: 2025-3-28 13:00 作者: 壁畫 時間: 2025-3-28 16:31 作者: 松馳 時間: 2025-3-28 18:53
Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”n scheme to access remote server over insecure channels. They also claimed that their scheme is able to resist various attacks. However, in this paper we demonstrate that Kumar et al. scheme is still vulnerable to various malicious attacks and is aslo unable to provide several essential security properties.作者: 秘方藥 時間: 2025-3-29 02:04 作者: 啞巴 時間: 2025-3-29 06:32
Conference proceedings 2017 2017.?. The 35 papers presented in this volume were carefully reviewed and selected from 129 submissions. They were organized in topical sections named: security and privacy; computing; applied mathematics; and pure mathematics.?.作者: MAIM 時間: 2025-3-29 10:40
https://doi.org/10.1007/978-981-10-4642-1security and privacy; computing; encryption; symmetric cryptography; image encryption作者: 多產(chǎn)子 時間: 2025-3-29 11:32
Three Modes of Human Aggression, Plus Pure Evil,. Three distinct modes can be identified for human conspecific killing. The first and most common type are crimes of passion, of drunkenness—or of what is called diminished capacity. The second and third types of killings are purposive—with those purposes being either selfish (as in the case of arme作者: 公社 時間: 2025-3-29 17:57
Immune Dysfunction in Autism Spectrum Disordersmately 1% of children and is a major public health issue. Despite decades of research, little is known about factors that contribute to the pathogenesis of the disorder, although both genetic and environmental factors have been implicated. A number of published findings have identified numerous immu作者: venous-leak 時間: 2025-3-29 21:17 作者: 用不完 時間: 2025-3-30 00:19
Egg-Laying Behaviour of , (Olivier) on the Essential Oils of ,sed on the information about their uses in traditional medicine. The genus . contains essential oils, coumarins and alkaloids. The principal constituent of essential oil, ‘linalyl acetate’ is used in manufacture of cosmetics, perfumery and flavouring. Egg-laying behaviour/antifeedant activity of . (作者: 感激小女 時間: 2025-3-30 05:19
2364-6934 ions, data, methods for thermodynamic and thermophysical pro.?This book accommodates the existing correlations, data, and methods for thermodynamic and thermophysical properties of saline water, including multiple components at a wide range of salinity (reaching around 200 g/kg), temperature, and pr作者: 擴大 時間: 2025-3-30 09:04
Mostly Sound Type System Improves a Foundational Program Verifierroof much more efficient. We structure the system so that symbolic execution—even tactical (nonreflective) symbolic execution—can keep the type context and typechecking always in reified form, to avoid expensive re-reification.作者: Tailor 時間: 2025-3-30 15:02 作者: BLUSH 時間: 2025-3-30 17:47
https://doi.org/10.1007/978-3-540-79970-2al signaling mechanisms involved in the process of viral host invasion and also give an overview of the SARS CoV2 viral strains. Better recognition of the viral characteristics will help the readers to improve their understanding of the etiological, pathogenetic, and clinical aspects of the CoViD19 作者: RODE 時間: 2025-3-31 00:06
Shefah Qazipursued for achieving the long-term goal. A major area of dispute is the extent of centralized control and “market management” that is needed to assure system reliability and that is desirable from a social efficiency perspective. There is general agreement that the physical characteristics of elect作者: Judicious 時間: 2025-3-31 04:29 作者: 新鮮 時間: 2025-3-31 05:51
Béla Flerkóts to keep their herds. Still, the majority of pastoralist households in Kenya, Ethiopia, Somalia, and Tanzania remain committed to raising livestock, even as they adapt to farming or urban residence. Pastoral 978-1-4419-3462-8978-0-306-48595-4Series ISSN 1574-0501 作者: 雪上輕舟飛過 時間: 2025-3-31 09:52
,Models and Simulations of GDP per Inhabitant Across Europe’s Regions: A Preliminary View,rs and to describe some recent economic growth trends. Some attention is also given to convergence, which might be explained by neoclassical growth theory and a process of diminishing returns (see Barro and Sala-i-Martin 1991), but which might also be observed for regions in the sway of some other c作者: sorbitol 時間: 2025-3-31 14:58 作者: Constitution 時間: 2025-3-31 18:51