找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Intelligent Systems and Applications - Volume 2; Proceedings of the I Jeng-Shyang Pan,Ching-Nung Yang,Chia-Chen Lin Conference

[復(fù)制鏈接]
樓主: Osteopenia
11#
發(fā)表于 2025-3-23 12:23:53 | 只看該作者
12#
發(fā)表于 2025-3-23 15:20:52 | 只看該作者
Performance Evaluation on Permission-Based Detection for Android Malware,ty of detecting malicious applications in Android operating system based on permissions. Compare against previous researches, we collect a relative large number of benign and malicious applications (124,769 and 480, respectively) and conduct experiments based on the collected samples. In addition to
13#
發(fā)表于 2025-3-23 21:50:30 | 只看該作者
14#
發(fā)表于 2025-3-23 23:24:12 | 只看該作者
Digital Watermarking Based on JND Model and QR Code Features, parts. First, Using JND Model to find the JND map of images and using Sobel operation to find contour of images. Second, find the area there QR Code will embed by scanning the JND map and contour of images with the mask. Finally, in order to hide QR Codes in Images, we adjust the pixel value in the
15#
發(fā)表于 2025-3-24 04:40:28 | 只看該作者
Multi-dimensional and Multi-level Histogram-Shifting-Imitated Reversible Data Hiding Scheme,limited to a fixed range, the visual quality of the stego-image is very good and is independent of the volume of the embedded data. In this paper, we have proposed an extra information-free multi-dimensional multi-layer data embedding scheme, which improves two aspects of Wang et al.’s scheme. First
16#
發(fā)表于 2025-3-24 10:35:29 | 只看該作者
17#
發(fā)表于 2025-3-24 14:04:17 | 只看該作者
Theoretical Analysis and Realistic Implementation of Secure Servers Switching System,ons with endless streams of security mechanisms should be employed attentively to reduce the loss of data due to successful intrusion attacks on any system. This paper focus on the implementation of an embedded system technology developed in a host control module group in which the entire server ach
18#
發(fā)表于 2025-3-24 16:21:14 | 只看該作者
Design and Implementation of a Self-growth Security Baseline Database for Automatic Security Auditiseline database a crucial research domain. In this paper, we proposed a security baseline database to assist information security auditors to maintain the security update patch baseline automatically with the help of the Microsoft knowledge base and automatic audit process. A practical implementatio
19#
發(fā)表于 2025-3-24 19:04:41 | 只看該作者
Conference proceedings 2013ea are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Syste
20#
發(fā)表于 2025-3-25 01:59:58 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-11 06:39
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
宜黄县| 获嘉县| 木兰县| 新兴县| 崇义县| 贵州省| 水富县| 铜梁县| 长治县| 宁德市| 上犹县| 新闻| 剑河县| 常宁市| 沙洋县| 揭东县| 龙岩市| 育儿| 宁明县| 枞阳县| 奇台县| 屏边| 泸州市| 缙云县| 屏东市| 洛宁县| 抚松县| 平果县| 万荣县| 通山县| 肥西县| 额济纳旗| 寿宁县| 宣武区| 左云县| 安阳市| 平南县| 博白县| 天峨县| 武鸣县| 扶沟县|