找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Data Science and Information Security; First International Hai Jin,Yi Pan,Jianfeng Lu Conference proceedings 2024 The Editor(s) (if applic

[復(fù)制鏈接]
查看: 41541|回復(fù): 62
樓主
發(fā)表于 2025-3-21 16:08:10 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Data Science and Information Security
副標(biāo)題First International
編輯Hai Jin,Yi Pan,Jianfeng Lu
視頻videohttp://file.papertrans.cn/264/263095/263095.mp4
叢書名稱Communications in Computer and Information Science
圖書封面Titlebook: Data Science and Information Security; First International  Hai Jin,Yi Pan,Jianfeng Lu Conference proceedings 2024 The Editor(s) (if applic
描述.This 3-volume set, CCIS 2058-2060 constitutes the First International Conference, on Artificial Intelligence, IAIC 2023, held in Nanjing, China, in November 2023.. The 85 full papers presented were carefully reviewed and selected from 428 submissions.?The papers are clustered in parts on: Artificial Intelligence and Machine Learning; Data Security and information Security; Computer Networks and IoT. The papers present recent research and developments in artificial intelligence and its applications in machine learning, natural language processing, computer vision, robotics, and ethical considerations..
出版日期Conference proceedings 2024
關(guān)鍵詞artificial intelligence; classification and prediction; clustering tasks; data mining; machine learning;
版次1
doihttps://doi.org/10.1007/978-981-97-1280-9
isbn_softcover978-981-97-1279-3
isbn_ebook978-981-97-1280-9Series ISSN 1865-0929 Series E-ISSN 1865-0937
issn_series 1865-0929
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
The information of publication is updating

書目名稱Data Science and Information Security影響因子(影響力)




書目名稱Data Science and Information Security影響因子(影響力)學(xué)科排名




書目名稱Data Science and Information Security網(wǎng)絡(luò)公開度




書目名稱Data Science and Information Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Data Science and Information Security被引頻次




書目名稱Data Science and Information Security被引頻次學(xué)科排名




書目名稱Data Science and Information Security年度引用




書目名稱Data Science and Information Security年度引用學(xué)科排名




書目名稱Data Science and Information Security讀者反饋




書目名稱Data Science and Information Security讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 23:51:28 | 只看該作者
,Research on?PCB Defect Detection Using 2D and?3D Segmentation,nized by 2D machine vision. This paper investigates PCB component defect detection using a combination of 2D and 3D techniques. We propose some image enhancement and contour extraction methods, and employ Contrast Limited Adaptive Histogram Equalization (CLAHE) to correct the color differences cause
板凳
發(fā)表于 2025-3-22 03:59:06 | 只看該作者
地板
發(fā)表于 2025-3-22 04:57:04 | 只看該作者
5#
發(fā)表于 2025-3-22 11:38:55 | 只看該作者
6#
發(fā)表于 2025-3-22 15:49:37 | 只看該作者
,An Erase Code Based Collaborative Storage Method in?RFID Systems,storage technology based on network coding can divide the transmitted data into blocks and store them redundantly on multiple RFID tags. This paper designs an erase-code-based cooperative storage scheme for important information in a large-scale RFID system. Moreover, the optimization of scheme para
7#
發(fā)表于 2025-3-22 19:43:55 | 只看該作者
8#
發(fā)表于 2025-3-22 21:58:45 | 只看該作者
A Memoryless Information Sharing RFID Tag Anti-Collision Protocol, systems. They often rely on time division multiplexing to avoid tag collisions, resulting in low system efficiency. This article introduces a memoryless information-sharing tag anti-collision protocol. The protocol exploits the multi-channel attributes of a passive cellular IoT system, utilizing re
9#
發(fā)表于 2025-3-23 02:17:05 | 只看該作者
10#
發(fā)表于 2025-3-23 08:46:48 | 只看該作者
Blockchain-Enhanced Device to Device Network Identity Verification Based on Zero Knowledge Proof,. Identity authentication also needs to protect the privacy of users. Therefore, this paper proposes a D2D network identity authentication method based on blockchain and zero knowledge proof, which realizes automatic authentication of devices in the network through blockchain-based smart contracts,
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-15 00:47
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
甘泉县| 宜兴市| 蒲江县| 河源市| 南部县| 理塘县| 宁德市| 阳原县| 康定县| 马山县| 隆回县| 景洪市| 新和县| 阿克陶县| 丰原市| 西乌珠穆沁旗| 弥勒县| 南江县| 沙洋县| 营山县| 锡林浩特市| 宕昌县| 项城市| 泰顺县| 寿宁县| 佛山市| 手游| 黄石市| 包头市| 江津市| 肃南| 莲花县| 江孜县| 睢宁县| 哈巴河县| 乐亭县| 扎赉特旗| 东宁县| 邵东县| 禹城市| 驻马店市|