派博傳思國(guó)際中心

標(biāo)題: Titlebook: Advanced Computing and Systems for Security: Volume 13; Rituparna Chaki,Nabendu Chaki,Khalid Saeed Book 2022 The Editor(s) (if applicable) [打印本頁]

作者: mobility    時(shí)間: 2025-3-21 19:33
書目名稱Advanced Computing and Systems for Security: Volume 13影響因子(影響力)




書目名稱Advanced Computing and Systems for Security: Volume 13影響因子(影響力)學(xué)科排名




書目名稱Advanced Computing and Systems for Security: Volume 13網(wǎng)絡(luò)公開度




書目名稱Advanced Computing and Systems for Security: Volume 13網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Advanced Computing and Systems for Security: Volume 13被引頻次




書目名稱Advanced Computing and Systems for Security: Volume 13被引頻次學(xué)科排名




書目名稱Advanced Computing and Systems for Security: Volume 13年度引用




書目名稱Advanced Computing and Systems for Security: Volume 13年度引用學(xué)科排名




書目名稱Advanced Computing and Systems for Security: Volume 13讀者反饋




書目名稱Advanced Computing and Systems for Security: Volume 13讀者反饋學(xué)科排名





作者: 高深莫測(cè)    時(shí)間: 2025-3-21 21:08

作者: Inculcate    時(shí)間: 2025-3-22 03:20
Klinische Diagnostik und PCA-Screeningpecialized framework for algorithm testing was proposed. Tests have shown that satisfactory results can be obtained with iris-based human identity recognition with feature vector consisting of the most descriptive components of discrete fast Fourier transform.
作者: 摻和    時(shí)間: 2025-3-22 05:41
Klaus H?fner,Udo Jonas,Christian G. Stiefncy. A combined maximum degree neighbor heuristic-based local search strategy has been presented for improving computational efficiency. We have conducted our experiment on a real-life collaboration network under the independent cascade model. The experimental result shows better performance in term
作者: 鄙視    時(shí)間: 2025-3-22 11:23

作者: craving    時(shí)間: 2025-3-22 16:55

作者: accordance    時(shí)間: 2025-3-22 17:59

作者: Acupressure    時(shí)間: 2025-3-22 23:50
Deep Classification of Gun Carried by Moving Persons Using Proposed TUVD-CSA Datasetkeit bilden. Auch die Zerst?rung von Hoffnungen, Erfahrungen der Desillusionierung und Entt?uschung verbinden sich mit dem Gefühl der Traurigkeit. Anl?sse des Traurig-Seins k?nnen ebenfalls dort gegeben sein, wo jemand sich in seinen pers?nlichen und sozialen Entfaltungs- und Einflussm?glichkeiten blockiert sieht.
作者: 動(dòng)物    時(shí)間: 2025-3-23 02:08
A Deep Learning-Based Approach to Single/Mixed Script-Type Identificationen orientierten analytischen Wissenschaftstheorie entspricht. Die damit aufgeworfene Frage soll anhand der grunds?tzlichen Verfahrensweisen des Strukturalismus und der Systemtheorie sowie der damit verbundenen Ansprüche überprüft werden.
作者: 厚顏無恥    時(shí)間: 2025-3-23 07:25
Image Data Handling in a Multinode Environment Using MPIll eines Menschen überhaupt, der nur zuf?llig heute lebt, darum zwar begrenzt ist im Wissen auf die . des bisher Geschehenen, nicht aber begrenzt in der . des Wissens. Ich als Einzelner bin in diesem Wissen nicht ich selbst, sondern Bewu?tsein überhaupt, bin als Wissender getrennt von dem Objekt, das ich wei?.
作者: 金盤是高原    時(shí)間: 2025-3-23 11:07
Discrete Genetic Learning-Enabled PSO for Influence Maximizationand zu entkommen, einigen sich die Menschen auf Gesetze und etablieren zugleich eine staatliche Autorit?t. Sie schlie?en miteinander einen Gesellschaftsvertrag. Das Besondere an der Theorie von Hobbes ist, wie er moralisches Handeln und das Gelten moralischer Vorschriften aus dem Eigeninteresse jedes Einzelnen herleitet.
作者: apropos    時(shí)間: 2025-3-23 14:22

作者: SSRIS    時(shí)間: 2025-3-23 19:27
An Efficient Algorithm for Boundary Detection of Noisy or Distorted Eye Pupilt? anzurufen, wo es um die reale politische Aktion und den ?procedural approach? der verwalteten Welt geht, erscheint als geschichtlich überholt und veraltet — altv?terisches Relikt einer noch von idealistischer Metaphysik beeindruckten Vorzeit.
作者: 小卷發(fā)    時(shí)間: 2025-3-24 00:53

作者: grieve    時(shí)間: 2025-3-24 06:19
An Event-B based Device Description Model in IoT with the Support of Multimodal System978-3-476-00402-4
作者: POINT    時(shí)間: 2025-3-24 07:52

作者: Minuet    時(shí)間: 2025-3-24 12:48
Iris-Based Approach to Human Identity Recognition by Discrete Fast Fourier Transform Components978-3-663-14346-8
作者: 無禮回復(fù)    時(shí)間: 2025-3-24 15:49

作者: 袋鼠    時(shí)間: 2025-3-24 21:54
Shortest ,-paths Algorithm for Traffic Optimization978-3-030-35934-8
作者: Juvenile    時(shí)間: 2025-3-25 01:15
Advanced Computing and Systems for Security: Volume 13
作者: Monocle    時(shí)間: 2025-3-25 04:06

作者: BULLY    時(shí)間: 2025-3-25 10:48
Rituparna Chaki,Nabendu Chaki,Khalid SaeedDiscusses recent research trends in computational intelligence.Presents applications to design, analysis, and modeling – key areas in computational intelligence.Explores efficient computational algori
作者: 小教堂    時(shí)間: 2025-3-25 12:21
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/a/image/145395.jpg
作者: Lacunar-Stroke    時(shí)間: 2025-3-25 17:51

作者: Cpr951    時(shí)間: 2025-3-25 21:23
https://doi.org/10.1057/9781137272867s (such as MPICH and Open MPI) have been broadly used in the high-performance computing area to provide efficient data processing. This paper investigates whether MPI can be adapted to a batch processing task in the field of image processing which has the characteristic of input and output data in t
作者: Atmosphere    時(shí)間: 2025-3-26 00:55
https://doi.org/10.1057/9781137272867with some added advantages like heterogeneous integration, higher computation per volume, etc. These benefits are also exhibited in 3D SoCs (3D System on Chips) to use the already built cores. However, testing these large complex SoCs in lesser time has become a challenge. In this paper, we propose
作者: 表臉    時(shí)間: 2025-3-26 04:36

作者: 悠然    時(shí)間: 2025-3-26 12:30
J. J. de la Rosette,F. M. Debruyned. Firstly, the images are pre-processed for further tasks which are followed by the extraction of morphological and amplitude-based features. The best discriminatory features are chosen by applying several feature selection techniques which evaluate the merit of a feature by assessing the goodness
作者: 大方不好    時(shí)間: 2025-3-26 15:08
Klinische Diagnostik und PCA-Screeninguracy guaranteed by this measurable trait. In the literature, one can easily find diversified approaches and algorithms connected with this feature, however, neither of them uses discrete fast Fourier transform to describe iris sample. In this work, the authors used recently mentioned method to crea
作者: LAVA    時(shí)間: 2025-3-26 16:53
Klaus H?fner,Udo Jonas,Christian G. Stiefby them is maximized. In general, the performance of an influence maximization algorithm is measured in terms of solution accuracy and computational efficiency. Simulation-based greedy algorithms can achieve high solution accuracy but are inappropriate for large networks owing to their huge computat
作者: observatory    時(shí)間: 2025-3-26 23:33
Klinische Diagnostik und PCA-Screeningenge for computer vision. Very few works has been reported in the area of real-time detection of scene where persons carrying gun, although it has several implication in the area of security and surveillance. Using real-time gun detection to improve surveillance methods is a promising application of
作者: acrobat    時(shí)間: 2025-3-27 05:03
J. Lotz,O. Gonnermann,M. Galanskie to the OCR engine. Before script identification, script-type classification is necessary since nowadays the scene texts in natural images are not comprised of a single script but also multi-script words at character level are found very frequently in different places like posters, T-shirts graffit
作者: Evocative    時(shí)間: 2025-3-27 09:16

作者: CODA    時(shí)間: 2025-3-27 12:15
Philip C. Müller,Beat P. Müller-Stichcal conundrum. Our effort anticipated a neighbourhood-based mutation approach of the Genetic Algorithm to solve Sudoku instances. In this paper, the fixed two-point crossover along with neighbourhood-based mutation is implemented. For mutation, a neighbour checking concept is incorporated to get rid
作者: Parley    時(shí)間: 2025-3-27 16:11
Martina Scharitzer,Peter Pokieserest paths in a graph. The algorithm can be used to divide the traffic flow in a city by implementing a routing pipeline which takes into account a global view of the traffic network. We describe the heuristic extensions we implemented in the algorithm to optimize its run time, including computationa
作者: 案發(fā)地點(diǎn)    時(shí)間: 2025-3-27 19:43
,Ablative Verfahren – Robotics, used in the field of information hiding, steganographic methods based on the signal domain in which information is embedded, and the human sense of hearing along with an analysis of the possibility of using it to hide data. As a result, we propose the steganographic method based on the algorithm of
作者: 占卜者    時(shí)間: 2025-3-27 23:44
https://doi.org/10.1007/978-981-16-4287-6Security Systems; Signal Processing; Internet of Things; Computer Vision; Data Science; Model Checking; Se
作者: FRAUD    時(shí)間: 2025-3-28 04:30
978-981-16-4286-9The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
作者: 狂怒    時(shí)間: 2025-3-28 07:27

作者: 推遲    時(shí)間: 2025-3-28 12:43
https://doi.org/10.1057/9781137272867hmarks and the results when compared with a recent work showed that our proposed approach recorded better test lengths in more than . cases with an average reduction of . in test length. Our algorithms also used less number of TSVs in approximately . of the cases with an average reduction of . in number of TSVs, in comparable CPU time.
作者: Euthyroid    時(shí)間: 2025-3-28 15:56
J. Lotz,O. Gonnermann,M. Galanskis were performed with over 4 K images and The best precision of 98.30% was reached. This method was compared with a standard deep learning and handcrafted feature-based technique where the proposed technique produced a better result.
作者: Benign    時(shí)間: 2025-3-28 20:55

作者: RENIN    時(shí)間: 2025-3-28 23:19
Book 2022tation and Security Systems (ACSS 2021), held in Kolkata, India, on April 9–10, 2021. Organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology at the University of Calcutta, the symposium’s international partners were Ca‘ Foscari University
作者: GUMP    時(shí)間: 2025-3-29 05:37

作者: Anticoagulant    時(shí)間: 2025-3-29 09:40

作者: llibretto    時(shí)間: 2025-3-29 13:32
Book 2022of Venice, Italy, and Bialystok University of Technology, Poland. The topics covered include biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks, and security systems, reflecting the various symposium sessions.
作者: 粗俗人    時(shí)間: 2025-3-29 16:10
https://doi.org/10.1007/978-3-642-58464-0e pupil is not positioned perpendicularly to the camera eye. The algorithm success rate was 97.5% when considering only noisy and distorted images, whilst a result of 100% was achieved with unblurred and clear images.
作者: upstart    時(shí)間: 2025-3-29 22:12

作者: 割讓    時(shí)間: 2025-3-30 03:00
Endoluminale Antirefluxverfahrenal complexity, the proposed AMDE is incorporated into the TI scheme. The simulation results revealed that the suggested TI method attains significant improvement on the PAPR, Bit Error Rate (BER) throughput and computational efficiency.




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
电白县| 烟台市| 湖南省| 二连浩特市| 桃园市| 奉节县| 北安市| 睢宁县| 泗阳县| 洱源县| 内江市| 桃江县| 萨迦县| 息烽县| 会宁县| 道真| 西青区| 吴忠市| 盐亭县| 京山县| 周宁县| 大港区| 宝应县| 营山县| 吴忠市| 岳西县| 白银市| 舞钢市| 巨野县| 甘泉县| 平远县| 台南市| 公主岭市| 邵东县| 建湖县| 三门县| 吴桥县| 乌鲁木齐市| 渭源县| 雷山县| 明水县|