派博傳思國(guó)際中心

標(biāo)題: Titlebook: Informatics Engineering and Information Science; International Confer Azizah Abd Manaf,Akram Zeki,Eyas El-Qawasmeh Conference proceedings 2 [打印本頁(yè)]

作者: HIV763    時(shí)間: 2025-3-21 18:05
書目名稱Informatics Engineering and Information Science影響因子(影響力)




書目名稱Informatics Engineering and Information Science影響因子(影響力)學(xué)科排名




書目名稱Informatics Engineering and Information Science網(wǎng)絡(luò)公開度




書目名稱Informatics Engineering and Information Science網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Informatics Engineering and Information Science被引頻次




書目名稱Informatics Engineering and Information Science被引頻次學(xué)科排名




書目名稱Informatics Engineering and Information Science年度引用




書目名稱Informatics Engineering and Information Science年度引用學(xué)科排名




書目名稱Informatics Engineering and Information Science讀者反饋




書目名稱Informatics Engineering and Information Science讀者反饋學(xué)科排名





作者: 膽小鬼    時(shí)間: 2025-3-21 20:35

作者: 讓步    時(shí)間: 2025-3-22 01:20

作者: miracle    時(shí)間: 2025-3-22 08:09
Fauziah Redzuan,Anitawati Mohd. Lokman,Zulaiha Ali Othman,Salha Abdullahs, this does not mean they are necessarily politically apathetic. Instead, they are reasonably interested in politics and political issues but show this differently. What appears to be a withdrawal of the youth from politics is a withdrawal from traditional politics. Using the popular commercial rad
作者: SUE    時(shí)間: 2025-3-22 11:11
Nur Zuraifah Syazrah Othman,Mohd Shafry Mohd Rahim,Masitah Ghazalius contest for the youth vote among political parties. Through an analysis of youth programmes on three radio stations which predominantly target youth—ZiFM stereo, Star FM and Power FM, the chapter examines how youth programming is characterised by deliberate dumbing down of content due to the comm
作者: dominant    時(shí)間: 2025-3-22 14:07
Zoltán Balogh,Milan Tur?ánial differential systems, and more generally, in terms of non- linear systems. Thus, RNNs have to their disposal, a huge set of mathematical tools relating to dynamical system theory which has tumed out to be very useful in enabling a rigorous analysis of RNNs.978-1-4757-3821-6978-1-4757-3819-3Series ISSN 1568-1696
作者: Forsake    時(shí)間: 2025-3-22 20:31

作者: 無(wú)聊的人    時(shí)間: 2025-3-22 23:50

作者: Colonnade    時(shí)間: 2025-3-23 02:09

作者: Cultivate    時(shí)間: 2025-3-23 08:43

作者: Inoperable    時(shí)間: 2025-3-24 01:51
A Flexible Speech Recognition System for Cerebral Palsy Disabledgering, zero crossing rate (ZCR) for the endpoint detection, Mel-Frequency Cepstral Coefficients (MFCC) for the feature extraction, and dynamic time warping (DTW) for the pattern classification. In other words, this flexible system is based on the speech training of CP disabled and then recognizing
作者: Cytokines    時(shí)間: 2025-3-24 05:31

作者: 身心疲憊    時(shí)間: 2025-3-24 08:20
Kansei Design Model for Engagement in Online Learning: A Proposed Modelplained the main design elements in interface, content and interaction design dimensions. Discussions on user experience, emotion and engagement in learning, a brief explanation about Kansei Engineering technique and some conclusion about the research are also presented.
作者: chapel    時(shí)間: 2025-3-24 11:02
Azizah Abd Manaf,Akram Zeki,Eyas El-QawasmehFast-track conference proceedings.State-of-the-art research.Up-to-date results
作者: 嬰兒    時(shí)間: 2025-3-24 16:28
Communications in Computer and Information Sciencehttp://image.papertrans.cn/i/image/464845.jpg
作者: 反叛者    時(shí)間: 2025-3-24 21:03
978-3-642-25326-3Springer-Verlag GmbH Berlin Heidelberg 2011
作者: limber    時(shí)間: 2025-3-25 01:44
Informatics Engineering and Information Science978-3-642-25327-0Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 粗糙濫制    時(shí)間: 2025-3-25 06:04
https://doi.org/10.1007/978-3-642-25327-0Web services; approximation algorithms; data mining; fuzzy expert system; social networks; algorithm anal
作者: 適宜    時(shí)間: 2025-3-25 08:41

作者: 迫擊炮    時(shí)間: 2025-3-25 14:01

作者: BRUNT    時(shí)間: 2025-3-25 19:01

作者: narcissism    時(shí)間: 2025-3-25 21:19
New ID-Based Proxy Multi-signature from Pairingsin verification phase, the new scheme is more efficient in computational and timing sense than other available schemes. Moreover, the proposed scheme fulfills all the security requirements of a safe proxy signature.
作者: 咯咯笑    時(shí)間: 2025-3-26 00:17
Knowledge Mobilization for e-Living: Horizontal and Vertical Networks for Development learning capacities and, potentially, sustained the communities that host them. The creation of internet-based networks has, furthermore, enabled knowledge to be mobilized between schools and their communities, thereby promoting new e-living possibilities.
作者: 迫擊炮    時(shí)間: 2025-3-26 06:45
Enhanced Authentication on Targeted Online Surveys: A Case of Online Course Evaluation Systementicity/validity, and respondent’s anonymity are among the issues that hinder the proliferation of online surveys..This paper addresses the aforementioned challenges and fills the left gap by improving previous works and later presents an online survey system which behaves well. The system considers also the problem of identity theft.
作者: 清唱?jiǎng)?nbsp;   時(shí)間: 2025-3-26 10:03
Possibilities of Modelling Web-Based Education Using IF-THEN Rules and Fuzzy Petri Nets in LMSn of fuzzy logic into Petri nets there arises a strong tool for modelling teaching processes, mainly thanks to the easy understandability and sophisticated mathematical setup, supporting a rather simple design of educational activities managed by LMS, for the compendious modularity of solution and robustness of the design.
作者: 肥料    時(shí)間: 2025-3-26 14:46
Morphed Virus Family Classification Based on Opcodes Statistical Feature Using Decision Treey malware. In this research, we introduce and examine an opcodes statistical-based classifier using decision tree. This method is very simple in implementation. Our experimental outcome shows that different malware family executable files are classifiable using their opcodes statistical feature, with a high degree of reliability.
作者: ornithology    時(shí)間: 2025-3-26 20:35
On the Affine Ciphers in CryptographyAs soon as a commonly used monoalphabetic substitution cipher was broken, the word spread and that particular cryptosystem was useless. The affine cipher is simply a special case of the more general monoalphabetic substitution cipher. In this paper, we study the affine cipher and generalized affine cipher.
作者: forbid    時(shí)間: 2025-3-26 22:10
Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protoogic (DTPL), and provide authentication tests at a higher level of abstraction. These tests can be easily applied on a variety of authentication protocols, yet they are rigorous enough to capture full capabilities of a typical Dolev-Yao intruder.
作者: 槍支    時(shí)間: 2025-3-27 04:22
Conference proceedings 2011ion Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011. The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information secu
作者: 條街道往前推    時(shí)間: 2025-3-27 08:38

作者: fibula    時(shí)間: 2025-3-27 10:32
Development of Code-Theoretic Scheme on Generalized Cascade Codesof which is based on using algebraic block codes (code-theoretic schemes) are considered. Resistance of cascade code-theoretic schemes to hacking by an opponent with the help of the method of permutable decoding is researched.
作者: endocardium    時(shí)間: 2025-3-27 15:11

作者: 歹徒    時(shí)間: 2025-3-27 18:17
A Secure Protocol for Ultralightweight Radio Frequency Identification (RFID) Tags research, that protocol was enhanced and a new Ultralightweight RFID authentication protocol with mutual authentication was proposed, while keeping the computation cost low. The proposed protocol requires only simple bit-wise operations and can resist various attacks which the previous one could not.
作者: 一美元    時(shí)間: 2025-3-28 00:29

作者: Cytology    時(shí)間: 2025-3-28 04:04

作者: GRAIN    時(shí)間: 2025-3-28 06:16

作者: myopia    時(shí)間: 2025-3-28 10:25
1865-0929 reed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011. The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous s
作者: hieroglyphic    時(shí)間: 2025-3-28 15:50
Knowledge Mobilization for e-Living: Horizontal and Vertical Networks for Developmentd learning opportunities, particularly for students and their families who live in rural communities. The application of internet-based technologies has enabled networks to be established for the development of small schools located beyond major centres of population in ways that have expanded their
作者: FACET    時(shí)間: 2025-3-28 22:02
Towards Using Social Networks and Internet-Enabled Mobile Devices for Learning: Students’ Preparednements that need to be met before higher learning institutions can embrace these two technologies for learning. To achieve this we conducted a survey in higher learning institutions in Tanzania. We looked at students’ possession of Internet-enabled mobile devices, affordability of the Internet, level
作者: BLAND    時(shí)間: 2025-3-29 02:35

作者: 存心    時(shí)間: 2025-3-29 06:31
E-mature – Report of an Electronic Mathematics Examber of institutions is changing traditional methods for the ‘e’ ones. It also affects the educational field. The beginnings were mainly about the external teaching. For a few years now extensive research, regarding the e-exams has been done [6],[7],[8], that is the system which enables checking pupi
作者: Lacerate    時(shí)間: 2025-3-29 10:02

作者: PANEL    時(shí)間: 2025-3-29 13:06
Online ICT-Courses Integrated for the Hearing-Impaired Individuals’ Education: A Preliminary Study fr online-learning makes the Web an essential technology; hence the accessibility issues in Web applications are vital, this includes the Hearing-Impaired Individuals. The objective of this research is to investigate the Hearing-Impaired Individuals’ level of interests in the various ICT courses, hen
作者: 馬籠頭    時(shí)間: 2025-3-29 17:24

作者: 突變    時(shí)間: 2025-3-29 21:15
Integrating Perception into ,???,: 3D Tawaf Training Simulation Applicationes. However, the recent growing integration of perception research into computer graphics offers a more economical solution. Psychophysical experiments are now conducted to find out areas that can be manipulated to transform complex computations to “computation cuts”. This perception based approach
作者: cajole    時(shí)間: 2025-3-30 03:20
Possibilities of Modelling Web-Based Education Using IF-THEN Rules and Fuzzy Petri Nets in LMSs of instruction, manage the instruction, communicate with students, motivate them to study, observe their progress and evaluate them. The article deals with an opportunity to implement fuzzy logic into web-based education using the created IF-THEN rules and modelling in Petri nets. By an applicatio
作者: BROW    時(shí)間: 2025-3-30 07:58

作者: INERT    時(shí)間: 2025-3-30 10:37
Morphed Virus Family Classification Based on Opcodes Statistical Feature Using Decision Treea virus. These variants belong to a family and have common behavioral and some statistical characteristics. However, these variants are not detectable via a single common string signature. Some statistical analyses have been tested in recent years to fight against these types of multi-variants famil
作者: 癡呆    時(shí)間: 2025-3-30 13:40

作者: Radiation    時(shí)間: 2025-3-30 18:20
Generalization of Weger’s Attackacks of Wiener and Boneh-Durfee. In this paper, we extend the Weger’s bound of the Boneh-Durfee attack for the RSA modulus .?=?., when . being close to . with small integers . and .. We improve the bound of de Weger for the weaker and stronger results of Boneh-Durfee attack.
作者: 颶風(fēng)    時(shí)間: 2025-3-30 23:46

作者: 無(wú)效    時(shí)間: 2025-3-31 00:52
Data Leakage Tracking – Non-Repudiation of Forwardingized receiver of a protected copy is proposed in this paper. Existing security concepts are extended by a new security service based on reliable tracking data embedding. Additionally, a new mechanism to protect the new tracking data is shown. Digital watermarking techniques are used to provide track
作者: CYN    時(shí)間: 2025-3-31 06:54

作者: Bother    時(shí)間: 2025-3-31 10:42

作者: 溫順    時(shí)間: 2025-3-31 14:49
A Secure Protocol for Ultralightweight Radio Frequency Identification (RFID) Tagsn its security objectives, being vulnerable to several important attacks such as traceability, full disclosure, cloning and desynchronization. In this research, that protocol was enhanced and a new Ultralightweight RFID authentication protocol with mutual authentication was proposed, while keeping t
作者: Presbyopia    時(shí)間: 2025-3-31 21:12

作者: Tractable    時(shí)間: 2025-4-1 00:09

作者: 民間傳說(shuō)    時(shí)間: 2025-4-1 04:14
Rozniza Zaharudin,Norazah Nordin,Mohd Hanafi Mohd Yasination that demands more stringent response in terms of delay, jitters, bandwidth and etc. It is well accepted that, the deployment of QoS-aware technologies is a key factor for the continued success of the Internet. In this paper, we propose a Fair Intelligent Congestion Control Resource Discovery (
作者: Dorsal    時(shí)間: 2025-4-1 06:45

作者: cancellous-bone    時(shí)間: 2025-4-1 14:08

作者: 不理會(huì)    時(shí)間: 2025-4-1 16:30

作者: EWER    時(shí)間: 2025-4-1 19:58
Robiah Yusof,Siti Rahayu Selamat,Shahrin Sahib,Mohd Zaki Mas’ud,Mohd Faizal Abdollahexplored the ability of a network of highly interconnected “neurons” to have useful collective computational properties, such as content addressable memory. However, the model is based on McCulloch-Pitts neurons that are different from real biological neurons and also from the realistic functioning
作者: 完成    時(shí)間: 2025-4-2 02:44
Babak Bashari Rad,Maslin Masrom,Suhaimi Ibrahim,Subariah Ibrahimgrowth models, outlined in Chaps. 2 and 3. Indeed, a prediction of several Endogenous Growth models, such as the ‘Technological Diffusion-Gap’ model, is that economies do not converge towards a common equilibrium. ‘New Economic Geography’ implies a polarisation of regions into different ‘clusters’,
作者: 奇怪    時(shí)間: 2025-4-2 04:49

作者: Invertebrate    時(shí)間: 2025-4-2 07:08

作者: SHRIK    時(shí)間: 2025-4-2 14:53
Nazrul M. Ahmad,Asrul H. Yaacob,Alireza Khorram,JinFu Tan,YiHao Ong,YewMeng Leongnd developing countries along multiple productivity-related .Testing for economic convergence across countries has been a central issue in the literature of economic growth and development. This book introduces a modern framework to study the cross-country convergence dynamics in labor productivity




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
长顺县| 淮南市| 北川| 定南县| 郯城县| 无极县| 延寿县| 辛集市| 台北市| 武平县| 吴堡县| 尚志市| 天柱县| 镇赉县| 北海市| 英超| 沈丘县| 错那县| 中阳县| 广元市| 肥乡县| 兰考县| 永胜县| 瑞丽市| 鄂伦春自治旗| 兴义市| 云南省| 安康市| 织金县| 广灵县| 海伦市| 福清市| 南木林县| 曲松县| 邵阳县| 宜都市| 陆丰市| 启东市| 湘乡市| 安吉县| 淮安市|