標(biāo)題: Titlebook: Informatics Engineering and Information Science; International Confer Azizah Abd Manaf,Akram Zeki,Eyas El-Qawasmeh Conference proceedings 2 [打印本頁(yè)] 作者: HIV763 時(shí)間: 2025-3-21 18:05
書目名稱Informatics Engineering and Information Science影響因子(影響力)
書目名稱Informatics Engineering and Information Science影響因子(影響力)學(xué)科排名
書目名稱Informatics Engineering and Information Science網(wǎng)絡(luò)公開度
書目名稱Informatics Engineering and Information Science網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Informatics Engineering and Information Science被引頻次
書目名稱Informatics Engineering and Information Science被引頻次學(xué)科排名
書目名稱Informatics Engineering and Information Science年度引用
書目名稱Informatics Engineering and Information Science年度引用學(xué)科排名
書目名稱Informatics Engineering and Information Science讀者反饋
書目名稱Informatics Engineering and Information Science讀者反饋學(xué)科排名
作者: 膽小鬼 時(shí)間: 2025-3-21 20:35 作者: 讓步 時(shí)間: 2025-3-22 01:20 作者: miracle 時(shí)間: 2025-3-22 08:09
Fauziah Redzuan,Anitawati Mohd. Lokman,Zulaiha Ali Othman,Salha Abdullahs, this does not mean they are necessarily politically apathetic. Instead, they are reasonably interested in politics and political issues but show this differently. What appears to be a withdrawal of the youth from politics is a withdrawal from traditional politics. Using the popular commercial rad作者: SUE 時(shí)間: 2025-3-22 11:11
Nur Zuraifah Syazrah Othman,Mohd Shafry Mohd Rahim,Masitah Ghazalius contest for the youth vote among political parties. Through an analysis of youth programmes on three radio stations which predominantly target youth—ZiFM stereo, Star FM and Power FM, the chapter examines how youth programming is characterised by deliberate dumbing down of content due to the comm作者: dominant 時(shí)間: 2025-3-22 14:07
Zoltán Balogh,Milan Tur?ánial differential systems, and more generally, in terms of non- linear systems. Thus, RNNs have to their disposal, a huge set of mathematical tools relating to dynamical system theory which has tumed out to be very useful in enabling a rigorous analysis of RNNs.978-1-4757-3821-6978-1-4757-3819-3Series ISSN 1568-1696 作者: Forsake 時(shí)間: 2025-3-22 20:31 作者: 無(wú)聊的人 時(shí)間: 2025-3-22 23:50 作者: Colonnade 時(shí)間: 2025-3-23 02:09 作者: Cultivate 時(shí)間: 2025-3-23 08:43 作者: Inoperable 時(shí)間: 2025-3-24 01:51
A Flexible Speech Recognition System for Cerebral Palsy Disabledgering, zero crossing rate (ZCR) for the endpoint detection, Mel-Frequency Cepstral Coefficients (MFCC) for the feature extraction, and dynamic time warping (DTW) for the pattern classification. In other words, this flexible system is based on the speech training of CP disabled and then recognizing 作者: Cytokines 時(shí)間: 2025-3-24 05:31 作者: 身心疲憊 時(shí)間: 2025-3-24 08:20
Kansei Design Model for Engagement in Online Learning: A Proposed Modelplained the main design elements in interface, content and interaction design dimensions. Discussions on user experience, emotion and engagement in learning, a brief explanation about Kansei Engineering technique and some conclusion about the research are also presented.作者: chapel 時(shí)間: 2025-3-24 11:02
Azizah Abd Manaf,Akram Zeki,Eyas El-QawasmehFast-track conference proceedings.State-of-the-art research.Up-to-date results作者: 嬰兒 時(shí)間: 2025-3-24 16:28
Communications in Computer and Information Sciencehttp://image.papertrans.cn/i/image/464845.jpg作者: 反叛者 時(shí)間: 2025-3-24 21:03
978-3-642-25326-3Springer-Verlag GmbH Berlin Heidelberg 2011作者: limber 時(shí)間: 2025-3-25 01:44
Informatics Engineering and Information Science978-3-642-25327-0Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 粗糙濫制 時(shí)間: 2025-3-25 06:04
https://doi.org/10.1007/978-3-642-25327-0Web services; approximation algorithms; data mining; fuzzy expert system; social networks; algorithm anal作者: 適宜 時(shí)間: 2025-3-25 08:41 作者: 迫擊炮 時(shí)間: 2025-3-25 14:01 作者: BRUNT 時(shí)間: 2025-3-25 19:01 作者: narcissism 時(shí)間: 2025-3-25 21:19
New ID-Based Proxy Multi-signature from Pairingsin verification phase, the new scheme is more efficient in computational and timing sense than other available schemes. Moreover, the proposed scheme fulfills all the security requirements of a safe proxy signature.作者: 咯咯笑 時(shí)間: 2025-3-26 00:17
Knowledge Mobilization for e-Living: Horizontal and Vertical Networks for Development learning capacities and, potentially, sustained the communities that host them. The creation of internet-based networks has, furthermore, enabled knowledge to be mobilized between schools and their communities, thereby promoting new e-living possibilities.作者: 迫擊炮 時(shí)間: 2025-3-26 06:45
Enhanced Authentication on Targeted Online Surveys: A Case of Online Course Evaluation Systementicity/validity, and respondent’s anonymity are among the issues that hinder the proliferation of online surveys..This paper addresses the aforementioned challenges and fills the left gap by improving previous works and later presents an online survey system which behaves well. The system considers also the problem of identity theft.作者: 清唱?jiǎng)?nbsp; 時(shí)間: 2025-3-26 10:03
Possibilities of Modelling Web-Based Education Using IF-THEN Rules and Fuzzy Petri Nets in LMSn of fuzzy logic into Petri nets there arises a strong tool for modelling teaching processes, mainly thanks to the easy understandability and sophisticated mathematical setup, supporting a rather simple design of educational activities managed by LMS, for the compendious modularity of solution and robustness of the design.作者: 肥料 時(shí)間: 2025-3-26 14:46
Morphed Virus Family Classification Based on Opcodes Statistical Feature Using Decision Treey malware. In this research, we introduce and examine an opcodes statistical-based classifier using decision tree. This method is very simple in implementation. Our experimental outcome shows that different malware family executable files are classifiable using their opcodes statistical feature, with a high degree of reliability.作者: ornithology 時(shí)間: 2025-3-26 20:35
On the Affine Ciphers in CryptographyAs soon as a commonly used monoalphabetic substitution cipher was broken, the word spread and that particular cryptosystem was useless. The affine cipher is simply a special case of the more general monoalphabetic substitution cipher. In this paper, we study the affine cipher and generalized affine cipher.作者: forbid 時(shí)間: 2025-3-26 22:10
Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protoogic (DTPL), and provide authentication tests at a higher level of abstraction. These tests can be easily applied on a variety of authentication protocols, yet they are rigorous enough to capture full capabilities of a typical Dolev-Yao intruder.作者: 槍支 時(shí)間: 2025-3-27 04:22
Conference proceedings 2011ion Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011. The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information secu作者: 條街道往前推 時(shí)間: 2025-3-27 08:38 作者: fibula 時(shí)間: 2025-3-27 10:32
Development of Code-Theoretic Scheme on Generalized Cascade Codesof which is based on using algebraic block codes (code-theoretic schemes) are considered. Resistance of cascade code-theoretic schemes to hacking by an opponent with the help of the method of permutable decoding is researched.作者: endocardium 時(shí)間: 2025-3-27 15:11 作者: 歹徒 時(shí)間: 2025-3-27 18:17
A Secure Protocol for Ultralightweight Radio Frequency Identification (RFID) Tags research, that protocol was enhanced and a new Ultralightweight RFID authentication protocol with mutual authentication was proposed, while keeping the computation cost low. The proposed protocol requires only simple bit-wise operations and can resist various attacks which the previous one could not.作者: 一美元 時(shí)間: 2025-3-28 00:29 作者: Cytology 時(shí)間: 2025-3-28 04:04 作者: GRAIN 時(shí)間: 2025-3-28 06:16 作者: myopia 時(shí)間: 2025-3-28 10:25
1865-0929 reed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011. The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous s作者: hieroglyphic 時(shí)間: 2025-3-28 15:50
Knowledge Mobilization for e-Living: Horizontal and Vertical Networks for Developmentd learning opportunities, particularly for students and their families who live in rural communities. The application of internet-based technologies has enabled networks to be established for the development of small schools located beyond major centres of population in ways that have expanded their作者: FACET 時(shí)間: 2025-3-28 22:02
Towards Using Social Networks and Internet-Enabled Mobile Devices for Learning: Students’ Preparednements that need to be met before higher learning institutions can embrace these two technologies for learning. To achieve this we conducted a survey in higher learning institutions in Tanzania. We looked at students’ possession of Internet-enabled mobile devices, affordability of the Internet, level作者: BLAND 時(shí)間: 2025-3-29 02:35 作者: 存心 時(shí)間: 2025-3-29 06:31
E-mature – Report of an Electronic Mathematics Examber of institutions is changing traditional methods for the ‘e’ ones. It also affects the educational field. The beginnings were mainly about the external teaching. For a few years now extensive research, regarding the e-exams has been done [6],[7],[8], that is the system which enables checking pupi作者: Lacerate 時(shí)間: 2025-3-29 10:02 作者: PANEL 時(shí)間: 2025-3-29 13:06
Online ICT-Courses Integrated for the Hearing-Impaired Individuals’ Education: A Preliminary Study fr online-learning makes the Web an essential technology; hence the accessibility issues in Web applications are vital, this includes the Hearing-Impaired Individuals. The objective of this research is to investigate the Hearing-Impaired Individuals’ level of interests in the various ICT courses, hen作者: 馬籠頭 時(shí)間: 2025-3-29 17:24 作者: 突變 時(shí)間: 2025-3-29 21:15
Integrating Perception into ,???,: 3D Tawaf Training Simulation Applicationes. However, the recent growing integration of perception research into computer graphics offers a more economical solution. Psychophysical experiments are now conducted to find out areas that can be manipulated to transform complex computations to “computation cuts”. This perception based approach 作者: cajole 時(shí)間: 2025-3-30 03:20
Possibilities of Modelling Web-Based Education Using IF-THEN Rules and Fuzzy Petri Nets in LMSs of instruction, manage the instruction, communicate with students, motivate them to study, observe their progress and evaluate them. The article deals with an opportunity to implement fuzzy logic into web-based education using the created IF-THEN rules and modelling in Petri nets. By an applicatio作者: BROW 時(shí)間: 2025-3-30 07:58 作者: INERT 時(shí)間: 2025-3-30 10:37
Morphed Virus Family Classification Based on Opcodes Statistical Feature Using Decision Treea virus. These variants belong to a family and have common behavioral and some statistical characteristics. However, these variants are not detectable via a single common string signature. Some statistical analyses have been tested in recent years to fight against these types of multi-variants famil作者: 癡呆 時(shí)間: 2025-3-30 13:40 作者: Radiation 時(shí)間: 2025-3-30 18:20
Generalization of Weger’s Attackacks of Wiener and Boneh-Durfee. In this paper, we extend the Weger’s bound of the Boneh-Durfee attack for the RSA modulus .?=?., when . being close to . with small integers . and .. We improve the bound of de Weger for the weaker and stronger results of Boneh-Durfee attack.作者: 颶風(fēng) 時(shí)間: 2025-3-30 23:46 作者: 無(wú)效 時(shí)間: 2025-3-31 00:52
Data Leakage Tracking – Non-Repudiation of Forwardingized receiver of a protected copy is proposed in this paper. Existing security concepts are extended by a new security service based on reliable tracking data embedding. Additionally, a new mechanism to protect the new tracking data is shown. Digital watermarking techniques are used to provide track作者: CYN 時(shí)間: 2025-3-31 06:54 作者: Bother 時(shí)間: 2025-3-31 10:42 作者: 溫順 時(shí)間: 2025-3-31 14:49
A Secure Protocol for Ultralightweight Radio Frequency Identification (RFID) Tagsn its security objectives, being vulnerable to several important attacks such as traceability, full disclosure, cloning and desynchronization. In this research, that protocol was enhanced and a new Ultralightweight RFID authentication protocol with mutual authentication was proposed, while keeping t作者: Presbyopia 時(shí)間: 2025-3-31 21:12 作者: Tractable 時(shí)間: 2025-4-1 00:09 作者: 民間傳說(shuō) 時(shí)間: 2025-4-1 04:14
Rozniza Zaharudin,Norazah Nordin,Mohd Hanafi Mohd Yasination that demands more stringent response in terms of delay, jitters, bandwidth and etc. It is well accepted that, the deployment of QoS-aware technologies is a key factor for the continued success of the Internet. In this paper, we propose a Fair Intelligent Congestion Control Resource Discovery (作者: Dorsal 時(shí)間: 2025-4-1 06:45 作者: cancellous-bone 時(shí)間: 2025-4-1 14:08 作者: 不理會(huì) 時(shí)間: 2025-4-1 16:30 作者: EWER 時(shí)間: 2025-4-1 19:58
Robiah Yusof,Siti Rahayu Selamat,Shahrin Sahib,Mohd Zaki Mas’ud,Mohd Faizal Abdollahexplored the ability of a network of highly interconnected “neurons” to have useful collective computational properties, such as content addressable memory. However, the model is based on McCulloch-Pitts neurons that are different from real biological neurons and also from the realistic functioning 作者: 完成 時(shí)間: 2025-4-2 02:44
Babak Bashari Rad,Maslin Masrom,Suhaimi Ibrahim,Subariah Ibrahimgrowth models, outlined in Chaps. 2 and 3. Indeed, a prediction of several Endogenous Growth models, such as the ‘Technological Diffusion-Gap’ model, is that economies do not converge towards a common equilibrium. ‘New Economic Geography’ implies a polarisation of regions into different ‘clusters’, 作者: 奇怪 時(shí)間: 2025-4-2 04:49 作者: Invertebrate 時(shí)間: 2025-4-2 07:08 作者: SHRIK 時(shí)間: 2025-4-2 14:53
Nazrul M. Ahmad,Asrul H. Yaacob,Alireza Khorram,JinFu Tan,YiHao Ong,YewMeng Leongnd developing countries along multiple productivity-related .Testing for economic convergence across countries has been a central issue in the literature of economic growth and development. This book introduces a modern framework to study the cross-country convergence dynamics in labor productivity