派博傳思國(guó)際中心

標(biāo)題: Titlebook: Information Systems Design and Intelligent Applications; Proceedings of Third Suresh Chandra Satapathy,Jyotsna Kumar Mandal,Vikr Conference [打印本頁(yè)]

作者: 夸大    時(shí)間: 2025-3-21 20:05
書(shū)目名稱Information Systems Design and Intelligent Applications影響因子(影響力)




書(shū)目名稱Information Systems Design and Intelligent Applications影響因子(影響力)學(xué)科排名




書(shū)目名稱Information Systems Design and Intelligent Applications網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Information Systems Design and Intelligent Applications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Information Systems Design and Intelligent Applications被引頻次




書(shū)目名稱Information Systems Design and Intelligent Applications被引頻次學(xué)科排名




書(shū)目名稱Information Systems Design and Intelligent Applications年度引用




書(shū)目名稱Information Systems Design and Intelligent Applications年度引用學(xué)科排名




書(shū)目名稱Information Systems Design and Intelligent Applications讀者反饋




書(shū)目名稱Information Systems Design and Intelligent Applications讀者反饋學(xué)科排名





作者: 有罪    時(shí)間: 2025-3-21 21:03
An Effective Approach for Providing Diverse and Serendipitous Recommendations,ut, the current state of recommender system fails to suggest relevant items that are unknown (novel) and surprising (serendipitous) for its users. Therefore, we proposed a new approach that takes as input the positive ratings of the user, positive ratings of the similar users and negative ratings of
作者: Plaque    時(shí)間: 2025-3-22 00:47

作者: 萬(wàn)神殿    時(shí)間: 2025-3-22 05:04

作者: ANTE    時(shí)間: 2025-3-22 10:43
Design of a Low-Delay-Write Model of a TMCAM,om the connections of circuit and majorly due to the exceptional operational features of CAM integrated with MTJ. While the previous TMCAM required each one of the MTJ to be written separately, this model attempts to nullify the problem. Consequently, a reduction in delay by almost twice is obtained
作者: 蜈蚣    時(shí)間: 2025-3-22 13:08

作者: 能得到    時(shí)間: 2025-3-22 18:09

作者: explicit    時(shí)間: 2025-3-23 00:33

作者: 勛章    時(shí)間: 2025-3-23 03:10

作者: 含鐵    時(shí)間: 2025-3-23 09:19
Design of Wireless Sensor Network Based Embedded Systems for Aquaculture Environment Monitoring,loped system will have many applications particularly in the area of aquaculture, tea plantations, vineyards, precision agriculture, green houses monitoring etc. The complexity of the system increases for applications involving aquaculture. The developed systems are tailored for sensing in wide farm
作者: 男生戴手銬    時(shí)間: 2025-3-23 09:42

作者: charisma    時(shí)間: 2025-3-23 17:43

作者: 閑蕩    時(shí)間: 2025-3-23 22:05
Evaluation of Glomerular Filtration Rate by Single Frame Method Applying GATES Formula,mpare it with GFR calculated by grouping frames. The DICOM image has number of frames in which the timely report of the activity of tracer is acquired accordingly at various instances of frames. Here we take a single frame from an image collection of 60 frames where the activity of the radio tracer
作者: 保守    時(shí)間: 2025-3-23 23:32
Design and Development of Cost Effective Wearable Glove for Automotive Industry,he help of any automation technique. In this paper, a cost effective wearable glove for monitoring automotive parameters such as temperature, flaw detection, Electro Motive Force (EMF) leakage and Direct Current (DC) measurement etc. To perform these measurements, various sensor units like temperatu
作者: 歪曲道理    時(shí)間: 2025-3-24 03:55
Tampering Localization in Digital Image Using First Two Digit Probability Features,sis shows that, first two digits probabilities get significantly affected by tampering operations. Thus, prima facie tampering can be efficiently localized using this smaller feature set, effectively reducing localization time. We trained SVM classifier using the first two digit probabilities of sin
作者: 不要嚴(yán)酷    時(shí)間: 2025-3-24 08:50
Classification of Bank Direct Marketing Data Using Subsets of Training Data,and Financial Industry. A classification technique using subsets of training data has been proposed in this paper. We have used a real-world direct marketing campaign data for experimentation. This marketing campaign was a telemarketing campaign. The objective of our experiment is to forecast the pr
作者: 方舟    時(shí)間: 2025-3-24 10:39
,Offline Writer Identification and Verification—A State-of-the-Art,a scan etc. The same can be used applied on handwriting analysis. The Automatic Writer Identification and Verification (AWIV) is a study which combines forensic analysis field and computer vision and pattern recognition field. This paper presents a survey of literature on the offline handwritten wri
作者: 后天習(xí)得    時(shí)間: 2025-3-24 15:15

作者: 注意    時(shí)間: 2025-3-24 20:26

作者: FELON    時(shí)間: 2025-3-25 02:05
s, so-called macroblocks, and is mainly divided into four operations: color conversion, Discrete Cosine Transform (DCT), quantization and entropic encoding. This operation is carried out easily on non-encrypted image. In this paper, we consider the case where such an execution is done in the encrypt
作者: occult    時(shí)間: 2025-3-25 06:37

作者: Essential    時(shí)間: 2025-3-25 09:53
Ivy Jain,Hitesh Hasijampromised device can potentially overtake the whole infrastructure, especially considering clone attacks..To counter attacks, we propose a network architecture which enhances flat networks, especially mesh networks, with isolation and automatic containment of malicious devices. Our approach consists
作者: CRAFT    時(shí)間: 2025-3-25 14:23

作者: 種屬關(guān)系    時(shí)間: 2025-3-25 15:48
Minal Lopes,Nisha Sarwades the users’ privacy, while guaranteeing its authenticity. Garms and Lehmann (PKC’19) introduced a new type of group signatures that balance privacy with utility by allowing to selectively link subsets of the group signatures via an oblivious entity, the converter. The conversion takes a batch of gr
作者: 征稅    時(shí)間: 2025-3-25 20:57
N. S. Ranjan,Soumitra Pal,Aminul Islam computers. One of the Round?3 candidates of the ongoing NIST post-quantum standardization effort is .. It was designed to provide conservative security, which comes with the caveat that implementations are often bigger and slower compared to alternative schemes. In particular, the most time-consumi
作者: osculate    時(shí)間: 2025-3-26 03:13

作者: 嚙齒動(dòng)物    時(shí)間: 2025-3-26 04:28
Swati Hira,Anita Bai,P. S. Deshpandesed to improve trust in new Post-Quantum (PQ) schemes and smooth the transition to PQ cryptography. In particular, several ways to combine key exchange mechanisms (KEMs) into a secure hybrid KEM have been proposed. In this work, we observe that most PQ KEMs are built using a variant of the Fujisaki-
作者: Organization    時(shí)間: 2025-3-26 09:24
Anitha Mary M. O. Chacko,K. S. Anil Kumarsed to improve trust in new Post-Quantum (PQ) schemes and smooth the transition to PQ cryptography. In particular, several ways to combine key exchange mechanisms (KEMs) into a secure hybrid KEM have been proposed. In this work, we observe that most PQ KEMs are built using a variant of the Fujisaki-
作者: debris    時(shí)間: 2025-3-26 14:06
Abdullah Akbar,S. Mahaboob Basha,Syed Abdul Sattarer prove possession of this certified credential to another party, while minimizing the information given to the latter. At CANS 2010, Guajardo, Mennink and Schoenmakers have introduced the concept of anonymous credential schemes with encrypted attributes, where the attributes to be certified are en
作者: Crepitus    時(shí)間: 2025-3-26 16:58

作者: Resection    時(shí)間: 2025-3-26 21:48

作者: 緯線    時(shí)間: 2025-3-27 04:46

作者: 憤世嫉俗者    時(shí)間: 2025-3-27 08:54

作者: 勛章    時(shí)間: 2025-3-27 09:34
Manoharan Sangeetha,Gautham Raj Vijayaragavan,R. L. Raghav,K. P. Phanicess to information. This paper introduces the design and implementation of the GNU Name System (GNS), a fully decentralized and censorship-resistant name system. GNS provides a privacy-enhancing alternative to DNS which preserves the desirable property of memorable names. Due to its design, it can
作者: 繁榮地區(qū)    時(shí)間: 2025-3-27 15:53

作者: 行乞    時(shí)間: 2025-3-27 21:07

作者: fidelity    時(shí)間: 2025-3-27 22:34

作者: 心胸開(kāi)闊    時(shí)間: 2025-3-28 02:29
Swarnendu Ghosh,Nibaran Das,Mahantapas Kundu,Mita Nasipuriogress has been made towards reducing processing overheads, STC still incurs significant communication overhead that is in fact prohibitive when no high-speed network connection is available, e.g., when applications are run over a cellular network. In this paper, we consider the fundamental problem
作者: Innovative    時(shí)間: 2025-3-28 09:57

作者: 欺騙世家    時(shí)間: 2025-3-28 13:41

作者: antidepressant    時(shí)間: 2025-3-28 17:07

作者: 指派    時(shí)間: 2025-3-28 18:52
Suresh Chandra Satapathy,Jyotsna Kumar Mandal,VikrCovers novel and original.research in computer science and information technology.on topics like natural language processing, artificial intelligence, cyber.forensics, software engineering and virtual
作者: 鋼筆記下懲罰    時(shí)間: 2025-3-28 23:26

作者: Adrenaline    時(shí)間: 2025-3-29 03:39
Information Systems Design and Intelligent ApplicationsProceedings of Third
作者: cultivated    時(shí)間: 2025-3-29 08:33
Conference proceedings 2016ing,intelligent computing for GIS and remote sensing, bio-informatics andbio-computing. These fields are not only limited to computer researchers butalso include mathematics, chemistry, biology, bio-chemistry, engineering,statistics, and all others in which computer techniques may assist..
作者: 嬉耍    時(shí)間: 2025-3-29 15:19
data usability..In this context, one of the main cryptographic tool is (fully) homomorphic encryption (FHE), that permits to perform operations while keeping the data encrypted. We here consider two different instantiations of FHE, one for which the plaintext space is binary (.) and the other a mod
作者: 會(huì)犯錯(cuò)誤    時(shí)間: 2025-3-29 16:15
Dac-Nhuong Le,Vo Nhan Van,Trinh Thi Thuy Giang data usability..In this context, one of the main cryptographic tool is (fully) homomorphic encryption (FHE), that permits to perform operations while keeping the data encrypted. We here consider two different instantiations of FHE, one for which the plaintext space is binary (.) and the other a mod
作者: 輕快帶來(lái)危險(xiǎn)    時(shí)間: 2025-3-29 22:07
Ivy Jain,Hitesh Hasija mesh networks?[., .,.,.] relied on a single point-of-failure and is, thus, not intrusion or malware tolerant..Our architecture is dynamic in the sense that bridge devices can change, misbehaving devices can be isolated by outvoting them, and cryptographic keys evolve. This effectively turns the ent
作者: Contend    時(shí)間: 2025-3-30 03:16
Khushboo Pachori,Amit Mishra,Rahul Pachauri,Narendra Singh data usability..In this context, one of the main cryptographic tool is (fully) homomorphic encryption (FHE), that permits to perform operations while keeping the data encrypted. We here consider two different instantiations of FHE, one for which the plaintext space is binary (.) and the other a mod
作者: MONY    時(shí)間: 2025-3-30 05:46

作者: artless    時(shí)間: 2025-3-30 09:15
N. S. Ranjan,Soumitra Pal,Aminul Islamprove over the state-of-the-art implementation with a row-wise blocking and packing approach, denoted as RWCF in the following. For the matrix multiplication in ., this results in a factor two speed-up. The impact of these improvements on the full decapsulation operation is up?to 22%. We additionall
作者: 單獨(dú)    時(shí)間: 2025-3-30 13:46
Mridul Paul,Ajanta Dasnt in the public key size but also in the signature size when used in the right setting..However, constructions based on the higher-bit approximate ISIS save memory space at the expense of loosening security. Parameters must be set in regards with this trade-off.
作者: 職業(yè)拳擊手    時(shí)間: 2025-3-30 17:15
Swati Hira,Anita Bai,P. S. Deshpandef our combiners as a proof-of-concept and benchmark it. More precisely, we build a hybrid IND-CCA KEM from the CPA-secure versions of HQC and LAC, two NIST Round 2 PQ proposals. We show that the resulting KEM offers comparable performances to HQC, thus improving security at a small cost. Finally, we
作者: 傳授知識(shí)    時(shí)間: 2025-3-30 23:26
Anitha Mary M. O. Chacko,K. S. Anil Kumarf our combiners as a proof-of-concept and benchmark it. More precisely, we build a hybrid IND-CCA KEM from the CPA-secure versions of HQC and LAC, two NIST Round 2 PQ proposals. We show that the resulting KEM offers comparable performances to HQC, thus improving security at a small cost. Finally, we
作者: 拖債    時(shí)間: 2025-3-31 00:57
Abdullah Akbar,S. Mahaboob Basha,Syed Abdul Sattar this problem: our multi-show anonymous credential scheme with encrypted attributes relies on the non-interactive Groth-Sahai proof system and the recent work on commuting signatures from Fuchsbauer (Eurocrypt 2011) and is proven secure in the standard model.
作者: 外形    時(shí)間: 2025-3-31 09:02

作者: Daily-Value    時(shí)間: 2025-3-31 11:21
Mitali Sinha,Suman Deb,Sonia Nandia, Ohashi and Minematsu. By applying the method, the security bounds of GCM can be improved by a factor of around 2.. Lastly, we show that these forgery attacks will still succeed if GCM adopts MAC-then-Enc paradigm to protect its MAC scheme as one of the options mentioned in previous papers.
作者: 不可救藥    時(shí)間: 2025-3-31 13:21
Sonia Nandi,Suman Deb,Mitali Sinha which is provably secure in the g-eCK model without random oracles. Security of proposed protocol is reduced to the hardness of Cube Bilinear Decisional Diffie-Hellman (CBDDH) problem for symmetric pairing. We also extend the proposed 3AKE scheme to a GAKE scheme with more than three group members,
作者: Initial    時(shí)間: 2025-3-31 19:22

作者: 量被毀壞    時(shí)間: 2025-3-31 22:11
Manoharan Sangeetha,Gautham Raj Vijayaragavan,R. L. Raghav,K. P. Phanind memorable mapping without a trusted authority. GNS uses the transitivity in the SDSI design to replace the trusted root with secure delegation of authority, thus making petnames useful to other users while operating under a very strong adversary model. In addition to describing the GNS design, we
作者: 帶傷害    時(shí)間: 2025-4-1 04:02

作者: crucial    時(shí)間: 2025-4-1 07:32
Debaditya Barman,Kamal Kumar Shaw,Anil Tudu,Nirmalya Chowdhuryns, by replacing them with precomputed values. We note that a number of well-known and widely-used crypto libraries are subject to this vulnerability.In addition to such a vulnerability, we describe some other minor optimizations that an attacker can exploit to reduce even more the key derivation ti




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
宣城市| 建昌县| 巧家县| 香港 | 鸡泽县| 许昌县| 从化市| 栾城县| 双城市| 邵东县| 天峻县| 林西县| 弋阳县| 定结县| 乌拉特中旗| 湖南省| 文化| 志丹县| 扬州市| 通城县| 射洪县| 平利县| 化隆| 东阳市| 寿宁县| 尼勒克县| 仙游县| 南岸区| 嘉兴市| 延津县| 务川| 布尔津县| 肥乡县| 措勤县| 宁南县| 贵阳市| 卢氏县| 新河县| 原平市| 科尔| 息烽县|