標(biāo)題: Titlebook: International Joint Conference: 12th International Conference on Computational Intelligence in Secur; Seville, Spain, May Francisco Martín [打印本頁] 作者: Buren 時間: 2025-3-21 16:07
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur影響因子(影響力)
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur影響因子(影響力)學(xué)科排名
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur網(wǎng)絡(luò)公開度
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur被引頻次
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur被引頻次學(xué)科排名
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur年度引用
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur年度引用學(xué)科排名
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur讀者反饋
書目名稱International Joint Conference: 12th International Conference on Computational Intelligence in Secur讀者反饋學(xué)科排名
作者: Vldl379 時間: 2025-3-22 00:17 作者: 緩和 時間: 2025-3-22 02:43 作者: 針葉 時間: 2025-3-22 06:01
Sarah Wunderlich,Markus Ring,Dieter Landes,Andreas Hothoility to interpret and create visual representations, which is crucial for understanding complex social issues. Over four years, involving 18 classes and more than 450 students, the research identified four guiding principles for using visual representations, such as scatterplots and flowcharts, to 作者: 沒收 時間: 2025-3-22 11:41 作者: 愛社交 時間: 2025-3-22 15:35 作者: 開始發(fā)作 時間: 2025-3-22 17:11
Juan F. García,Miguel V. Carriegosch mit L2S auszuloten. Dies geschah anhand von Ausschnitten aus Gespr?chen in zwei betrieblichen Kommunikationsr?umen in Ober?sterreich (Mühlviertel) und auf der Grundlage der Annahme, dass sprachliche Variation immer (auch) mit Soziofunktionalit?t zu tun hat und das Gespr?ch eine fundamentale Metho作者: 沐浴 時間: 2025-3-23 00:30 作者: Ligament 時間: 2025-3-23 04:08 作者: Culpable 時間: 2025-3-23 06:10
Ha Xuan Son,Minh Hoang Nguyen,Hong Khanh Vo,The Phuc Nguyenlly differentiated structure is composed of only two major cell types. With this apparent reduction in “complexity,” single cell transcriptomics has proven to be a valuable tool in defining the features of developmental transitions and cell fate separation events, even providing causal information o作者: 值得 時間: 2025-3-23 12:59 作者: 運動的我 時間: 2025-3-23 14:56
Zahmoul Rim,Abbes Afef,Ejbali Ridha,Zaied Mouradrukturen eine Homologie (Abstammungs?hnlichkeit) zugrunde. ?hnlichkeit kann aber auch auf ?hnlichen Selektionsbedingungen beruhen. Dann handelt es sich um eine Funktions?hnlichkeit. Diese wird im schulischen Kontext h?ufig als Analogie oder als Konvergenz bezeichnet. Die beiden Begriffe sind nur sch作者: Misnomer 時間: 2025-3-23 22:04
Siwar Yahia,Salwa Said,Mourad Zaiedhüler. Die Vermittlung der Humanevolution ist zugleich aber auch mit Fragen der Wissenschaftsprop?deutik verbunden: Welche fachlichen Erkenntnisse liegen bisherigen Hypothesen zugrunde? Wie gesichert sind diese Erkenntnisse und welche M?glichkeiten besitzen Wissenschaftler:innen, um ihre Hypothesen 作者: MENT 時間: 2025-3-23 23:21
Wafa Damak,Randa Boukhris Trabelsi,Alima Damak Masmoudi,Dorra Sellamiu Walen) lassen sich allein anhand rezenter Arten kaum verstehen. Zwar l?sst sich die biologische Funktion von Merkmalen bei rezenten Formen beschreiben, aber der eigentliche evolutive Wandlungsprozess zu diesen Merkmalen bleibt ungekl?rt. Erst die Einbindung von Fossilien erlaubt es, diese gro?en T作者: CHURL 時間: 2025-3-24 05:35
Silvia González,álvaro Herrero,Javier Sedano,Emilio Corchadorukturen eine Homologie (Abstammungs?hnlichkeit) zugrunde. ?hnlichkeit kann aber auch auf ?hnlichen Selektionsbedingungen beruhen. Dann handelt es sich um eine Funktions?hnlichkeit. Diese wird im schulischen Kontext h?ufig als Analogie oder als Konvergenz bezeichnet. Die beiden Begriffe sind nur sch作者: leniency 時間: 2025-3-24 09:09
Sara D. Cardell,Amparo Fúster-Sabater gab. Wohl hatten die ?Bijoux indiscrets? ihre Leser gefunden - wahrscheinlich mehr, als man gemeinhin annimmt, denn die erotische Literatur fand auch in Deutschland, genau wie anderswo, unter der Hand weiteste Verbreitung – aber das moralische und religi?se Klima des Landes erlaubte es kaum, da? si作者: FLAG 時間: 2025-3-24 13:02 作者: 上下倒置 時間: 2025-3-24 14:52 作者: 壓倒 時間: 2025-3-24 21:01 作者: precede 時間: 2025-3-24 23:58
A Framework of New Hybrid Features for Intelligent Detection of Zero Hour Phishing Websiteslimited types of features. Phishers are constantly learning their features and use sophisticated tools to adopt the features in phishing websites to evade detections. Therefore, there is a need for continuous discovery of new, robust and more diverse types of prediction features to improve resilienc作者: metropolitan 時間: 2025-3-25 06:12
Mirkwood: An Online Parallel Crawlersed crawler, analysing exclusively a limited set of hosts, it includes seed extraction capabilities, which allows it to autonomously obtain high quality sites to crawl. Mirkwood is designed to run in a computer cluster, taking advantage of all the cores of its individual machines (virtual or physica作者: 把手 時間: 2025-3-25 08:59
Improving SVM Classification on Imbalanced Datasets for EEG-Based Person Authenticationf genuine clients and impostors, and this issue heavily impacts on the performance of EEG-based person authentication using SVM. In this paper, we propose a new bias method for SVM binary classification to improve the performance of the minority class in imbalanced datasets. Our experiments on EEG d作者: 以煙熏消毒 時間: 2025-3-25 14:20 作者: archetype 時間: 2025-3-25 17:36
Toward an Privacy Protection Based on Access Control Model in Hybrid Cloud for Healthcare SystemsSuch collaborations raise the need for an authorization system to implement network security and protect sensitive data of each patient. Without a proper security protocol, this confidential information could be exploited by malicious attackers. This paper presents a novel access control system call作者: 放縱 時間: 2025-3-25 20:49
Video Anomaly Detection and Localization in Crowded Scenesapproach to predict and localize anomaly events. In this paper, a new framework for motion extraction called BQM is proposed. Then, the regions of interest are extracted and a filtering process is applied to eliminate the non-significant ones. However, for more precision, the HFG descriptor is appli作者: 巨碩 時間: 2025-3-26 03:21
Beta Chaotic Map Based Image Steganography, we proposed a steganographic scheme based on Beta chaotic map in order to embed secret images bits into cover images. Thus a secure transmission of data could be established. We applied the PSNR, MSE and histogram tests on the obtained images and comparisons were made with different existing metho作者: LAY 時間: 2025-3-26 04:24 作者: Allodynia 時間: 2025-3-26 08:45 作者: Vasoconstrictor 時間: 2025-3-26 14:51
Neuro-Evolutionary Feature Selection to Detect Android Malwarethe high number of features that can be obtained from Android apps in order to improve detection. Present paper proposes wrapper feature selection by applying a genetic algorithm and a Multilayer Perceptron. In order to validate this proposal, feature selection is performed on the well-known Drebin 作者: FADE 時間: 2025-3-26 19:53 作者: 大洪水 時間: 2025-3-26 23:49
Anomaly Detection on Patients Undergoing General Anesthesiad models to predict the state of the patient. The appearance of any anomaly during the anesthetic process may lead, for instance, to incorrect drug administration. This could produce undesirable side effects that can affect the patient postoperative and also reduce the safety of the patient in the o作者: ineptitude 時間: 2025-3-27 05:12 作者: sundowning 時間: 2025-3-27 05:28 作者: adequate-intake 時間: 2025-3-27 11:11
Perturbing Convolutional Feature Maps with Histogram of Oriented Gradients for Face Liveness Detectiases, like OULU-NPU, CASIA-FASD and Replay-Attack, in both intra-database and cross-database scenarios. Experimental results indicate that the proposed framework perform significantly better compare to previous state-of-the-art approaches in both intra-database and cross-database face anti-spoofing scenarios.作者: 立即 時間: 2025-3-27 17:01
Efficient Verification of Security Protocols Time Properties Using SMT Solverscially constructed time conditions. These are checked by a quantifier-free SMT encoding and SMT solver using BMC algorithms. In our work, we have also implemented the proposed method and evaluated it for four, well-known security protocols. We also compared our new SMT-based technique with the corresponding SAT-based approach.作者: 怒目而視 時間: 2025-3-27 20:02 作者: Detonate 時間: 2025-3-27 23:32 作者: 十字架 時間: 2025-3-28 03:17 作者: CHURL 時間: 2025-3-28 08:55 作者: Bereavement 時間: 2025-3-28 14:12 作者: abreast 時間: 2025-3-28 17:28
Toward an Privacy Protection Based on Access Control Model in Hybrid Cloud for Healthcare Systemss and (2) protecting private’s patient data that can be accessed by only the treating doctor. The model is implemented in a real-case application to demonstrate its effectiveness in managing the different level of security and privacy concerns.作者: 平息 時間: 2025-3-28 19:46
2194-5357 the scientific outcomes of the 12th International Conferenc.This volume presents papers presented at CISIS 2019 and ICEUTE 2019, held in the beautiful and historic city of Seville (Spain) in May 2019..The 12th CISIS 2019 conference offered a meeting opportunity for academic and industry-related res作者: 排名真古怪 時間: 2025-3-28 23:07 作者: 歡樂東方 時間: 2025-3-29 04:02 作者: absolve 時間: 2025-3-29 07:45
Deep Wavelet Extreme Learning Machine for Data Classificationen nodes of ELM and the learning is done by a Deep Extreme Learning Machine. To evaluate the performance of our approach we have used a standard benchmark dataset for multi-class image classification (MNIST). Results show that our approach offers a significantly better performance relative to others approaches.作者: NAIVE 時間: 2025-3-29 12:16 作者: 炸壞 時間: 2025-3-29 16:52 作者: maintenance 時間: 2025-3-29 20:41
Linearization of Cryptographic Sequencese that the generalized sequences can be computed as a finite binary sum of binomial sequences. Besides, the cryptographic parameters of the generalized sequences can be studied in terms of the binomial sequences.作者: Ceramic 時間: 2025-3-30 01:46 作者: HAWK 時間: 2025-3-30 06:03 作者: 騙子 時間: 2025-3-30 08:12 作者: freight 時間: 2025-3-30 13:08 作者: 聽寫 時間: 2025-3-30 18:55 作者: 圖畫文字 時間: 2025-3-30 21:17 作者: 古代 時間: 2025-3-31 03:05
Yasar Abbas Ur Rehman,Lai-Man Po,Mengyang Liu,Zijie Zou,Weifeng Ouribe how we generated a synthetic dataset of Euler diagrams annotated with qualitative spatial representations based on the Region Connection Calculus (RCC8). Results showed over 95% accuracy of the transformer-based language model in the generation of meaning-carrying RCC8 specifications for given 作者: 該得 時間: 2025-3-31 07:24
Sarah Wunderlich,Markus Ring,Dieter Landes,Andreas Hothorstanding. The research also highlights the importance of teachers’ roles in facilitating students’ critical engagement with visual representations, ensuring that these are seen not as static depictions but as tools for dynamic analysis and problem-solving. By implementing these principles, the stud作者: 玷污 時間: 2025-3-31 10:08
Agnieszka M. Zbrzezny,Sabina Szymoniak,Miros?aw Kurkowskis and powerful effects of diagrammatic othering in civic education textbooks. The chapter shows how a multimodal approach that is sensible to the interplay of written-linguistic, visual, numerical, and spatial modes of representations can contribute to a better understanding of the logics of knowled作者: insert 時間: 2025-3-31 14:35 作者: 似少年 時間: 2025-3-31 18:27
Juan F. García,Miguel V. Carriegosbeschr?nkt, sechs DSK-Emergenz-Hypothesen – n?mlich? die .,?die .,?die .,?die .,?die . und?die . – aufgestellt und diskutiert, die sich auf die Schnittstelle zwischen der mikro- und der mesoskopischen oder der mikro- und der makroskopischen Analyseebene beziehen.作者: Calculus 時間: 2025-4-1 00:11