標(biāo)題: Titlebook: Recent Findings in Intelligent Computing Techniques; Proceedings of the 5 Pankaj Kumar Sa,Sambit Bakshi,Manmath Narayan Saho Conference pro [打印本頁] 作者: Jefferson 時(shí)間: 2025-3-21 19:30
書目名稱Recent Findings in Intelligent Computing Techniques影響因子(影響力)
書目名稱Recent Findings in Intelligent Computing Techniques影響因子(影響力)學(xué)科排名
書目名稱Recent Findings in Intelligent Computing Techniques網(wǎng)絡(luò)公開度
書目名稱Recent Findings in Intelligent Computing Techniques網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Recent Findings in Intelligent Computing Techniques被引頻次
書目名稱Recent Findings in Intelligent Computing Techniques被引頻次學(xué)科排名
書目名稱Recent Findings in Intelligent Computing Techniques年度引用
書目名稱Recent Findings in Intelligent Computing Techniques年度引用學(xué)科排名
書目名稱Recent Findings in Intelligent Computing Techniques讀者反饋
書目名稱Recent Findings in Intelligent Computing Techniques讀者反饋學(xué)科排名
作者: 漂亮才會豪華 時(shí)間: 2025-3-21 22:51 作者: Baffle 時(shí)間: 2025-3-22 01:25
Dinesh N. Patil,Bandu B. Meshramnificance of this has been borne out in numerous experimental studies (DiCesnola, 1904; Sumner, 1934, 1935; Isley, 1938; Popham, 1942; Dice, 1947; Turner, 1961; Kettlewell, 1956, 1973; Kaufman, 1974; Wiklund, 1975; Curio, 1976). There is also a good understanding of warning coloration (Cott, 1940; W作者: Entropion 時(shí)間: 2025-3-22 08:33
Sneha Kanchan,Narendra S. Chaudhariin supporting external pressure was not achieved until the early 1960s. This functional issue is a relatively simple one: Did the chambered shell contain pressurized gas opposing the external water pressure, or alternatively did the shell structure itself support the load of the overlying column of 作者: 增減字母法 時(shí)間: 2025-3-22 09:38
Ezz El-Din Hemdan,D. H. Manjaiahin supporting external pressure was not achieved until the early 1960s. This functional issue is a relatively simple one: Did the chambered shell contain pressurized gas opposing the external water pressure, or alternatively did the shell structure itself support the load of the overlying column of 作者: Jejune 時(shí)間: 2025-3-22 16:34 作者: Armada 時(shí)間: 2025-3-22 20:19
Satyanarayana Vollala,N. Ramasubramanian,B. Shameedha Begum,Amit D. Joshiossils has been quite sharply defined (e.g., Hennig, 1965; Schaeffer .., 1972; Nelson, 1978; Gaffney, 1979; Cracraft, 1979; Patterson, 1981a,b). The fossil record nevertheless provides useful data by refuting putative synapomorphies and by revealing nonhomology among living taxa, by suggesting seque作者: 頭盔 時(shí)間: 2025-3-23 00:29 作者: ENACT 時(shí)間: 2025-3-23 04:46 作者: carotenoids 時(shí)間: 2025-3-23 09:17
P. Naga Hemanth,N. Abhinay Raj,Nishi Yadavd in earlier prefaces, we are continuing the focus of this series on critical reviews, commentaries, original papers, and controversies in evolu- tionary biology. It is our aim to publish papers primarily of greater length than normally published by society journals and quarterlies. We therefore inv作者: commute 時(shí)間: 2025-3-23 13:34
S. Roopak,Tony Thomas,Sabu Emmanueld in earlier prefaces, we are continuing the focus of this series on critical reviews, commentaries, original papers, and controversies in evolu- tionary biology. It is our aim to publish papers primarily of greater length than normally published by society journals and quarterlies. We therefore inv作者: 上下連貫 時(shí)間: 2025-3-23 16:54
Gaurav Pareek,B. R. Purushothamained section about 30 m thick, comprising the whole sequence of seven planorbid beds. Of the 53 species found, 44 occur in the basic sediment layers, the . beds. In contrast, all of the subsequent beds contain 16 species, and only seven species withstood the extinction at the . boundary. This may be作者: 偽造 時(shí)間: 2025-3-23 18:16 作者: 河潭 時(shí)間: 2025-3-24 00:28 作者: Exaggerate 時(shí)間: 2025-3-24 04:03 作者: 熒光 時(shí)間: 2025-3-24 10:16 作者: Arroyo 時(shí)間: 2025-3-24 11:45
Aditya Vikram Agarwal,Navneet Verma,Sandeep Saha,Sanjeev Kumarough to merit comparison in spite of the differences in technique. The procedure involved in my own studies consisted principally of two criteria (Warburg 1964), firstly, the behaviour of an individual and secondly, the behaviour of a small group of animals (up to 10). With the first criterion I use作者: VEST 時(shí)間: 2025-3-24 18:00
Saroj Kumar Panigrahy,Bibhu Prasad Dash,Sathya Babu Korra,Ashok Kumar Turuk,Sanjay Kumar Jenaough to merit comparison in spite of the differences in technique. The procedure involved in my own studies consisted principally of two criteria (Warburg 1964), firstly, the behaviour of an individual and secondly, the behaviour of a small group of animals (up to 10). With the first criterion I use作者: Ondines-curse 時(shí)間: 2025-3-24 22:22 作者: 無能性 時(shí)間: 2025-3-24 23:19
populations. A transient, unstable population should be under- stood as a fast episodic phase in a population subjected to genetic and environmental factors that tend to disrupt its cohesive, balanced genome architecure, thus enhancing its probability to produce a new species. Striking the core of D作者: 枕墊 時(shí)間: 2025-3-25 05:05
2194-5357 ts both theory and applications.This three volume book contains the Proceedings of 5th International Conference on Advanced Computing, Networking and Informatics (ICACNI 2017). The book focuses on the recent advancement of the broad areas of advanced computing, networking and informatics. It also in作者: ectropion 時(shí)間: 2025-3-25 11:04
Windows Physical Memory Analysis to Detect the Presence of Malicious Codetry key, user authentication details with forensic importance. The cyber attacker modifies the code of the legitimate process to achieve malicious tasks and such malicious codes are not detected by the antivirus program. In order to detect the presence of malicious codes in the legitimate process, t作者: separate 時(shí)間: 2025-3-25 13:51
Signcrypting the Group Signature with Non-transitive Proxy Re-encryption in VANETonal digital signature with encryption is very expensive as it requires massive computational overheads. Instead signcryption combines these two into one step, and overhead reduced is significantly observable. Proxy re-encryption is a technique in which a proxy enables a third person Chris to be abl作者: 蒸發(fā) 時(shí)間: 2025-3-25 18:59 作者: 無底 時(shí)間: 2025-3-25 21:42 作者: PALMY 時(shí)間: 2025-3-26 02:19
Dual-Core Implementation of Right-to-Left Modular Exponentiatione performance of public-key cryptographic transformations is strongly influenced by the competent implementation of modular exponentiation and modular multiplication. This paper presents the hardware implementation of modular exponentiation on two processor cores. Montgomery multiplication method is作者: 心痛 時(shí)間: 2025-3-26 04:45
Investigation of Privacy Issues in Location-Based Servicesens GIS 2:398–404, 2013 [.]). Users of LBS exchange information based on location like maps and navigation, location-based information, location tracking services, social networking, vehicular direction finding, and location-based advertisement. LBS users’ provide highly personalize information to t作者: ABOUT 時(shí)間: 2025-3-26 11:19
Forensic Implications of Cortana Application in Windows 10fied by “Ask me anything” text box at the Start Menu and can be used for a number of tasks such as setting up reminders based on time, place, and person; searching stuff on local device or web; sending emails and texts; and more. The feature keeps track of reminders when and where they got finalized作者: Diatribe 時(shí)間: 2025-3-26 15:06 作者: rectum 時(shí)間: 2025-3-26 20:12 作者: fringe 時(shí)間: 2025-3-26 23:27 作者: Communicate 時(shí)間: 2025-3-27 04:55
Prevention of Hardware Trojan by Reducing Unused Pins and AES in FPGAlent HT inserted at unused resources and the user is unaware. We proposed a technique, i.e., the combination of modified BISA (Built In Self Authentication) and AES (Advance Encryption Standard) to protect the system from HT hazard. In modified BISA, the unused resources pins are filled with the dum作者: 語源學(xué) 時(shí)間: 2025-3-27 08:55
Scrabble-O-Graphy: An Encryption Technique for Security Enhancementt. Communication through such mass media includes exchange of information which can be personal, official, or confidential in nature. To ensure the secured transmission, the ability of the encryption algorithms have to be enhanced. This paper illustrates a novel technique “Scrabble-O-graphy” which s作者: 平息 時(shí)間: 2025-3-27 10:26 作者: Demulcent 時(shí)間: 2025-3-27 15:01
Hybrid Traceback Scheme for DDoS Attacks(DDoS) Attacks. After these types of attacks, legitimate users are not able to access the authorized services. IP Traceback scheme is the only way to trace the original source of the attack. Researchers have been implemented various traceback schemes in the past, but none are able to provide compreh作者: 誘騙 時(shí)間: 2025-3-27 19:08
Dynamic Detection and Prevention of Denial of Service and Peer Attacks with IP Address Processing anr software, every application needs security to prevent any possible attack on them. One of the many popular attacks is Denial of Service (DoS), which is widely used to slow down, and even stop, many applications from processing any request. In this paper, we present a method, an algorithm, which ca作者: 做事過頭 時(shí)間: 2025-3-27 22:42
Comparative Study of ECG-Based Key Agreement Schemes in Wireless Body Sensor NetworksBSNs provide real-time monitoring of patients. By protecting the WBSN, lives of patients or soldiers on battleground is secured. This paper gives a comparative study of electrocardiogram (ECG)-based key agreement schemes in WBSNs. The usage of ECG aims to bring plug-and-play capability in WBSNs, i.e作者: nonradioactive 時(shí)間: 2025-3-28 06:06 作者: 細(xì)胞學(xué) 時(shí)間: 2025-3-28 08:04
Conference proceedings 2019book focuses on the recent advancement of the broad areas of advanced computing, networking and informatics. It also includes novel approaches devised by researchers from across the globe. This book brings together academic scientists, professors, research scholars and students to share and dissemin作者: 詞匯記憶方法 時(shí)間: 2025-3-28 13:29
Signcrypting the Group Signature with Non-transitive Proxy Re-encryption in VANETf Diffie–Hellman assumption in bilinear groups with digital signatures to provide confidentiality, integrity, and non-repudiation. Later the result is evaluated using AVISPA, Automated Validation of Internet Security Protocols and Applications.作者: DAMP 時(shí)間: 2025-3-28 18:04
Cryptanalysis of a Multifactor Authentication Protocolerefore, this paper analyzes the most recently proposed multifactor authentication scheme by Mishra et al. Based on various characteristics that are to be considered in designing an authentication protocol, the scheme is been analyzed. A detailed explanation of various vulnerabilities of Mishra et al.’s scheme is given in this paper.作者: 種屬關(guān)系 時(shí)間: 2025-3-28 21:53
Dual-Core Implementation of Right-to-Left Modular Exponentiationer, and area. The proposed design has been developed using Verilog and synthesized using Xilinx-14.6 ISE for usage in FPGA, and the same has been synthesized using Cadence for ASIC. But here the results are presented based on FPGA.作者: 密碼 時(shí)間: 2025-3-29 02:39 作者: 模仿 時(shí)間: 2025-3-29 04:41 作者: tenosynovitis 時(shí)間: 2025-3-29 07:50
Comparative Study of ECG-Based Key Agreement Schemes in Wireless Body Sensor Networkse does the locking and unlocking technique at the sender and receiver’s side improving the security while not affecting the plug-and-play paradigm. The simulation and analysis is done by using ECG signal taken from MIT PhysioBank database.作者: Gerontology 時(shí)間: 2025-3-29 13:05
Windows Physical Memory Analysis to Detect the Presence of Malicious Codehis paper suggests a framework. This framework is based on the memory mapped information of a process and its creation time. The techniques discussed in this paper have been verified on the Windows 7 and 8 volatile memory dump.作者: 一起 時(shí)間: 2025-3-29 17:31 作者: Aggressive 時(shí)間: 2025-3-29 19:43 作者: 有說服力 時(shí)間: 2025-3-30 00:34
Scrabble-O-Graphy: An Encryption Technique for Security Enhancementhowcases a different route for generating the secured cipher text, without the use of intensive mathematical computation. This paper describes how a simple game of scrabble can be of great importance for the generation of the complex cipher text.作者: 很像弓] 時(shí)間: 2025-3-30 04:49 作者: 孤僻 時(shí)間: 2025-3-30 09:35
Conference proceedings 2019ate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice..作者: 團(tuán)結(jié) 時(shí)間: 2025-3-30 15:19
Dynamic Detection and Prevention of Denial of Service and Peer Attacks with IP Address Processing anes as they make any new request to the server. In multiple stages of IP processing and IP scrutinizing, any possible malicious request made by potential DoS attackers will be detected and, essentially, all normal requests will be separated, allowing them normal access, whereas, the attackers will be denied access to the application.作者: Proclaim 時(shí)間: 2025-3-30 17:52
Wireless Device Authentication Using Fingerprinting Technique been done. The result shows that BR performs better than SCG in identifying unique devices. The proposed method gives better accuracy and identifies more number of devices than the existing techniques.作者: intimate 時(shí)間: 2025-3-30 21:44 作者: conference 時(shí)間: 2025-3-31 02:47 作者: BAIL 時(shí)間: 2025-3-31 07:18 作者: 健談的人 時(shí)間: 2025-3-31 11:58
978-981-10-8638-0Springer Nature Singapore Pte Ltd. 2019