Puzzle Zeitvertreib Beste 4K Filme Beste Multimedia-Lernspiele % SALE %

Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, J


Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, J
101.10 CHF
Versandkostenfrei

Lieferzeit: 7-14 Werktage

  • 10392531


Beschreibung

Cloud Computing and Security.- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server.- Virtualization of 5G Cellular Networks: A Combinatorial Share-averse Auction Approach.- Equipment Fault Detection Based on SENCForest.- Research on Telemedical Monitoring System Based on Homomorphic Encryption.- Phase Retrieval via Accelerated Gradient Descent.- Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model.- A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds.- Application of Blockchain Technology in Agricultural Product Traceability System.- Anonymous Authentication Scheme for Machine-To-Machine Communication Based on Elliptic Curve.- Linear Complexity of R-Ary Sequences Derived from Euler Quotients Modulo 2p.- Information Hiding.- An Improved Steganalysis Method Using Feature Combinations.- Research on Application of OFD Technology in Secure Electronic Bills.- A Generative Method for Image Steganography Based on Semantics.- Review on Text Watermarking Resistant to Print-scan, Screen-shooting.- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image.- IoT Security.- An Landmark Evaluation Alogrithm Based on Router Identification and Delay Measurement.- Multiplicative Linear Secret Sharing without Interaction.- Positioning Improvement Algorithm Based on LoRa Wireless Networks.- Time-aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks.- An Implementation of CoAP-Based Semantic Resource Directory in Californium.- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency.- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks.- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar.- Under-Determined Blind Source Separation Anti-Collision Algorithm for Rfid Based on Adaptive Tree Grouping.- Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles.- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces.- Design of an IoT-based Efficient Security Scheme in Home Wireless System.- Discussion on the Application of Industrial Internet.- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform.- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding.- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks.- Shape Recognition with Recurrent Neural Network.- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model.- Tobacco Intelligent Management System Based on Internet of Things.- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System.- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission.- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things.- Multimedia Forensics.- The Impact of Using Facebook on the Academic Performance of University Students.- Robust Audio Watermarking Algorithm Based on Moving Average and DCT.- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm.- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification.- Image Hashing based on CS-LBP and DCT for Copy Detection.- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering.- An Image Forensic Method for AI Inpainting Using Faster R-CNN.- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy.- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks.- Encryption and Cybersecurity.- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data.- Calculation of Network Security Index Based on Convolution Neural Networks.- A Method to Defense APT based on Dynamic ID Transformation.- Emergency analysis Based on Affective Computing

Eigenschaften

Breite: 158
Gewicht: 1013 g
Höhe: 235
Länge: 39
Seiten: 661
Sprachen: Englisch
Autor: Elisa Bertino, Xingming Sun, Zhaoqing Pan

Bewertung

Bewertungen werden nach Überprüfung freigeschaltet.

Die mit einem * markierten Felder sind Pflichtfelder.

Ich habe die Datenschutzbestimmungen zur Kenntnis genommen.

Zuletzt angesehen

eUniverse.ch - zur Startseite wechseln © 2021 Nova Online Media Retailing GmbH