The proceedings contain 68 papers. The topics discussed include: weaknesses of a verifier-based password-authenticated key exchange protocol in the three-party setting;cryptanalysis of a three-party authenticated key ...
ISBN:
(纸本)9780769539270
The proceedings contain 68 papers. The topics discussed include: weaknesses of a verifier-based password-authenticated key exchange protocol in the three-party setting;cryptanalysis of a three-party authenticated key exchange protocol using elliptic curve cryptography;research on human-computer interaction in 3D configuration software;multiple attribute decision making based on fuzzy selected subset and linguistic variables;an approach to linguistic multiple attribute decision making based on superiority possibility;predicting defect-prone software modules at different logical levels;the acquisition and sentence alignment for academic bilingual resources based on web paper libraries;a text clustering algorithm combining k-means and local search mechanism;an extended CompDepend-algorithm to discovery duplicate tasks in workflow process mining system;maintaining replica consistency using replica information broadcast tree in P2P storage system and the application of wavelet threshold de-noising in the aluminum reduction cell electrolyte temperature data.
The proceedings contain 21 papers. The special focus in this conference is on Software Engineering research and Practice. The topics include: MetaPix: A Data-Centric AI Development Platform for Efficient Manageme...
ISBN:
(纸本)9783031866432
The proceedings contain 21 papers. The special focus in this conference is on Software Engineering research and Practice. The topics include: MetaPix: A Data-Centric AI Development Platform for Efficient Management and Utilization of Unstructured computer Vision Data;A Novel Architecture That Examines Network Activity in a Docker-Based Multitenant to Verify Zero Trust Container Architecture (ZTCA) Compliance;VENUS: Designing a Validation Engine for User Stories;a Framework for Requirements Modeling of Safety Critical Systems: A Continuous Glucose Monitoring System Case Study;plan-Based and Agile Companies: A Comparison of Project Management Approaches;Service Availability Ratio (SAR): An Availability Metric for Microservice;Development of a Desktop Agent System Using GPT;navigating challenges in E-Participation: A Comprehensive Meta-Analysis;The Shifting Landscape of Cybersecurity: The Impact of Remote Work and COVID-19 on Data Breach Trends;Farmchain: Empowering Smallholder Farmers Through Blockchain and DAOs: Cryptournomic Approach;privacy Strategies for Police Personnel: Co-designing a Self-assessment Tool;cybersecurity Threats: An Analysis of the Rise and Impacts of State Sponsored Cyber Attacks;moore’s Law: What Comes Next?;use of Emerging Technologies in Africa;using Survey to Investigate the Integration of Artificial Intelligence in e-Learning;students Satisfaction with the Distance Education During Covid-19 Pandemic;Improving Student Success in Math Courses Using WeBWorK;fast Food Review Online;a Systems Approach to Improving E-Learning Using Theory of Constraints.
The proceedings contain 24 papers. The special focus in this conference is on research in computerscience and Control. The topics include: World mathematical year 2.000 and computerscience;system dependability;techn...
ISBN:
(纸本)9783540563204
The proceedings contain 24 papers. The special focus in this conference is on research in computerscience and Control. The topics include: World mathematical year 2.000 and computerscience;system dependability;technology, networks, and the library of the year 2000;an experimental fine-grain multicomputer;new frontiers in database system research;fundamental connections between computerscience and logic;time for concurrency;horizons of parallel computation;control software for virtual-circuit switches;creating a design science of human-computer interaction;sensing robots;fundamentals of bicentric perspective;a technical challenge;autonomous control;analog and digital computing;stochastic control and large deviations;differential-geometric methods: a powerful set of new tools for optimal control;coordinating vehicles in an automated highway;opportunities and challenges in signal processing and analysis;neural computing and stochastic optimization;stabilization of galerkin methods and applications to domain decomposition and an efficient implementation of the spectral partitioning algorithm on connection machine systems.
The proceedings contain 30 papers. The topics discussed include: worldwide auto-mobi: arduino IoT home automation system for IR devices;cryptosystems used in IoT- current status and challenges;solid angle polynomials ...
ISBN:
(纸本)9781538629550
The proceedings contain 30 papers. The topics discussed include: worldwide auto-mobi: arduino IoT home automation system for IR devices;cryptosystems used in IoT- current status and challenges;solid angle polynomials and its applications in geometric combinatory;intelligent Internet of things for energy conservation based on routing protocol;effective fingerprint recognition approach based on double fingerprint thumb;enhancing 3D-playfair algorithm to support all the existing characters and increase the resistance to brute force and frequency analysis attacks;and classification and discrimination of focal and non-focal EEG signals based on deep neural network.
The proceedings contain 55 papers. The topics discussed include: a deep unsupervised representation learning approach for effective cyber-physical attack detection and identification on highly imbalanced data;a fog co...
The proceedings contain 55 papers. The topics discussed include: a deep unsupervised representation learning approach for effective cyber-physical attack detection and identification on highly imbalanced data;a fog computing framework for autonomous driving assist: architecture, experiments, and challenges;a multi-dimensional quality analysis of android applications;a semi-automated framework for migrating web applications from SQL to document oriented NoSQL database;a survey of utilizing user-reviews posted on Google play store;behind the scenes: developers’ perception of multi-language practices;classification of histopathological biopsy images using ensemble of deep learning networks;comparison of block-based and hybrid-based programming environments in transferring programming skills to text-based environment;detection of feature interaction in dynamic scripting languages;and framework, model and tool use in higher education enterprise architecture: an international survey.
PES College of Engineering is organizing an internationalconference on Emerging research in Electronics, computerscience and Technology (ICERECT-12) in Mandya and merging the event with Golden Jubilee of the Institu...
ISBN:
(纸本)9788132228905
PES College of Engineering is organizing an internationalconference on Emerging research in Electronics, computerscience and Technology (ICERECT-12) in Mandya and merging the event with Golden Jubilee of the Institute. The Proceedings of the conference presents high quality, peer reviewed articles from the field of Electronics, computerscience and Technology. The book is a compilation of research papers from the cutting-edge technologies and it is targeted towards the scientific community actively involved in research activities.
The proceedings contain 159 papers. The topics discussed include: the existence of analytic solutions of a functional differential equation with state dependent argument;design and analysis of a sun tracking system;re...
ISBN:
(纸本)9783642214103
The proceedings contain 159 papers. The topics discussed include: the existence of analytic solutions of a functional differential equation with state dependent argument;design and analysis of a sun tracking system;research and understanding to grid's architecture;a novel compensation strategy for dynamic sag corrector;a brief study on resource management of self-study center based on web;empirical research on yield curve of china bond market;a new multi-scale texture analysis with structural texel;illumination invariant texture classification with pattern co-occurrence matrix;research on algorithm of image segmentation based on color features;a new web services filtrating mechanism with latent semantic analysis;vulnerability assessment methods - a review;collaborative polling scheme to detect and isolate the colluding packet droppers in mobile ad hoc networks;and design of secure chaotic hash function based on logistic and tent maps.
The proceedings contain 159 papers. The topics discussed include: the existence of analytic solutions of a functional differential equation with state dependent argument;design and analysis of a sun tracking system;re...
ISBN:
(纸本)9783642214011
The proceedings contain 159 papers. The topics discussed include: the existence of analytic solutions of a functional differential equation with state dependent argument;design and analysis of a sun tracking system;research and understanding to grid's architecture;a novel compensation strategy for dynamic sag corrector;a brief study on resource management of self-study center based on web;empirical research on yield curve of china bond market;a new multi-scale texture analysis with structural texel;illumination invariant texture classification with pattern co-occurrence matrix;research on algorithm of image segmentation based on color features;a new web services filtrating mechanism with latent semantic analysis;vulnerability assessment methods - a review;collaborative polling scheme to detect and isolate the colluding packet droppers in mobile ad hoc networks;and design of secure chaotic hash function based on logistic and tent maps.
暂无评论