International Doctoral Symposium on Applied Computation and Security Systems最新文献

筛选
英文 中文
Heterogeneous Face Matching Using Robust Binary Pattern of Local Quotient: RBPLQ 基于鲁棒局部商二值模式的异质人脸匹配:RBPLQ
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-13-3702-4_10
Hiranmoy Roy, D. Bhattacharjee
{"title":"Heterogeneous Face Matching Using Robust Binary Pattern of Local Quotient: RBPLQ","authors":"Hiranmoy Roy, D. Bhattacharjee","doi":"10.1007/978-981-13-3702-4_10","DOIUrl":"https://doi.org/10.1007/978-981-13-3702-4_10","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"36 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Byte Label Malware Classification Using Image Entropy 使用图像熵的字节标签恶意软件分类
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-13-3702-4_2
Ayan Dey, Sukriti Bhattacharya, N. Chaki
{"title":"Byte Label Malware Classification Using Image Entropy","authors":"Ayan Dey, Sukriti Bhattacharya, N. Chaki","doi":"10.1007/978-981-13-3702-4_2","DOIUrl":"https://doi.org/10.1007/978-981-13-3702-4_2","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Disaster Management System Using Vehicular Ad Hoc Networks 使用车载自组织网络的灾害管理系统
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-13-3702-4_6
Suparna DasGupta, S. Choudhury, R. Chaki
{"title":"Disaster Management System Using Vehicular Ad Hoc Networks","authors":"Suparna DasGupta, S. Choudhury, R. Chaki","doi":"10.1007/978-981-13-3702-4_6","DOIUrl":"https://doi.org/10.1007/978-981-13-3702-4_6","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124844745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic Cryptography 使用默克尔哈希树和混沌加密的物联网轻量级安全协议
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-13-8969-6_1
Nashreen Nesa, I. Banerjee
{"title":"A Lightweight Security Protocol for IoT Using Merkle Hash Tree and Chaotic Cryptography","authors":"Nashreen Nesa, I. Banerjee","doi":"10.1007/978-981-13-8969-6_1","DOIUrl":"https://doi.org/10.1007/978-981-13-8969-6_1","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Comprehensive Sudoku Instance Generator 一个全面的数独实例生成器
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-81-322-2653-6_15
A. K. Maji, Sunanda Jana, R. Pal
{"title":"A Comprehensive Sudoku Instance Generator","authors":"A. K. Maji, Sunanda Jana, R. Pal","doi":"10.1007/978-81-322-2653-6_15","DOIUrl":"https://doi.org/10.1007/978-81-322-2653-6_15","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132877407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Registration of Range Images Using a Novel Technique of Centroid Alignment 一种新型质心对准技术的距离图像配准
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-81-322-2653-6_6
P. Bagchi, D. Bhattacharjee, M. Nasipuri
{"title":"Registration of Range Images Using a Novel Technique of Centroid Alignment","authors":"P. Bagchi, D. Bhattacharjee, M. Nasipuri","doi":"10.1007/978-81-322-2653-6_6","DOIUrl":"https://doi.org/10.1007/978-81-322-2653-6_6","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"AES-12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126526441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flexible Cloud Architecture for Healthcare Applications 用于医疗保健应用程序的灵活云架构
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-81-322-1985-9_8
A. K. Mandal, A. Sarkar, N. Chaki
{"title":"Flexible Cloud Architecture for Healthcare Applications","authors":"A. K. Mandal, A. Sarkar, N. Chaki","doi":"10.1007/978-81-322-1985-9_8","DOIUrl":"https://doi.org/10.1007/978-81-322-1985-9_8","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121329488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A 2D Guard Zone Computation Algorithm for Reassignment of Subcircuits to Minimize the Overall Chip Area 一种用于子电路重新分配以最小化整个芯片面积的二维保护区域计算算法
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-81-322-1988-0_11
Ranjan Mehera, A. Chakrabarty, Piyali Datta, R. Pal
{"title":"A 2D Guard Zone Computation Algorithm for Reassignment of Subcircuits to Minimize the Overall Chip Area","authors":"Ranjan Mehera, A. Chakrabarty, Piyali Datta, R. Pal","doi":"10.1007/978-81-322-1988-0_11","DOIUrl":"https://doi.org/10.1007/978-81-322-1988-0_11","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122669714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network 基于小波变换和前馈神经网络的糖尿病视网膜病变检测
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-81-322-2650-5_7
M. Saha, M. K. Naskar, B. N. Chatterji
{"title":"Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network","authors":"M. Saha, M. K. Naskar, B. N. Chatterji","doi":"10.1007/978-81-322-2650-5_7","DOIUrl":"https://doi.org/10.1007/978-81-322-2650-5_7","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software Energy Estimation to Improve Power Efficiency of Embedded System 提高嵌入式系统能效的软件能量估计
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-10-3391-9_5
Nachiketa Chatterjee, S. Biswas, P. Das
{"title":"Software Energy Estimation to Improve Power Efficiency of Embedded System","authors":"Nachiketa Chatterjee, S. Biswas, P. Das","doi":"10.1007/978-981-10-3391-9_5","DOIUrl":"https://doi.org/10.1007/978-981-10-3391-9_5","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":"1970 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信