International Doctoral Symposium on Applied Computation and Security Systems最新文献

筛选
英文 中文
An Algorithm to Solve 3D Guard Zone Computation Problem 一种求解三维警戒区域计算问题的算法
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-81-322-2653-6_18
Ranjan Mehera, Piyali Datta, Arpan Chakraborty, R. Pal
{"title":"An Algorithm to Solve 3D Guard Zone Computation Problem","authors":"Ranjan Mehera, Piyali Datta, Arpan Chakraborty, R. Pal","doi":"10.1007/978-81-322-2653-6_18","DOIUrl":"https://doi.org/10.1007/978-81-322-2653-6_18","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ambient Monitoring in Smart Home for Independent Living 独立生活智能家居中的环境监测
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-13-3702-4_4
R. Kavitha, S. Binu
{"title":"Ambient Monitoring in Smart Home for Independent Living","authors":"R. Kavitha, S. Binu","doi":"10.1007/978-981-13-3702-4_4","DOIUrl":"https://doi.org/10.1007/978-981-13-3702-4_4","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130834327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Application of Block Chain in Examination System, A Case Study 区块链技术在考试系统中的应用,案例研究
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-15-5747-7_8
A. Samanta, B. Sarkar
{"title":"An Application of Block Chain in Examination System, A Case Study","authors":"A. Samanta, B. Sarkar","doi":"10.1007/978-981-15-5747-7_8","DOIUrl":"https://doi.org/10.1007/978-981-15-5747-7_8","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS Enhancement in WBAN with Twin Coordinators 双协调器增强WBAN的QoS
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-15-5747-7_6
S. Adhikary, B. Ghosh, S. Choudhury
{"title":"QoS Enhancement in WBAN with Twin Coordinators","authors":"S. Adhikary, B. Ghosh, S. Choudhury","doi":"10.1007/978-981-15-5747-7_6","DOIUrl":"https://doi.org/10.1007/978-981-15-5747-7_6","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VQ/GMM-Based Speaker Identification with Emphasis on Language Dependency 基于VQ/ gmm的说话人识别:强调语言依赖
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-13-3702-4_8
Bidhan Barai, D. Das, N. Das, Subhadip Basu, M. Nasipuri
{"title":"VQ/GMM-Based Speaker Identification with Emphasis on Language Dependency","authors":"Bidhan Barai, D. Das, N. Das, Subhadip Basu, M. Nasipuri","doi":"10.1007/978-981-13-3702-4_8","DOIUrl":"https://doi.org/10.1007/978-981-13-3702-4_8","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128161969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An ESOP-Based Reversible Circuit Synthesis Flow Using Simulated Annealing 基于esop的可逆电路模拟退火合成流程
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-81-322-1988-0_8
K. Datta, Alhaad Gokhale, I. Sengupta, H. Rahaman
{"title":"An ESOP-Based Reversible Circuit Synthesis Flow Using Simulated Annealing","authors":"K. Datta, Alhaad Gokhale, I. Sengupta, H. Rahaman","doi":"10.1007/978-81-322-1988-0_8","DOIUrl":"https://doi.org/10.1007/978-81-322-1988-0_8","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Heuristic Framework for Priority Based Nurse Scheduling 基于优先级的护士调度启发式框架
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-10-3409-1_1
Paramita Sarkar, R. Chaki, Ditipriya Sinha
{"title":"A Heuristic Framework for Priority Based Nurse Scheduling","authors":"Paramita Sarkar, R. Chaki, Ditipriya Sinha","doi":"10.1007/978-981-10-3409-1_1","DOIUrl":"https://doi.org/10.1007/978-981-10-3409-1_1","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Eavesdropping in QKD with Qutrit Photon States 量子比特光子态量子密钥传输中的窃听分析
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-10-3409-1_11
Supriyo Banerjee, B. Maiti, Banani Saha
{"title":"Analysis of Eavesdropping in QKD with Qutrit Photon States","authors":"Supriyo Banerjee, B. Maiti, Banani Saha","doi":"10.1007/978-981-10-3409-1_11","DOIUrl":"https://doi.org/10.1007/978-981-10-3409-1_11","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach to Human Recognition Based on Finger Geometry 基于手指几何的人体识别新方法
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-13-8969-6_4
Maciej Szymkowski, K. Saeed
{"title":"A Novel Approach to Human Recognition Based on Finger Geometry","authors":"Maciej Szymkowski, K. Saeed","doi":"10.1007/978-981-13-8969-6_4","DOIUrl":"https://doi.org/10.1007/978-981-13-8969-6_4","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127284718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, ACSS 2018, Kolkata, India, February 9-11, 2018 高级计算与安全系统-卷7,第五届应用计算与安全系统国际博士研讨会,ACSS 2018,印度加尔各答,2018年2月9-11日
International Doctoral Symposium on Applied Computation and Security Systems Pub Date : 1900-01-01 DOI: 10.1007/978-981-13-3250-0
{"title":"Advanced Computing and Systems for Security - Volume 7, 5th International Doctoral Symposium on Applied Computation and Security Systems, ACSS 2018, Kolkata, India, February 9-11, 2018","authors":"","doi":"10.1007/978-981-13-3250-0","DOIUrl":"https://doi.org/10.1007/978-981-13-3250-0","url":null,"abstract":"","PeriodicalId":135080,"journal":{"name":"International Doctoral Symposium on Applied Computation and Security Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信