International Conference on Advances in Computing and Information Technology最新文献

筛选
英文 中文
Linguistic Conversion of Syntactic to Semantic Web Page 句法到语义网页的语言转换
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31552-7_22
G. Nagarajan, K. Thyagarajan
{"title":"Linguistic Conversion of Syntactic to Semantic Web Page","authors":"G. Nagarajan, K. Thyagarajan","doi":"10.1007/978-3-642-31552-7_22","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_22","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122350706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modified Difference Expansion for Reversible Watermarking Using Fuzzy Logic Based Distortion Control 基于模糊逻辑失真控制的可逆水印改进差分展开
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31552-7_89
H. Maity, S. Maity, Debashis Maity
{"title":"Modified Difference Expansion for Reversible Watermarking Using Fuzzy Logic Based Distortion Control","authors":"H. Maity, S. Maity, Debashis Maity","doi":"10.1007/978-3-642-31552-7_89","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_89","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122605975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis on Impact of Behavioral Modeling in Performance of Synthesis Process 行为建模对综合工艺性能的影响分析
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31600-5_58
R. Uma, D. Ponnurangam
{"title":"Analysis on Impact of Behavioral Modeling in Performance of Synthesis Process","authors":"R. Uma, D. Ponnurangam","doi":"10.1007/978-3-642-31600-5_58","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_58","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114416361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Iterative Image Fusion Using Fuzzy Logic with Applications 基于模糊逻辑的迭代图像融合及其应用
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31552-7_16
Srinivasa Rao Dammavalam, S. Maddala, M. K. Prasad
{"title":"Iterative Image Fusion Using Fuzzy Logic with Applications","authors":"Srinivasa Rao Dammavalam, S. Maddala, M. K. Prasad","doi":"10.1007/978-3-642-31552-7_16","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_16","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128797046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Cryptographic Approach towards Black Hole Attack Detection 黑洞攻击检测的加密方法
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31513-8_28
Pratima Sarkar, R. Chaki
{"title":"A Cryptographic Approach towards Black Hole Attack Detection","authors":"Pratima Sarkar, R. Chaki","doi":"10.1007/978-3-642-31513-8_28","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_28","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128557651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Personalised High Quality Search with in a Web Site: No User Profiling 个性化的高质量搜索与网站:没有用户分析
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31513-8_32
L. K. J. Grace, V. Maheswari, D. Nagamalai
{"title":"Personalised High Quality Search with in a Web Site: No User Profiling","authors":"L. K. J. Grace, V. Maheswari, D. Nagamalai","doi":"10.1007/978-3-642-31513-8_32","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_32","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"39 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120902989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on Off-Line Signature Verification Techniques for Reducing Forgeries/Fraud 减少伪造/欺诈的离线签名验证技术综述
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31600-5_16
Natasha Sharma, Munish Kumar
{"title":"Review on Off-Line Signature Verification Techniques for Reducing Forgeries/Fraud","authors":"Natasha Sharma, Munish Kumar","doi":"10.1007/978-3-642-31600-5_16","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_16","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114370982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services 基于安全服务级别协议的云服务访问认证授权模型
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31513-8_73
D. Bajpai, M. Vardhan, S. Gupta, Ravinder Kumar, D. S. Kushwaha
{"title":"Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services","authors":"D. Bajpai, M. Vardhan, S. Gupta, Ravinder Kumar, D. S. Kushwaha","doi":"10.1007/978-3-642-31513-8_73","DOIUrl":"https://doi.org/10.1007/978-3-642-31513-8_73","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116209239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Discovering Dispathcing Rules for Job Shop Schdeuling Using Data Mining 基于数据挖掘的作业车间调度规则研究
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31600-5_7
R. Balasundaram, N. Baskar, R. Sankar
{"title":"Discovering Dispathcing Rules for Job Shop Schdeuling Using Data Mining","authors":"R. Balasundaram, N. Baskar, R. Sankar","doi":"10.1007/978-3-642-31600-5_7","DOIUrl":"https://doi.org/10.1007/978-3-642-31600-5_7","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126416780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two-Stage Rejection Algorithm to Reduce Search Space for Character Recognition in OCR 减少OCR字符识别搜索空间的两阶段拒绝算法
International Conference on Advances in Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-31552-7_23
Srivardhini Mandipati, Gottumukkala Asisha, S. Raj, S. Chitrakala
{"title":"Two-Stage Rejection Algorithm to Reduce Search Space for Character Recognition in OCR","authors":"Srivardhini Mandipati, Gottumukkala Asisha, S. Raj, S. Chitrakala","doi":"10.1007/978-3-642-31552-7_23","DOIUrl":"https://doi.org/10.1007/978-3-642-31552-7_23","url":null,"abstract":"","PeriodicalId":202756,"journal":{"name":"International Conference on Advances in Computing and Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132435353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信