Computing Science, Communication and Security最新文献

筛选
英文 中文
Demystifying Computational Techniques Used to Diagnose Tuberculosis 揭秘用于诊断肺结核的计算技术
Computing Science, Communication and Security Pub Date : 2020-03-26 DOI: 10.1007/978-981-15-6648-6_5
Dhruvi J. Ka Patel, Mosin I. Hasan, Narendar M. Patel
{"title":"Demystifying Computational Techniques Used to Diagnose Tuberculosis","authors":"Dhruvi J. Ka Patel, Mosin I. Hasan, Narendar M. Patel","doi":"10.1007/978-981-15-6648-6_5","DOIUrl":"https://doi.org/10.1007/978-981-15-6648-6_5","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"15 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133169979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Recurrent Neural Network with Tanimoto Similarity and MKSIFT Features for Medical Image Search and Retrieval 基于谷本相似度和MKSIFT特征的深度递归神经网络医学图像搜索与检索
Computing Science, Communication and Security Pub Date : 2020-03-26 DOI: 10.1007/978-981-15-6648-6_4
Hardik H. Bhatt, A. Mankodia
{"title":"Deep Recurrent Neural Network with Tanimoto Similarity and MKSIFT Features for Medical Image Search and Retrieval","authors":"Hardik H. Bhatt, A. Mankodia","doi":"10.1007/978-981-15-6648-6_4","DOIUrl":"https://doi.org/10.1007/978-981-15-6648-6_4","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134340544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Complexity of Quick Sort 优化快速排序的复杂度
Computing Science, Communication and Security Pub Date : 2020-03-26 DOI: 10.1007/978-981-15-6648-6_26
Md. Sabir Hossain, Snaholata Mondal, Rahma Ali, Mohd. Hasan
{"title":"Optimizing Complexity of Quick Sort","authors":"Md. Sabir Hossain, Snaholata Mondal, Rahma Ali, Mohd. Hasan","doi":"10.1007/978-981-15-6648-6_26","DOIUrl":"https://doi.org/10.1007/978-981-15-6648-6_26","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
RETRACTED CHAPTER: Design of a Network with VANET Sporadic Cloud Computing Applied to Traffic Accident Prevention 摘要:VANET零星云计算在交通事故预防中的应用
Computing Science, Communication and Security Pub Date : 2020-03-26 DOI: 10.1007/978-981-15-6648-6_17
A. Viloria, Omar Bonerge Pineda Lezama, Noel Varela, Jorge Luis Díaz Martinez
{"title":"RETRACTED CHAPTER: Design of a Network with VANET Sporadic Cloud Computing Applied to Traffic Accident Prevention","authors":"A. Viloria, Omar Bonerge Pineda Lezama, Noel Varela, Jorge Luis Díaz Martinez","doi":"10.1007/978-981-15-6648-6_17","DOIUrl":"https://doi.org/10.1007/978-981-15-6648-6_17","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121692141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTED CHAPTER: Management System for Optimizing Public Transport Networks: GPS Record 缩回章:优化公共交通网络的管理系统:GPS记录
Computing Science, Communication and Security Pub Date : 2020-03-26 DOI: 10.1007/978-981-15-6648-6_18
Jesús Silva, Noel Varela, Erick Guerra Aleman, Omar Bonerge Pineda Lezama
{"title":"RETRACTED CHAPTER: Management System for Optimizing Public Transport Networks: GPS Record","authors":"Jesús Silva, Noel Varela, Erick Guerra Aleman, Omar Bonerge Pineda Lezama","doi":"10.1007/978-981-15-6648-6_18","DOIUrl":"https://doi.org/10.1007/978-981-15-6648-6_18","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121432418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications of Classical and Deep Learning Techniques for Polar Bear Detection and Recognition from Aero Photography 经典和深度学习技术在航空摄影北极熊检测和识别中的应用
Computing Science, Communication and Security Pub Date : 2020-03-26 DOI: 10.1007/978-981-15-6648-6_1
Mikhail A. Nakhatovich, Ilya Y. Surikov, V. Chernook, Natalia Chernook, Daniil A. Savchuk
{"title":"Applications of Classical and Deep Learning Techniques for Polar Bear Detection and Recognition from Aero Photography","authors":"Mikhail A. Nakhatovich, Ilya Y. Surikov, V. Chernook, Natalia Chernook, Daniil A. Savchuk","doi":"10.1007/978-981-15-6648-6_1","DOIUrl":"https://doi.org/10.1007/978-981-15-6648-6_1","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131289410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Rule-Based Expert System to Assess Coronary Artery Disease Under Uncertainty 不确定条件下基于规则的冠状动脉疾病评估专家系统
Computing Science, Communication and Security Pub Date : 2020-03-16 DOI: 10.1007/978-981-15-6648-6_12
Sohrab Hossain, Dhiman Sarma, R. Chakma, Wahidul Alam, M. M. Hoque, Iqbal H. Sarker
{"title":"A Rule-Based Expert System to Assess Coronary Artery Disease Under Uncertainty","authors":"Sohrab Hossain, Dhiman Sarma, R. Chakma, Wahidul Alam, M. M. Hoque, Iqbal H. Sarker","doi":"10.1007/978-981-15-6648-6_12","DOIUrl":"https://doi.org/10.1007/978-981-15-6648-6_12","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122259266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Crime Prediction Using Spatio-Temporal Data 基于时空数据的犯罪预测
Computing Science, Communication and Security Pub Date : 2020-03-11 DOI: 10.1007/978-981-15-6648-6_22
Sohrab Hossain, Ahmed Abtahee, Imran Kashem, M. M. Hoque, Iqbal H. Sarker
{"title":"Crime Prediction Using Spatio-Temporal Data","authors":"Sohrab Hossain, Ahmed Abtahee, Imran Kashem, M. M. Hoque, Iqbal H. Sarker","doi":"10.1007/978-981-15-6648-6_22","DOIUrl":"https://doi.org/10.1007/978-981-15-6648-6_22","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Computing Science, Communication and Security: 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6–7, 2023, Revised Selected Papers 计算科学,通信与安全:第四届国际会议,COMS2 2023, Mehsana, Gujarat,印度,2023年2月6-7日,修订论文选集
Computing Science, Communication and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-40564-8
{"title":"Computing Science, Communication and Security: 4th International Conference, COMS2 2023, Mehsana, Gujarat, India, February 6–7, 2023, Revised Selected Papers","authors":"","doi":"10.1007/978-3-031-40564-8","DOIUrl":"https://doi.org/10.1007/978-3-031-40564-8","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"15 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126015449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing Science, Communication and Security: Third International Conference, COMS2 2022, Gujarat, India, February 6–7, 2022, Revised Selected Papers 计算科学,通信和安全:第三届国际会议,COMS2 2022,印度古吉拉特邦,2022年2月6-7日,修订论文选集
Computing Science, Communication and Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-10551-7
{"title":"Computing Science, Communication and Security: Third International Conference, COMS2 2022, Gujarat, India, February 6–7, 2022, Revised Selected Papers","authors":"","doi":"10.1007/978-3-031-10551-7","DOIUrl":"https://doi.org/10.1007/978-3-031-10551-7","url":null,"abstract":"","PeriodicalId":320265,"journal":{"name":"Computing Science, Communication and Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信