International Conference of Reliable Information and Communication Technology最新文献

筛选
英文 中文
Aedes Entomological Prediction Analytical Dashboard Application for Dengue Outbreak Surveillance 伊蚊昆虫学预测分析仪表板在登革热疫情监测中的应用
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_6
Y. Tan, Noraini Ibrahim, S. A. Halim
{"title":"Aedes Entomological Prediction Analytical Dashboard Application for Dengue Outbreak Surveillance","authors":"Y. Tan, Noraini Ibrahim, S. A. Halim","doi":"10.1007/978-3-030-33582-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_6","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124291595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on Misclassification in Existing Contraction of Fuzzy Min-Max Models 现有模糊最小-最大模型收缩中的误分类分析
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_26
Essam Alhroob, Mohammed Falah Mohammed, Osama Nayel Al Sayaydeh, Fadhl Hujainah, N. A. Ghani
{"title":"Analysis on Misclassification in Existing Contraction of Fuzzy Min-Max Models","authors":"Essam Alhroob, Mohammed Falah Mohammed, Osama Nayel Al Sayaydeh, Fadhl Hujainah, N. A. Ghani","doi":"10.1007/978-3-030-33582-3_26","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_26","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125113326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection 基于增强报文头异常检测的正常配置文件更新方法
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_69
Walid Mohamed Alsharafi, M. N. Omar, N. A. Al-Majmar, Yousef Fazea
{"title":"Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection","authors":"Walid Mohamed Alsharafi, M. N. Omar, N. A. Al-Majmar, Yousef Fazea","doi":"10.1007/978-3-030-33582-3_69","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_69","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125255155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Determinants of Users' Intention to Use IoT: A Conceptual Framework 用户使用物联网意图的决定因素:一个概念框架
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_92
Nura Muhammad Baba, A. S. Baharudin
{"title":"Determinants of Users' Intention to Use IoT: A Conceptual Framework","authors":"Nura Muhammad Baba, A. S. Baharudin","doi":"10.1007/978-3-030-33582-3_92","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_92","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130318348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traditional Versus Decentralized Access Control for Internet of Things (IoT): Survey 物联网(IoT)的传统与分散访问控制:调查
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_46
M. Saghir, Bassam Ahmed H. Abu Al Khair, Jameel Hamodi, Nibras Abdullah
{"title":"Traditional Versus Decentralized Access Control for Internet of Things (IoT): Survey","authors":"M. Saghir, Bassam Ahmed H. Abu Al Khair, Jameel Hamodi, Nibras Abdullah","doi":"10.1007/978-3-030-33582-3_46","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_46","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Load Balancing Approach of Protection in Datacenters: A Narrative Review 数据中心负载均衡保护方法述评
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_109
L. P. Pratama, S. N. Saud, R. Ekawati, M. Manfaluthy
{"title":"Load Balancing Approach of Protection in Datacenters: A Narrative Review","authors":"L. P. Pratama, S. N. Saud, R. Ekawati, M. Manfaluthy","doi":"10.1007/978-3-030-33582-3_109","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_109","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Email: Could We Get Rid of It? A Review on Solutions to Combat Phishing Emails 网络钓鱼邮件:我们能摆脱它吗?打击网络钓鱼邮件的解决方案综述
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_80
G. Ali
{"title":"Phishing Email: Could We Get Rid of It? A Review on Solutions to Combat Phishing Emails","authors":"G. Ali","doi":"10.1007/978-3-030-33582-3_80","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_80","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Imperative Selection Intensity of Parent Selection Operator in Evolutionary Algorithm Hybridization for Nurse Scheduling Problem 进化算法杂交中亲本选择算子的命令式选择强度
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_23
Huai Tein Lim, I. Yong, P. Ng
{"title":"Imperative Selection Intensity of Parent Selection Operator in Evolutionary Algorithm Hybridization for Nurse Scheduling Problem","authors":"Huai Tein Lim, I. Yong, P. Ng","doi":"10.1007/978-3-030-33582-3_23","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_23","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124166478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malaysian Health Centers' Intention to Use an SMS-Based Vaccination Reminder and Management System: A Conceptual Model 马来西亚卫生中心打算使用基于短信的疫苗接种提醒和管理系统:概念模型
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_90
K. Karkonasasi, Y. Cheah, S. Mousavi, A. S. Baharudin
{"title":"Malaysian Health Centers' Intention to Use an SMS-Based Vaccination Reminder and Management System: A Conceptual Model","authors":"K. Karkonasasi, Y. Cheah, S. Mousavi, A. S. Baharudin","doi":"10.1007/978-3-030-33582-3_90","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_90","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124143425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Jaya Algorithm-Based Strategy for T-Way Test Suite Generation 基于改进Jaya算法的T-Way测试套件生成策略
International Conference of Reliable Information and Communication Technology Pub Date : 2019-09-22 DOI: 10.1007/978-3-030-33582-3_34
Abdullah B. Nasser, Fadhl Hujainah, Abdulrahman A. Alsewari, K. Z. Zamli
{"title":"An Improved Jaya Algorithm-Based Strategy for T-Way Test Suite Generation","authors":"Abdullah B. Nasser, Fadhl Hujainah, Abdulrahman A. Alsewari, K. Z. Zamli","doi":"10.1007/978-3-030-33582-3_34","DOIUrl":"https://doi.org/10.1007/978-3-030-33582-3_34","url":null,"abstract":"","PeriodicalId":448355,"journal":{"name":"International Conference of Reliable Information and Communication Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信