Koomesh最新文献

筛选
英文 中文
Conspectus siglorum et compendiorum
Koomesh Pub Date : 2019-11-06 DOI: 10.1524/9783110362442.157
Oliver Overwien
{"title":"Conspectus siglorum et compendiorum","authors":"Oliver Overwien","doi":"10.1524/9783110362442.157","DOIUrl":"https://doi.org/10.1524/9783110362442.157","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81102437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plutarco La virtù delle donne (Mulierum virtutes)
Koomesh Pub Date : 2019-11-06 DOI: 10.1163/9789004409750_010
{"title":"Plutarco La virtù delle donne (Mulierum virtutes)","authors":"","doi":"10.1163/9789004409750_010","DOIUrl":"https://doi.org/10.1163/9789004409750_010","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81099284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Editores et commentatores qui in apparatu citantur
Koomesh Pub Date : 2019-11-06 DOI: 10.1163/9789004409750_009
{"title":"Editores et commentatores qui in apparatu citantur","authors":"","doi":"10.1163/9789004409750_009","DOIUrl":"https://doi.org/10.1163/9789004409750_009","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72845934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Il titolo dell’opera 作品的标题
Koomesh Pub Date : 2019-11-06 DOI: 10.1163/9789004409750_004
{"title":"Il titolo dell’opera","authors":"","doi":"10.1163/9789004409750_004","DOIUrl":"https://doi.org/10.1163/9789004409750_004","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91384909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plutarco e le donne nel Mulierum Virtutes 普鲁塔克和处女座的女人
Koomesh Pub Date : 2019-11-06 DOI: 10.1163/9789004409750_006
{"title":"Plutarco e le donne nel Mulierum Virtutes","authors":"","doi":"10.1163/9789004409750_006","DOIUrl":"https://doi.org/10.1163/9789004409750_006","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83105823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Elucidation of Some Symptoms and the Response to Them: Second Hebrew Translation (Anonymous) 论某些症状的阐释及其回应:希伯来语第二译本(佚名)
Koomesh Pub Date : 2019-05-06 DOI: 10.1163/9789004398801_006
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: Second Hebrew Translation (Anonymous)","authors":"G. Bos","doi":"10.1163/9789004398801_006","DOIUrl":"https://doi.org/10.1163/9789004398801_006","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84123541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Elucidation of Some Symptoms and the Response to Them: Arabic Text with English Translation 论某些症状的阐释及其应对:阿拉伯文文本与英译
Koomesh Pub Date : 2019-05-06 DOI: 10.1163/9789004398801_004
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: Arabic Text with English Translation","authors":"G. Bos","doi":"10.1163/9789004398801_004","DOIUrl":"https://doi.org/10.1163/9789004398801_004","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84767212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Elucidation of Some Symptoms and the Response to Them: First Hebrew Translation (Anonymous) 论某些症状的阐释及其回应:希伯来语第一译本(佚名)
Koomesh Pub Date : 2019-05-06 DOI: 10.1163/9789004398801_005
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: First Hebrew Translation (Anonymous)","authors":"G. Bos","doi":"10.1163/9789004398801_005","DOIUrl":"https://doi.org/10.1163/9789004398801_005","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79096039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Android Malware Detection and Protection using Data Mining Algorithms 基于数据挖掘算法的Android恶意软件检测与防护研究综述
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653720
K. Uma, E. S. Blessie
{"title":"Survey on Android Malware Detection and Protection using Data Mining Algorithms","authors":"K. Uma, E. S. Blessie","doi":"10.1109/I-SMAC.2018.8653720","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653720","url":null,"abstract":"Mobile devices have become very popular these days due to its portability and high performance. Android occupies a majority share in the mobile market and it becomes trendy nowadays. The reason for user ignoring is that the installation and usage of apps. The user must have the concern about the security and the malicious attacks. Like every operating systems mobile devices are also prone to malware attacks. Several data mining algorithms are used in the malware detection based on the permissions enabled in each apps. This paper gives a n attempt to study about the performance of data mining algorithms such as Naive Bayes, J48, Multiclass Classifier, Random Tree, SVM, Decision Tree. Each and every algorithm is assessed by various criteria to identify which one is suitable to detect malicious software. The result is that Naive Bayes if far better than the other algorithms as of in time concern and also in detection process.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"25 1","pages":"209-212"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78229413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of digital image data hiding techniques 数字图像数据隐藏技术分析
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653794
J. Stephy, V. Subramaniyaswamy
{"title":"Analysis of digital image data hiding techniques","authors":"J. Stephy, V. Subramaniyaswamy","doi":"10.1109/I-SMAC.2018.8653794","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653794","url":null,"abstract":"The technique which is used to conceal private image into a cover image is called data hiding techniques. Different techniques have been discovered for data hiding with its limitations and merits. Data hiding can be done in any form of information such as video, audio, text, and image. Based on the application type many techniques are used. One of the problems with sending data over networks is security. Protecting information during transfer of data is important. Data hiding provides security and authentication. Data hiding will not recover the original image whereas, Reversible Data Hiding restores the original cover image. Data hiding techniques are used for different approaches such as the robustness of the hiding process in a digital image, digital image security, and imperceptibility of the digital image. Data hiding techniques fulfill maximum requirements such as security, undetectability, imperceptibility, robustness etc which can be used in various applications.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"27 1","pages":"140-144"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80081965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信