音乐会 发表于 2025-3-30 09:19:47

Book 2015m cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security

战役 发表于 2025-3-30 15:34:45

http://reply.papertrans.cn/16/1597/159683/159683_52.png

情感脆弱 发表于 2025-3-30 20:16:23

Feature Selection using Particle Swarm Optimization for Thermal Face Recognitionnal feature extracted for better classification convergence. Finally, minimum distance classifier is used to find the class label of each testing images. Minimum distance classifier acts as an objective function for PSO. In this work, all the experiments have been performed on UGC-JU thermal face da

HEED 发表于 2025-3-30 21:24:51

Flexible Cloud Architecture for Healthcare Applicationsvices has been proposed specifically for healthcare applications, which is capable of semi-structured healthcare data management and storing compatible with Health Level Seven (HL7) standard (Hennessy et al. in A framework and ontology for mobile sensor platforms in home health management, 2013; Liu
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Applied Computation and Security Systems; Volume One Rituparna Chaki,Khalid Saeed,Nabendu Chaki Book 2015 Springer India 2015 Biometrics-ba