Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Hoai-Bac Le"'
Publikováno v:
Logic Journal of the IGPL. 28:19-32
Discovering high-utility itemsets (HUIs) consists of finding sets of items that yield a high profit in customer transaction databases. An important limitation of traditional high-utility itemset mining (HUIM) is that only the utility measure is used
Publikováno v:
RIVF
Automatic Chatbot is a developing trend in the world because of its convenience, efficiency, applicability in many fields such as E-commerce, customer care, and so on. Through Chatbot, we can cut down human resources at the place that Chatbot can rep
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
SoICT
On the days that surface is covered by thick clouds, the acquired images from optical satellites usually suffer missing information, caused to not able to use because we can't see anything under cloudy cover. Many methods have been proposed in order
Publikováno v:
WIREs Data Mining and Knowledge Discovery. 7
Itemset mining is an important subfield of data mining, which consists of discovering interesting and useful patterns in transaction databases. The traditional task of frequent itemset mining is to discover groups of items (itemsets) that appear freq
This book includes the extended and revised versions of a set of selected papers from the First NAFOSTED Conference on Information and Computer Science (NICS'2014), held at Le Quy Don Technical Academy, Hanoi, Vietnam from 13/Mar./2014 to 14/Mar./201
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319320335
HAIS
HAIS
Mining high-utility itemsets (HUIs) is the task of finding the sets of items that yield a high profit in customer transaction databases. An important limitation of traditional high-utility itemset mining is that only the utility measure is used for a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ecdbe081f1ba904570022399512b4c94
https://doi.org/10.1007/978-3-319-32034-2_5
https://doi.org/10.1007/978-3-319-32034-2_5
Publikováno v:
Digital Signal Processing. 21:734-745
Many secret sharing schemes for digital images have been developed in recent decades. Traditional schemes typically must deal with the problem of computational complexity, and other visual secret sharing schemes come with a higher transmission cost a
Publikováno v:
IEEE Transactions on Information Forensics and Security. 4:790-801
In this paper, we propose a novel scheme called a self-verifying visual secret sharing scheme, which can be applied to both grayscale and color images. This scheme uses two halftone images. The first, considered to be the host image, is created by di
Publikováno v:
Pattern Recognition. 42:3097-3114
In this paper, we propose a novel (2,2) verifiable secret sharing (VSS) scheme, which not only protects a secret image but also allows users to verify the restored secret image in the revealing and verifying phase, for all binary, grayscale and color