Zobrazeno 1 - 10
of 354
pro vyhledávání: '"Wei-Pang Yang"'
Publikováno v:
IET Networks, Vol 9, Iss 6, Pp 338-347 (2020)
In recent years, hazardous e‐mails arose, such as the e‐mails infected with ‘viruses’ or ‘worms’ spreading destructive programs and the ‘Phishing Mails’ defrauding e‐mail accounts of the users. The number of spams continue to grow.
Externí odkaz:
https://doaj.org/article/c049c03e45034730ba83d3814ca1a60d
Publikováno v:
International Journal of Environmental Research and Public Health
Volume 16
Issue 20
International Journal of Environmental Research and Public Health, Vol 16, Iss 20, p 3988 (2019)
Volume 16
Issue 20
International Journal of Environmental Research and Public Health, Vol 16, Iss 20, p 3988 (2019)
This study explored the effects of information technology (IT) resources&mdash
in conjunction with IT infrastructure and organizational resources&mdash
on organizational capabilities and performance. The study further analyzed the mediating
in conjunction with IT infrastructure and organizational resources&mdash
on organizational capabilities and performance. The study further analyzed the mediating
Publikováno v:
Information & Security; 2004, Vol. 15 Issue 1, p110-114, 5p
Publikováno v:
International Journal of Engineering and Industries. 3:75-83
Publikováno v:
Computers & Mathematics with Applications. 64:1364-1375
A layer-based method for rapid software development is presented in this paper. It follows the guidelines suggested by Extreme Programming (XP) that require highly expressive programming languages (i.e., Java) and CASE tools. As in XP, this method ad
Publikováno v:
Informatica. 23:537-562
Hwang et al. proposed an ElGamal-like scheme for encrypting large messages, which is more efficient than its predecessor in terms of computational complexity and the amount of data transformation. They declared that the resulting scheme is semantical
Publikováno v:
Information Sciences. 181:217-226
Three-party password authenticated key exchange (3PAKE) protocols allow two users (clients) to establish a session key through an authentication server over an insecure channel. Clients only share an easy-to-remember password with the trusted server.
Publikováno v:
Expert Systems with Applications. 36:1164-1178
In a database, the concept of an example might change along with time, which is known as concept drift. When the concept drift occurs, the classification model built by using the old dataset is not suitable for predicting a new dataset. Therefore, th
Publikováno v:
Expert Systems with Applications. 35:1451-1462
Sentence extraction is a widely adopted text summarization technique where the most important sentences are extracted from document(s) and presented as a summary. The first step towards sentence extraction is to rank sentences in order of importance
Publikováno v:
Expert Systems with Applications. 34:2290-2297
This paper aims to cluster Chinese patent documents with the structures. Both the explicit and implicit structures are analyzed to represent by the proposed structure expression. Accordingly, an unsupervised clustering algorithm called structured sel