首页 > 最新文献

Koomesh最新文献

英文 中文
Conspectus siglorum et compendiorum
Q3 Medicine Pub Date : 2019-11-06 DOI: 10.1524/9783110362442.157
Oliver Overwien
{"title":"Conspectus siglorum et compendiorum","authors":"Oliver Overwien","doi":"10.1524/9783110362442.157","DOIUrl":"https://doi.org/10.1524/9783110362442.157","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81102437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plutarco La virtù delle donne (Mulierum virtutes)
Q3 Medicine Pub Date : 2019-11-06 DOI: 10.1163/9789004409750_010
{"title":"Plutarco La virtù delle donne (Mulierum virtutes)","authors":"","doi":"10.1163/9789004409750_010","DOIUrl":"https://doi.org/10.1163/9789004409750_010","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81099284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Editores et commentatores qui in apparatu citantur
Q3 Medicine Pub Date : 2019-11-06 DOI: 10.1163/9789004409750_009
{"title":"Editores et commentatores qui in apparatu citantur","authors":"","doi":"10.1163/9789004409750_009","DOIUrl":"https://doi.org/10.1163/9789004409750_009","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72845934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Il titolo dell’opera 作品的标题
Q3 Medicine Pub Date : 2019-11-06 DOI: 10.1163/9789004409750_004
{"title":"Il titolo dell’opera","authors":"","doi":"10.1163/9789004409750_004","DOIUrl":"https://doi.org/10.1163/9789004409750_004","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91384909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plutarco e le donne nel Mulierum Virtutes 普鲁塔克和处女座的女人
Q3 Medicine Pub Date : 2019-11-06 DOI: 10.1163/9789004409750_006
{"title":"Plutarco e le donne nel Mulierum Virtutes","authors":"","doi":"10.1163/9789004409750_006","DOIUrl":"https://doi.org/10.1163/9789004409750_006","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83105823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Elucidation of Some Symptoms and the Response to Them: Second Hebrew Translation (Anonymous) 论某些症状的阐释及其回应:希伯来语第二译本(佚名)
Q3 Medicine Pub Date : 2019-05-06 DOI: 10.1163/9789004398801_006
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: Second Hebrew Translation (Anonymous)","authors":"G. Bos","doi":"10.1163/9789004398801_006","DOIUrl":"https://doi.org/10.1163/9789004398801_006","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84123541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Elucidation of Some Symptoms and the Response to Them: Arabic Text with English Translation 论某些症状的阐释及其应对:阿拉伯文文本与英译
Q3 Medicine Pub Date : 2019-05-06 DOI: 10.1163/9789004398801_004
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: Arabic Text with English Translation","authors":"G. Bos","doi":"10.1163/9789004398801_004","DOIUrl":"https://doi.org/10.1163/9789004398801_004","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84767212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Elucidation of Some Symptoms and the Response to Them: First Hebrew Translation (Anonymous) 论某些症状的阐释及其回应:希伯来语第一译本(佚名)
Q3 Medicine Pub Date : 2019-05-06 DOI: 10.1163/9789004398801_005
G. Bos
{"title":"On the Elucidation of Some Symptoms and the Response to Them: First Hebrew Translation (Anonymous)","authors":"G. Bos","doi":"10.1163/9789004398801_005","DOIUrl":"https://doi.org/10.1163/9789004398801_005","url":null,"abstract":"","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79096039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on Android Malware Detection and Protection using Data Mining Algorithms 基于数据挖掘算法的Android恶意软件检测与防护研究综述
Q3 Medicine Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653720
K. Uma, E. S. Blessie
Mobile devices have become very popular these days due to its portability and high performance. Android occupies a majority share in the mobile market and it becomes trendy nowadays. The reason for user ignoring is that the installation and usage of apps. The user must have the concern about the security and the malicious attacks. Like every operating systems mobile devices are also prone to malware attacks. Several data mining algorithms are used in the malware detection based on the permissions enabled in each apps. This paper gives a n attempt to study about the performance of data mining algorithms such as Naive Bayes, J48, Multiclass Classifier, Random Tree, SVM, Decision Tree. Each and every algorithm is assessed by various criteria to identify which one is suitable to detect malicious software. The result is that Naive Bayes if far better than the other algorithms as of in time concern and also in detection process.
移动设备由于其便携性和高性能而变得非常流行。Android在手机市场占有很大份额,成为时下的潮流。用户忽略的原因是应用程序的安装和使用。用户必须关注安全性和恶意攻击。与所有操作系统一样,移动设备也容易受到恶意软件的攻击。基于每个应用程序中启用的权限,在恶意软件检测中使用了几种数据挖掘算法。本文尝试对朴素贝叶斯、J48、多类分类器、随机树、支持向量机、决策树等数据挖掘算法的性能进行了研究。每一种算法都通过各种标准进行评估,以确定哪一种算法适合检测恶意软件。结果表明,无论是在时间关注上还是在检测过程上,朴素贝叶斯算法都远远优于其他算法。
{"title":"Survey on Android Malware Detection and Protection using Data Mining Algorithms","authors":"K. Uma, E. S. Blessie","doi":"10.1109/I-SMAC.2018.8653720","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653720","url":null,"abstract":"Mobile devices have become very popular these days due to its portability and high performance. Android occupies a majority share in the mobile market and it becomes trendy nowadays. The reason for user ignoring is that the installation and usage of apps. The user must have the concern about the security and the malicious attacks. Like every operating systems mobile devices are also prone to malware attacks. Several data mining algorithms are used in the malware detection based on the permissions enabled in each apps. This paper gives a n attempt to study about the performance of data mining algorithms such as Naive Bayes, J48, Multiclass Classifier, Random Tree, SVM, Decision Tree. Each and every algorithm is assessed by various criteria to identify which one is suitable to detect malicious software. The result is that Naive Bayes if far better than the other algorithms as of in time concern and also in detection process.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"25 1","pages":"209-212"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78229413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of digital image data hiding techniques 数字图像数据隐藏技术分析
Q3 Medicine Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653794
J. Stephy, V. Subramaniyaswamy
The technique which is used to conceal private image into a cover image is called data hiding techniques. Different techniques have been discovered for data hiding with its limitations and merits. Data hiding can be done in any form of information such as video, audio, text, and image. Based on the application type many techniques are used. One of the problems with sending data over networks is security. Protecting information during transfer of data is important. Data hiding provides security and authentication. Data hiding will not recover the original image whereas, Reversible Data Hiding restores the original cover image. Data hiding techniques are used for different approaches such as the robustness of the hiding process in a digital image, digital image security, and imperceptibility of the digital image. Data hiding techniques fulfill maximum requirements such as security, undetectability, imperceptibility, robustness etc which can be used in various applications.
将私有图像隐藏成封面图像的技术称为数据隐藏技术。不同的数据隐藏技术有其局限性和优点。可以对任何形式的信息(如视频、音频、文本和图像)进行数据隐藏。根据应用程序类型,使用了许多技术。通过网络发送数据的问题之一是安全性。在数据传输过程中保护信息非常重要。数据隐藏提供了安全性和身份验证。数据隐藏不会恢复原始图像,而可逆数据隐藏恢复原始封面图像。数据隐藏技术用于不同的方法,如数字图像中隐藏过程的鲁棒性、数字图像安全性和数字图像的不可感知性。数据隐藏技术满足了安全性、不可检测性、不可感知性、鲁棒性等最大要求,可用于各种应用。
{"title":"Analysis of digital image data hiding techniques","authors":"J. Stephy, V. Subramaniyaswamy","doi":"10.1109/I-SMAC.2018.8653794","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653794","url":null,"abstract":"The technique which is used to conceal private image into a cover image is called data hiding techniques. Different techniques have been discovered for data hiding with its limitations and merits. Data hiding can be done in any form of information such as video, audio, text, and image. Based on the application type many techniques are used. One of the problems with sending data over networks is security. Protecting information during transfer of data is important. Data hiding provides security and authentication. Data hiding will not recover the original image whereas, Reversible Data Hiding restores the original cover image. Data hiding techniques are used for different approaches such as the robustness of the hiding process in a digital image, digital image security, and imperceptibility of the digital image. Data hiding techniques fulfill maximum requirements such as security, undetectability, imperceptibility, robustness etc which can be used in various applications.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"27 1","pages":"140-144"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80081965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Koomesh
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1