派博傳思國際中心

標(biāo)題: Titlebook: Communication, Networks and Computing; Third International Ranjeet Singh Tomar,Shekhar Verma,Ramjee Prasad Conference proceedings 2023 The [打印本頁]

作者: 武士精神    時(shí)間: 2025-3-21 18:07
書目名稱Communication, Networks and Computing影響因子(影響力)




書目名稱Communication, Networks and Computing影響因子(影響力)學(xué)科排名




書目名稱Communication, Networks and Computing網(wǎng)絡(luò)公開度




書目名稱Communication, Networks and Computing網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Communication, Networks and Computing被引頻次




書目名稱Communication, Networks and Computing被引頻次學(xué)科排名




書目名稱Communication, Networks and Computing年度引用




書目名稱Communication, Networks and Computing年度引用學(xué)科排名




書目名稱Communication, Networks and Computing讀者反饋




書目名稱Communication, Networks and Computing讀者反饋學(xué)科排名





作者: paroxysm    時(shí)間: 2025-3-21 22:43

作者: Intercept    時(shí)間: 2025-3-22 00:51
Software in Workshops perfekt pr?sentierenT technology and solution of security issues using machine learning approach and a brief explanation of different attacks in IoT applications has been presented. This work covers issues related to securing data generated in different application area of IoT system such as IIoT (Internet of Things fo
作者: 土坯    時(shí)間: 2025-3-22 06:44

作者: 旁觀者    時(shí)間: 2025-3-22 11:08

作者: BLOT    時(shí)間: 2025-3-22 13:09

作者: BLOT    時(shí)間: 2025-3-22 20:27
An Analytic Assessment of Medical Applications of the Internet of Things (IoT) During Covid-19 and Ptial of IoT-based healthcare by theorizing about how it could improve people’s access to public health prevention programs and how it could reshape our current system of secondary and tertiary care to be more preventative, continuous, and coordinated. Finally, this paper will discuss some of the pot
作者: 搖曳    時(shí)間: 2025-3-23 00:59

作者: 閃光東本    時(shí)間: 2025-3-23 02:13

作者: 字形刻痕    時(shí)間: 2025-3-23 09:12

作者: Noctambulant    時(shí)間: 2025-3-23 11:52
COVID-19 Detection Using State-of-the-Art Deep Learning Models on X-Ray and CT Imagespatient reveals the existence of COVID-19. The performance measures used to evaluate these models are compared in this research. This research suggests that when compared to other models, the GDCNN model performs better. These findings suggest that the DarkCovidNet and DenseNet201-based TL models wo
作者: fibroblast    時(shí)間: 2025-3-23 15:39
Sniffit: A Packet Sniffing Tool Using Wiresharkall a new sniffer tool called sniffit and to introduce the protocols that are used to analyse packets. According to implementation results, the Sniffer tool builds a packet database that is encoded. Moreover, the front end shows the relevant data in response to user requests or needs.
作者: concert    時(shí)間: 2025-3-23 20:16

作者: 鴕鳥    時(shí)間: 2025-3-24 01:33

作者: aerobic    時(shí)間: 2025-3-24 05:18

作者: constellation    時(shí)間: 2025-3-24 09:12

作者: 富饒    時(shí)間: 2025-3-24 10:47

作者: 約會(huì)    時(shí)間: 2025-3-24 17:30
Methodologies to Classify Faults in Power Transmission Linesctrical power transmission lines in order to improve the efficiency of the system and avert catastrophic damage. A wide variety of methods are proposed in the technical literature for this goal. This survey paper examines different methodologies used to classify faults in an electrical power transmi
作者: ferment    時(shí)間: 2025-3-24 21:34
Recent Copy Move Forgery Detection Techniques: A Reviewthenticity and trustworthiness of digital images has become a challenging task. Thus, copy-move forgery detection (CMFD) has become one of the key domains in the current research field for the authentication of digital images. Copy-move forgery is the way of duplicating one area in an image over ano
作者: 溫順    時(shí)間: 2025-3-25 01:09
A Robust Graphical Authentication System for the Shoulder Surfing Attackser knows. Every security system is created in such a way that it must include at least one authentication technique to safeguard an individual’s identity. There are numerous authentication methods available today, but each method has its own advantages and drawbacks that allow attackers to carry ou
作者: meritorious    時(shí)間: 2025-3-25 06:53
Implications of Forensic Investigation in Dark Webes such as drug trafficking, money laundering, and cybercrime. Dark web forensics involves the collection, analysis, and preservation of digital evidence from the dark web, which presents several challenges such as anonymity, encryption, and the use of cryptocurrencies. This paper presents a compreh
作者: 量被毀壞    時(shí)間: 2025-3-25 09:51

作者: DUCE    時(shí)間: 2025-3-25 12:01
Prevention and Detection of Poisoning Attacks in Medical-Based Machine Learning Web Applications motives to change the outcomes of the models and applications generated by algorithms and techniques of machine learning. The project revolves around the detection and prevention of poisoning attacks on the medical models of machine learning by either an Anomaly detection method or cryptographicall
作者: 方便    時(shí)間: 2025-3-25 19:19

作者: 一致性    時(shí)間: 2025-3-25 21:06
Securing Internet of Things Using Machine Learning Techniques: A Systematic Reviewd the stationing of huge number associated smart and familiar appliances in evaluative system like industries, Agriculture, Healthcare, Transportation, Home automation and environment control. The data transmission over the network without necessitating of any human to human (H2H) or human to machin
作者: Tortuous    時(shí)間: 2025-3-26 00:27

作者: 正式通知    時(shí)間: 2025-3-26 06:13
COVID-19 Detection Using State-of-the-Art Deep Learning Models on X-Ray and CT Imagesrd for detecting COVID-19 illness relies on nasopharyngeal swabs, which can lead to mistakes due to human error. These tests are not sensitive enough to be used for early diagnosis. These disadvantages highlight the requirement for a completely automated system that can detect COVID-19 disorders uti
作者: TOXIN    時(shí)間: 2025-3-26 09:54

作者: 額外的事    時(shí)間: 2025-3-26 13:58
Sniffit: A Packet Sniffing Tool Using Wiresharklity to manage computer networks effectively and efficiently. Sniffer allows us to control, observe, and record passwords used for telnet, user login, and FTP connections. Without changing them, this inspects and sniffs packets as they move via a network. Network administrators can evaluate, compreh
作者: Eructation    時(shí)間: 2025-3-26 17:36
Analysis and Comparison of Posture Detection Using Deep Learning Algorithmdeep learning. The paper reviews the literature of deep learning algorithm for posture?recognition. We describe the algorithms and literature of deep learning that were most widely used for posture detection and did a comparative analysis based on parameters that were used in literature.
作者: 飾帶    時(shí)間: 2025-3-26 23:48

作者: 轉(zhuǎn)換    時(shí)間: 2025-3-27 04:33
Implications of Forensic Investigation in Dark Webensive review of the current state of research on dark web forensics, with an emphasis on the methods, tools, and challenges associated with this field. The continuous improvement of darknet forensics technology has important practical significance for law enforcement agencies to combat darknet crimes.
作者: 狼群    時(shí)間: 2025-3-27 05:56

作者: 薄荷醇    時(shí)間: 2025-3-27 11:56

作者: incarcerate    時(shí)間: 2025-3-27 15:38
Strukturierte Softwareentwicklung,ttacks to use optimal computational power and minimum number of features in the training dataset. The NB model achieves an accuracy of 57%–75%, while the DT model achieves an accuracy of 93%–100%. The outcome of the two ML models reveals that training with similar features possesses a higher accuracy level.
作者: 材料等    時(shí)間: 2025-3-27 21:45
Machine Learning-Based Solutions for Securing IoT Systems Against Multilayer Attacksttacks to use optimal computational power and minimum number of features in the training dataset. The NB model achieves an accuracy of 57%–75%, while the DT model achieves an accuracy of 93%–100%. The outcome of the two ML models reveals that training with similar features possesses a higher accuracy level.
作者: Limousine    時(shí)間: 2025-3-27 22:58

作者: 費(fèi)解    時(shí)間: 2025-3-28 03:26

作者: DOLT    時(shí)間: 2025-3-28 10:06
Design and Analysis of 16 Channel WDM-OFC System with Minimum BER for 5G Applications a bidirectional data transmission technique enabled multiple users to simultaneously data transmission through a single channel. In this paper we have design the WDM based optical communication network which provide high data rates with low BER and also identified the parameters which affect the BER.
作者: 哥哥噴涌而出    時(shí)間: 2025-3-28 13:51

作者: blackout    時(shí)間: 2025-3-28 16:03

作者: ACE-inhibitor    時(shí)間: 2025-3-28 18:53
Software für die Arbeit von morgenon and provenance through a secure socket layer and by some framework methods, through which the poisoning attacks can be detected and prevented. On this basis, our projects prevent hacks from occurring in the field of medicine.
作者: sperse    時(shí)間: 2025-3-29 01:07
Software, Animation and the Moving ImageIPSO and applying canny algorithm further. In this paper, edge segmentation done using improved PSO optimized technique that are present on images. Textural features extracted from IPSO segmented images using Gray Level Co-occurrence Matrix (GLCM). Textural extracted features are classified using Random Forest algorithm and obtains 98% accuracy.
作者: Stress-Fracture    時(shí)間: 2025-3-29 07:03
A Robust Graphical Authentication System for the Shoulder Surfing Attack in this that must be kept private. Each digit has a unique value that is determined by a set of computations and algorithms. This makes it difficult for the attacker to decrypt the password and makes it possible to prevent numerous cyber attacks like dictionary attacks and shoulder surfing attacks.
作者: In-Situ    時(shí)間: 2025-3-29 09:34

作者: 使更活躍    時(shí)間: 2025-3-29 11:59
Prevention and Detection of Poisoning Attacks in Medical-Based Machine Learning Web Applicationson and provenance through a secure socket layer and by some framework methods, through which the poisoning attacks can be detected and prevented. On this basis, our projects prevent hacks from occurring in the field of medicine.
作者: Antagonist    時(shí)間: 2025-3-29 16:14
Edge Discerning Using Improved PSO and Canny AlgorithmIPSO and applying canny algorithm further. In this paper, edge segmentation done using improved PSO optimized technique that are present on images. Textural features extracted from IPSO segmented images using Gray Level Co-occurrence Matrix (GLCM). Textural extracted features are classified using Random Forest algorithm and obtains 98% accuracy.
作者: 針葉樹    時(shí)間: 2025-3-29 22:25

作者: 山羊    時(shí)間: 2025-3-30 00:08
Ulf Schubert,Martin Gro?,Stefanie P?tzschther in the same image. In this paper recent state of arts have been surveyed in the field of CMFD. Also, comparative evaluation of various approaches has been performed to analyze the strength and limitation when comparing one approach with another.
作者: 盟軍    時(shí)間: 2025-3-30 05:29

作者: 是剝皮    時(shí)間: 2025-3-30 11:04
Conference proceedings 2023, CNC 2022,?held in Gwalior, India, in?December 2022..The 53 full papers were thoroughly reviewed and selected from the 152 submissions. They focus on??the exciting new areas of wired and wireless communication systems, high-dimensional data representation and processing, networks and information se
作者: 不能約    時(shí)間: 2025-3-30 12:27
Communication, Networks and Computing978-3-031-43140-1Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 歡騰    時(shí)間: 2025-3-30 17:19
Software for Parallel Computationetric. The variation in values of Probability of Detection (P.) with variable factors such as Dynamic Threshold, Noise uncertainty & sampling time (N.) for zero relay & multi relay system respectively has been conducted using MATLAB.
作者: 捏造    時(shí)間: 2025-3-30 22:51

作者: 思想靈活    時(shí)間: 2025-3-31 02:23

作者: 與野獸博斗者    時(shí)間: 2025-3-31 07:48
Analysis of Probability of Detection in Relay Assisted WBANetric. The variation in values of Probability of Detection (P.) with variable factors such as Dynamic Threshold, Noise uncertainty & sampling time (N.) for zero relay & multi relay system respectively has been conducted using MATLAB.
作者: aspersion    時(shí)間: 2025-3-31 09:25

作者: dendrites    時(shí)間: 2025-3-31 15:51

作者: 蛙鳴聲    時(shí)間: 2025-3-31 20:37

作者: osculate    時(shí)間: 2025-4-1 01:17

作者: 無底    時(shí)間: 2025-4-1 01:50
M. Cosnard,M. Loi,B. Tourancheauocations. Images taken by satellites and drones are used in image remote sensing analysis to study the Earth’s surface. Any classification method’s primary goal is to give semantic labels to photos that have been collected. Using these labels, the images may then be sorted in a semantic order. In ma
作者: Banquet    時(shí)間: 2025-4-1 09:48

作者: constitute    時(shí)間: 2025-4-1 13:37
https://doi.org/10.1007/978-3-642-31371-4ctrical power transmission lines in order to improve the efficiency of the system and avert catastrophic damage. A wide variety of methods are proposed in the technical literature for this goal. This survey paper examines different methodologies used to classify faults in an electrical power transmi




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
靖远县| 枞阳县| 靖远县| 古浪县| 庆云县| 油尖旺区| 昔阳县| 常山县| 平武县| 托克逊县| 临城县| 霸州市| 三门县| 明水县| 正定县| 中西区| 清涧县| 和平区| 定陶县| 杭锦旗| 牙克石市| 板桥市| 兴仁县| 衡阳市| 化隆| 杭锦后旗| 云林县| 通化县| 丹寨县| 米脂县| 琼中| 黑山县| 册亨县| 彝良县| 浪卡子县| 滦平县| 开原市| 台北市| 屯留县| 塘沽区| 武鸣县|