派博傳思國(guó)際中心

標(biāo)題: Titlebook: Computer Networks and Inventive Communication Technologies; Proceedings of Fourt S. Smys,Robert Bestak,Ivan Kotuliak Conference proceedings [打印本頁(yè)]

作者: Fillmore    時(shí)間: 2025-3-21 18:11
書(shū)目名稱Computer Networks and Inventive Communication Technologies影響因子(影響力)




書(shū)目名稱Computer Networks and Inventive Communication Technologies影響因子(影響力)學(xué)科排名




書(shū)目名稱Computer Networks and Inventive Communication Technologies網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Computer Networks and Inventive Communication Technologies網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Computer Networks and Inventive Communication Technologies被引頻次




書(shū)目名稱Computer Networks and Inventive Communication Technologies被引頻次學(xué)科排名




書(shū)目名稱Computer Networks and Inventive Communication Technologies年度引用




書(shū)目名稱Computer Networks and Inventive Communication Technologies年度引用學(xué)科排名




書(shū)目名稱Computer Networks and Inventive Communication Technologies讀者反饋




書(shū)目名稱Computer Networks and Inventive Communication Technologies讀者反饋學(xué)科排名





作者: 瑣碎    時(shí)間: 2025-3-21 23:18
https://doi.org/10.1007/978-3-8349-9879-8em capacity, memory size, and processing speed. On the dataset, the task sizes are examined and separated according to the priority levels. On which the high priority comprises video files, the audio files under medium-level priority, and the remaining text documents, ppts, etc. included in under lo
作者: Deduct    時(shí)間: 2025-3-22 02:29

作者: 我邪惡    時(shí)間: 2025-3-22 05:54
Die Haftung des Testamentsvollstreckers,enetic algorithm multiple times until the terminal condition was met, and the performance of each candidate solution was evaluated using a chosen fitness function. The most optimal configuration was obtained from the final generation which is used to classify the messages. Four metrics, namely the a
作者: 尊嚴(yán)    時(shí)間: 2025-3-22 10:26

作者: lanugo    時(shí)間: 2025-3-22 14:30
,Die Vergütung des Testamentsvollstreckers, in a particular field. In this paper, we tackle this problem by testing six different NNs on a dataset of twenty software from the PROMISE repository in a strict CPDP setting. We then compare the best architecture to three proposed methods for CPDP, which cover a wide range of scenarios. During our
作者: lanugo    時(shí)間: 2025-3-22 20:09
https://doi.org/10.1007/978-3-8349-9879-8 deep learning and machine learning classifiers to detect phishing website and their brands. Some of the experiments include Transfer Learning and Representation Learning techniques by utilizing various off-the-shelf Convolutional Neural Network (CNN) architectures to extract image features. It is o
作者: 線    時(shí)間: 2025-3-22 23:20

作者: Stagger    時(shí)間: 2025-3-23 04:33
H. Tanaka,M. Nozaki,K. Yomogida,Y. Nishimune helps in finding the relevance of text content in the tweet and its hashtag #whitelivesmatter in specific. In this paper, supervised data analysis techniques like text classification are used to get the required output.
作者: 豐滿有漂亮    時(shí)間: 2025-3-23 08:39
Automatic Testing for Robustness Violationsy, and temperature. Also, this research work implements proper measures for those concepts on receiving the collected information without human input and later the detected quantities are stored for further data analysis within the cloud. Real-time feeds are being supervised upon this webpage as wel
作者: 有法律效應(yīng)    時(shí)間: 2025-3-23 09:47
Design of Prioritized ,-Wise Testingh develops a parking management software that actually identifies the existence of parking areas. The data from video footage is used to train the Mask R-CNN architecture, where a computer vision image recognition model is used to automatically identify the parking spaces. To label the car parking p
作者: excursion    時(shí)間: 2025-3-23 15:31

作者: Optometrist    時(shí)間: 2025-3-23 21:57
Computer Networks and Inventive Communication TechnologiesProceedings of Fourt
作者: Nomadic    時(shí)間: 2025-3-23 22:21
2367-4512 ection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advanced work in the area.?978-981-16-3727-8978-981-16-3728-5Series ISSN 2367-4512 Series E-ISSN 2367-4520
作者: TEN    時(shí)間: 2025-3-24 05:26
Energy Efficient Clustering in Wireless Sensor Networks by Opposition-Based Initialization Bat Algovalidated by conducting a comparative analysis with its original version, and also with other metaheuristics approaches that were tested for the same problem. Obtained results from conducted experiments suggest that the proposed method’s performance is superior, and that it could bring valuable resu
作者: 少量    時(shí)間: 2025-3-24 08:32
Job Scheduling in Cloud Computing Based on DGPSO,em capacity, memory size, and processing speed. On the dataset, the task sizes are examined and separated according to the priority levels. On which the high priority comprises video files, the audio files under medium-level priority, and the remaining text documents, ppts, etc. included in under lo
作者: 先兆    時(shí)間: 2025-3-24 12:16

作者: 哺乳動(dòng)物    時(shí)間: 2025-3-24 16:49

作者: Deject    時(shí)間: 2025-3-24 21:42
Affine Recurrence Based Key Scheduling Algorithm for the Advanced Encryption Standard,orithm of the AES. It has also been tested to have inferior strict avalanche criteria in comparison with other contenders of the AES such as Serpent and Twofish. Usage of the concept of affine recurrence ensures this in the proposed model. In affine recurrence, no two outputs of the operation will h
作者: 不持續(xù)就爆    時(shí)間: 2025-3-25 03:14
Simplify Your Neural Networks: An Empirical Study on Cross-Project Defect Prediction, in a particular field. In this paper, we tackle this problem by testing six different NNs on a dataset of twenty software from the PROMISE repository in a strict CPDP setting. We then compare the best architecture to three proposed methods for CPDP, which cover a wide range of scenarios. During our
作者: 約會(huì)    時(shí)間: 2025-3-25 06:17
Phishing Detection Using Computer Vision, deep learning and machine learning classifiers to detect phishing website and their brands. Some of the experiments include Transfer Learning and Representation Learning techniques by utilizing various off-the-shelf Convolutional Neural Network (CNN) architectures to extract image features. It is o
作者: Middle-Ear    時(shí)間: 2025-3-25 09:26
Keylogger Threat to the Android Mobile Banking Applications,ts are being used for financial communications with the banks or financial institutions, by allowing clients and users to conduct a variety of transactions. In android app store (Google Play) keylogger apps are initially blocked but using some vulnerabilities in app permission it can be installed wi
作者: Accede    時(shí)間: 2025-3-25 12:51
Irrelevant Racist Tweets Identification Using Data Mining Techniques, helps in finding the relevance of text content in the tweet and its hashtag #whitelivesmatter in specific. In this paper, supervised data analysis techniques like text classification are used to get the required output.
作者: 我邪惡    時(shí)間: 2025-3-25 17:30
Smart Farming System Using IoT and Cloud,y, and temperature. Also, this research work implements proper measures for those concepts on receiving the collected information without human input and later the detected quantities are stored for further data analysis within the cloud. Real-time feeds are being supervised upon this webpage as wel
作者: Abjure    時(shí)間: 2025-3-25 23:04

作者: 使痛苦    時(shí)間: 2025-3-26 00:27
Deep Face-Iris Recognition Using Robust Image Segmentation and Hyperparameter Tuning,ll deep learning algorithms are provided with augmented data, included in the tuning process, enabling additional accuracy gains. Highlights include near-perfect fivefold cross-validation accuracy on the IITD-Iris dataset when performing identification. Verification tests were carried out on the cha
作者: Fissure    時(shí)間: 2025-3-26 06:17

作者: Focus-Words    時(shí)間: 2025-3-26 10:54

作者: 面包屑    時(shí)間: 2025-3-26 15:19

作者: 稀釋前    時(shí)間: 2025-3-26 17:24

作者: 使成整體    時(shí)間: 2025-3-26 22:09

作者: Asymptomatic    時(shí)間: 2025-3-27 01:43
Machine Learning-Based Network Intrusion Detection System,eans Clustering, KNN, Decision tree, Logistic Regression, and Random Forest for the detection of malicious attacks based on their detection accuracies and precision score. A detailed analysis of the network traffic features and the experimental results reveal that Logistic Regression provides the most accurate results.
作者: Directed    時(shí)間: 2025-3-27 05:32

作者: collagenase    時(shí)間: 2025-3-27 10:47
Die Haftung des Testamentsvollstreckers,, so a number of laps are required to collect data from all sensors. In this paper, the Models proposed can eradicate such problems by using MS as a means of connectivity, which will connect sensors and the station.
作者: anagen    時(shí)間: 2025-3-27 17:31

作者: NAV    時(shí)間: 2025-3-27 17:51
,Die Vergütung des Testamentsvollstreckers, APIs like speechrecognition, pyspeech, Google Cloud Speech API, etc., to extract text and then use summarisation techniques to present the most accurate summary and convert it back to audio format so that the news is more accessible for the visually impaired.
作者: 玷污    時(shí)間: 2025-3-28 00:46
Die Annahme des Testamentsvollstreckeramtes,inal and expanded dataset, respectively. While, AlexNet, VGG16, and Inception V3 have achieved 93.78%, 95.49%, and 96.67% accuracy for the expanded dataset, respectively. The obtained results validate that BGCNN can recognize yellow mosaic disease efficiently.
作者: 敵意    時(shí)間: 2025-3-28 02:29
Testing Component-Based Systems Using FSMsproposed for verification of a dealer, namely multipartite verifiable secret sharing based on CRT by using Iften, and multipartite verifiable secret sharing-based CRT by using kameer Kaya. Both proposed schemes are perfectly secure, and the security of both the schemes dependent on discrete logarithm problem.
作者: AFFIX    時(shí)間: 2025-3-28 08:58
Efficient Data Collection in Wireless Sensor Network,, so a number of laps are required to collect data from all sensors. In this paper, the Models proposed can eradicate such problems by using MS as a means of connectivity, which will connect sensors and the station.
作者: 泛濫    時(shí)間: 2025-3-28 12:18

作者: 人類的發(fā)源    時(shí)間: 2025-3-28 17:30
Multimedia Text Summary Generator for Visually Impaired, APIs like speechrecognition, pyspeech, Google Cloud Speech API, etc., to extract text and then use summarisation techniques to present the most accurate summary and convert it back to audio format so that the news is more accessible for the visually impaired.
作者: Electrolysis    時(shí)間: 2025-3-28 19:05

作者: gastritis    時(shí)間: 2025-3-28 23:44

作者: Cacophonous    時(shí)間: 2025-3-29 04:31

作者: Incise    時(shí)間: 2025-3-29 07:49

作者: 尾隨    時(shí)間: 2025-3-29 14:52

作者: 中世紀(jì)    時(shí)間: 2025-3-29 16:41

作者: 1FAWN    時(shí)間: 2025-3-29 22:05

作者: Expediency    時(shí)間: 2025-3-30 02:28

作者: pulmonary    時(shí)間: 2025-3-30 04:44

作者: Ovulation    時(shí)間: 2025-3-30 09:21
https://doi.org/10.1007/978-3-8349-9879-8hcare sector as well as to enhance computer–human interaction. In the following work, we use peripheral physiological signals to recognize emotion using classifier models with multidimensional emotion space models. These signals are collected using IoT-based wireless wearable devices. Emotions are m
作者: 西瓜    時(shí)間: 2025-3-30 13:06

作者: Annotate    時(shí)間: 2025-3-30 20:16

作者: 違抗    時(shí)間: 2025-3-30 22:07

作者: Ganglion-Cyst    時(shí)間: 2025-3-31 02:07

作者: 注視    時(shí)間: 2025-3-31 08:18
Die Haftung des Testamentsvollstreckers,ffect these networks. Thus, detecting such intrusions or attacks is a major concern. Intrusions are the activities that breach the system‘s security policy. The paper‘s objective is to detect malicious network traffic using machine learning techniques by developing an intrusion detection system in o
作者: 忍耐    時(shí)間: 2025-3-31 10:34

作者: 罐里有戒指    時(shí)間: 2025-3-31 15:39
H. Tanaka,M. Nozaki,K. Yomogida,Y. Nishimune users. One can write one’s mind and heart out on Twitter at any given minute. Due to which there is a rapid increase in the generation of irrelevant content on Twitter. Lately, a new hashtag called “#whitelivesmatter” was used as a counter for another hashtag “#blacklivesmatter”. A lot of anti-gove
作者: 安裝    時(shí)間: 2025-3-31 18:08

作者: erythema    時(shí)間: 2025-4-1 01:43

作者: Hypopnea    時(shí)間: 2025-4-1 03:56
Design of Prioritized ,-Wise Testing parking space nearby any office space or shopping mall, which is located on the narrow roadways. As the attempt to manually search for a parking slot consumes more time, commercial parking slots are designed to balance the demand and availability of vehicle parking spaces. Since constructing and mo
作者: 救護(hù)車    時(shí)間: 2025-4-1 06:37
https://doi.org/10.1007/0-387-27605-Xeen a priority. Furthermore, users tend to ignore the security features in favour of more rapid access to the device. A bimodal system is proposed that enhances security by utilizing face and iris biometrics from a single image. The motivation behind this is the ability to acquire both biometrics si
作者: 誹謗    時(shí)間: 2025-4-1 13:52
https://doi.org/10.1007/978-981-16-3728-5Wireless Communication; Mobile Communication; Optical Communication; Broadband Communication; Satellite
作者: 包租車船    時(shí)間: 2025-4-1 14:51

作者: BRACE    時(shí)間: 2025-4-1 21:30
S. Smys,Robert Bestak,Ivan KotuliakPresents research works in the field of computer networks and inventive communication technologies.Provides original works presented at ICCNCT 2021 held in Coimbatore, India.Serves as a reference for




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
招远市| 汉沽区| 舞阳县| 南皮县| 张家界市| 玉屏| 海淀区| 郑州市| 饶阳县| 兴业县| 定结县| 垫江县| 志丹县| 商河县| 当阳市| 永仁县| 丹凤县| 陵川县| 云霄县| 甘谷县| 建瓯市| 淮滨县| 新乡市| 广饶县| 蓬莱市| 东源县| 镇远县| 安西县| 卫辉市| 长汀县| 射阳县| 滦平县| 淳安县| 灯塔市| 斗六市| 九龙县| 濮阳县| 锡林郭勒盟| 来宾市| 宁夏| 神农架林区|