派博傳思國際中心

標(biāo)題: Titlebook: Computing, Communication and Learning; First International Sanjaya Kumar Panda,Rashmi Ranjan Rout,Rajkumar Bu Conference proceedings 2022 [打印本頁]

作者: 本義    時間: 2025-3-21 17:09
書目名稱Computing, Communication and Learning影響因子(影響力)




書目名稱Computing, Communication and Learning影響因子(影響力)學(xué)科排名




書目名稱Computing, Communication and Learning網(wǎng)絡(luò)公開度




書目名稱Computing, Communication and Learning網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computing, Communication and Learning被引頻次




書目名稱Computing, Communication and Learning被引頻次學(xué)科排名




書目名稱Computing, Communication and Learning年度引用




書目名稱Computing, Communication and Learning年度引用學(xué)科排名




書目名稱Computing, Communication and Learning讀者反饋




書目名稱Computing, Communication and Learning讀者反饋學(xué)科排名





作者: coalition    時間: 2025-3-21 22:02
Developing a?Cloud Intrusion Detection System with?Filter-Based Features Selection Techniques and?SV of data kept in the cloud. Data is the gold of our era; thus, it is important to protect it against any attacks. The intrusion detection system IDS is considered among of the most important solutions that address security issues and threats in the different models of cloud service delivery. IDS-bas
作者: 異端    時間: 2025-3-22 01:21

作者: hermitage    時間: 2025-3-22 05:06

作者: harbinger    時間: 2025-3-22 08:58
Granular Access Control of?Smart Contract Using Hyperledger Frameworkchain is that any changes incorporated by the authorized user in the system have been inserted into the transaction and would be traceable. The smart contract access control mechanisms have gained considerable attention since its applications. However, there are no systematic efforts to analyze exis
作者: 萬神殿    時間: 2025-3-22 16:55

作者: 萬神殿    時間: 2025-3-22 17:50
An Improved GWO Algorithm for Data Clusteringh process by mimicking the search for prey and attacking strategy of grey wolfs. To further improve its performance, here we have hybridized with Jaya algorithm that improves the exploration capability and hence maintains a trade between exploitation and exploration. An extensive simulation work is
作者: mastoid-bone    時間: 2025-3-22 21:19

作者: 迅速成長    時間: 2025-3-23 04:52

作者: 帳單    時間: 2025-3-23 09:22

作者: 枯燥    時間: 2025-3-23 11:47
Comparative Analysis of?Power Management System for?Microbial Fuel Cellal challenges such as high source impedance, lower specific power density of MFC and ultra low voltage of MFC which limits the usability of the fuel cell. Different energy harvesting schemes to extract energy from MFC are being investigated by the researchers over the past several years. This work p
作者: 友好    時間: 2025-3-23 16:16

作者: 乳白光    時間: 2025-3-23 20:20
Underwater Acoustic Sensor Networks’ Performance Evaluation Tool (UASN-PET) for?UnetStackious underwater network simulators such as NS2-MIRACLE, SUNSET, Aqua-Net/Mate, DESERT, and UnetStack. However UnetStack is more compatible to real modems from the deployment point of view in comparison with other. UnetStack creates a log-0.txt file and a trace.json file after compiling a groovy file
作者: GAVEL    時間: 2025-3-23 23:39
Zero Watermarking Scheme Based on Polar Harmonic Fourier Moments that must be addressed due to the growth and popularization of computer technology. In zero watermarking algorithms, the main tool is continuous orthogonal images for images. Ongoing orthogonal continuous activity is used, consistent in rotation and measurement, and highly improved. Polar Harmonic
作者: Credence    時間: 2025-3-24 04:22

作者: Archipelago    時間: 2025-3-24 09:28

作者: Alienated    時間: 2025-3-24 11:51
https://doi.org/10.1007/978-3-031-21750-0artificial intelligence; computer hardware; computer networks; computer security; computer systems; crypt
作者: 發(fā)展    時間: 2025-3-24 18:22

作者: 不易燃    時間: 2025-3-24 19:40

作者: 做方舟    時間: 2025-3-25 03:09
https://doi.org/10.1007/978-0-387-49985-7 of data kept in the cloud. Data is the gold of our era; thus, it is important to protect it against any attacks. The intrusion detection system IDS is considered among of the most important solutions that address security issues and threats in the different models of cloud service delivery. IDS-bas
作者: acclimate    時間: 2025-3-25 06:50
D. P. Jones,T. Y. Aw,D. P. Kowalskisubstantial practical success. A deep learning model’s (DL) performance is influenced by a number of hyperparameters during model formation. The learning rate is one of them (LR). The examination of the widely used Adam optimizer’s LR impact on performance metrics and the choice of the best LR with
作者: Monolithic    時間: 2025-3-25 07:31
A. Noel,F. Kebers,E. Maquoi,J. M. Foidartless functions can be orchestrated in the form of workflow and can be deployed and executed in serverless frameworks. A number of serverless frameworks have emerged recently to provide orchestration services for serverless workflow. It is necessary to explore the potential of serverless frameworks w
作者: Offset    時間: 2025-3-25 13:09
Tissue and Organ Regeneration in Adultschain is that any changes incorporated by the authorized user in the system have been inserted into the transaction and would be traceable. The smart contract access control mechanisms have gained considerable attention since its applications. However, there are no systematic efforts to analyze exis
作者: 形容詞詞尾    時間: 2025-3-25 19:42

作者: 不要嚴(yán)酷    時間: 2025-3-25 22:52
Anatomically Well-Defined Defects,h process by mimicking the search for prey and attacking strategy of grey wolfs. To further improve its performance, here we have hybridized with Jaya algorithm that improves the exploration capability and hence maintains a trade between exploitation and exploration. An extensive simulation work is
作者: CAMP    時間: 2025-3-26 03:45
Tissue and Organ Regeneration in Adultsat an early stage that helps to avoid sudden cardiac death. The optimization algorithms are adaptable and flexible enough to handle difficult non-linear problems. A heart disease prediction model is proposed using Bayesian Optimization of Support Vector Machine, Salp Swarm Optimized Neural Network C
作者: Painstaking    時間: 2025-3-26 05:04

作者: SHRIK    時間: 2025-3-26 09:47

作者: Terminal    時間: 2025-3-26 14:58
Tissue and Organ Regeneration in Adultsal challenges such as high source impedance, lower specific power density of MFC and ultra low voltage of MFC which limits the usability of the fuel cell. Different energy harvesting schemes to extract energy from MFC are being investigated by the researchers over the past several years. This work p
作者: Mosaic    時間: 2025-3-26 18:55

作者: 兇殘    時間: 2025-3-26 21:46

作者: Ceremony    時間: 2025-3-27 04:47

作者: 大喘氣    時間: 2025-3-27 05:28

作者: avarice    時間: 2025-3-27 11:26
Gerd Lütjering,James C. Williamsf respective privacy information. It expects gadgets that they trade their ML parameters. Subsequently, it expects to be together get familiar with a solid model relies upon the quantity of preparing ventures and boundary time for transmission per each step. Practically, It’s transmissions are regul
作者: 暴發(fā)戶    時間: 2025-3-27 13:54

作者: Hallowed    時間: 2025-3-27 18:31
Computing, Communication and Learning978-3-031-21750-0Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: recede    時間: 2025-3-27 23:44
Conference proceedings 2022Warangal, India, in October 2022..The 25 full papers and 1 short paper presented were carefully reviewed and selected from 117 submissions. The CoCoLe conference focuses on three broad areas of computer science and other allied branches, namely computing, communication, and learning..
作者: nocturia    時間: 2025-3-28 05:39
https://doi.org/10.1007/978-0-387-49985-7 system that combines filter-based feature selection with the support-vector-machine (SVM) model as a classifier. The NSL-KDD, Kyoto, and the CSE-CIC-IDS-2018 datasets are used to validate our system. We have compared with many existing methodologies and found that our proposed system outperformed t
作者: 光明正大    時間: 2025-3-28 06:14

作者: 微粒    時間: 2025-3-28 12:11

作者: hedonic    時間: 2025-3-28 15:57
Anatomically Well-Defined Defects,test of the proposed model is conducted by performing Friedman and Nemenyi hypothesis test and Duncan’s multiple test. The obtained results from the statistical test show the superiority of our proposed method with respect to other meta-heuristic based clustering methods.
作者: 牌帶來    時間: 2025-3-28 22:48

作者: FEMUR    時間: 2025-3-29 00:47

作者: 可互換    時間: 2025-3-29 05:02

作者: 過渡時期    時間: 2025-3-29 08:16
Engineering Materials and Processeshin the cover image may have an impact on the process of decision-making. So, the features of medical images, collected as a set of data will be extracted. We use the Arnold modification of binary sequencing images to be generated for a selected moment to improve security objectives. Then the waterm
作者: Irrigate    時間: 2025-3-29 14:20
Engineering Materials and Processesnal image. The proficiency of present technique has been analyzed in respect of performance parameters such as MSE, SSIM, PSNR, NC. Also, simulation results signify the high embedding capacity of the proposed work.
作者: Ptosis    時間: 2025-3-29 18:57
Gerd Lütjering,James C. Williamsspondence proficient FL system is proposed to together further develop the FL union time, hence the preparation misfortune. During this system, a probabilistic gadget choice plan is implied such as the gadgets which will altogether further develop the union speed and prepare misfortune to get the hi
作者: 厭倦嗎你    時間: 2025-3-29 22:00
Sanjaya Kumar Panda,Rashmi Ranjan Rout,Rajkumar Bu
作者: 執(zhí)    時間: 2025-3-30 02:30
Developing a?Cloud Intrusion Detection System with?Filter-Based Features Selection Techniques and?SV system that combines filter-based feature selection with the support-vector-machine (SVM) model as a classifier. The NSL-KDD, Kyoto, and the CSE-CIC-IDS-2018 datasets are used to validate our system. We have compared with many existing methodologies and found that our proposed system outperformed t
作者: myelography    時間: 2025-3-30 06:12

作者: Blemish    時間: 2025-3-30 11:11
Granular Access Control of?Smart Contract Using Hyperledger Frameworkentity accessing a service. This paper’s objective is to propose an access control mechanism of smart contracts to ensure that only authorized users can access the authorized component of the object in the Hyperledger framework.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
綦江县| 喜德县| 澎湖县| 绥宁县| 太康县| 小金县| 蚌埠市| 潜江市| 都兰县| 四子王旗| 武定县| 友谊县| 宝应县| 五河县| 府谷县| 全椒县| 巴彦县| 博乐市| 板桥市| 甘泉县| 农安县| 德钦县| 宜良县| 宣恩县| 油尖旺区| 苗栗市| 延吉市| 蒲城县| 涪陵区| 甘德县| 晋宁县| 扎鲁特旗| 稻城县| 右玉县| 郧西县| 嘉义市| 舟曲县| 股票| 鄂伦春自治旗| 荆门市| 福贡县|