標(biāo)題: Titlebook: Computing, Communication and Learning; First International Sanjaya Kumar Panda,Rashmi Ranjan Rout,Rajkumar Bu Conference proceedings 2022 [打印本頁] 作者: 本義 時間: 2025-3-21 17:09
書目名稱Computing, Communication and Learning影響因子(影響力)
書目名稱Computing, Communication and Learning影響因子(影響力)學(xué)科排名
書目名稱Computing, Communication and Learning網(wǎng)絡(luò)公開度
書目名稱Computing, Communication and Learning網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computing, Communication and Learning被引頻次
書目名稱Computing, Communication and Learning被引頻次學(xué)科排名
書目名稱Computing, Communication and Learning年度引用
書目名稱Computing, Communication and Learning年度引用學(xué)科排名
書目名稱Computing, Communication and Learning讀者反饋
書目名稱Computing, Communication and Learning讀者反饋學(xué)科排名
作者: coalition 時間: 2025-3-21 22:02
Developing a?Cloud Intrusion Detection System with?Filter-Based Features Selection Techniques and?SV of data kept in the cloud. Data is the gold of our era; thus, it is important to protect it against any attacks. The intrusion detection system IDS is considered among of the most important solutions that address security issues and threats in the different models of cloud service delivery. IDS-bas作者: 異端 時間: 2025-3-22 01:21 作者: hermitage 時間: 2025-3-22 05:06 作者: harbinger 時間: 2025-3-22 08:58
Granular Access Control of?Smart Contract Using Hyperledger Frameworkchain is that any changes incorporated by the authorized user in the system have been inserted into the transaction and would be traceable. The smart contract access control mechanisms have gained considerable attention since its applications. However, there are no systematic efforts to analyze exis作者: 萬神殿 時間: 2025-3-22 16:55 作者: 萬神殿 時間: 2025-3-22 17:50
An Improved GWO Algorithm for Data Clusteringh process by mimicking the search for prey and attacking strategy of grey wolfs. To further improve its performance, here we have hybridized with Jaya algorithm that improves the exploration capability and hence maintains a trade between exploitation and exploration. An extensive simulation work is 作者: mastoid-bone 時間: 2025-3-22 21:19 作者: 迅速成長 時間: 2025-3-23 04:52 作者: 帳單 時間: 2025-3-23 09:22 作者: 枯燥 時間: 2025-3-23 11:47
Comparative Analysis of?Power Management System for?Microbial Fuel Cellal challenges such as high source impedance, lower specific power density of MFC and ultra low voltage of MFC which limits the usability of the fuel cell. Different energy harvesting schemes to extract energy from MFC are being investigated by the researchers over the past several years. This work p作者: 友好 時間: 2025-3-23 16:16 作者: 乳白光 時間: 2025-3-23 20:20
Underwater Acoustic Sensor Networks’ Performance Evaluation Tool (UASN-PET) for?UnetStackious underwater network simulators such as NS2-MIRACLE, SUNSET, Aqua-Net/Mate, DESERT, and UnetStack. However UnetStack is more compatible to real modems from the deployment point of view in comparison with other. UnetStack creates a log-0.txt file and a trace.json file after compiling a groovy file作者: GAVEL 時間: 2025-3-23 23:39
Zero Watermarking Scheme Based on Polar Harmonic Fourier Moments that must be addressed due to the growth and popularization of computer technology. In zero watermarking algorithms, the main tool is continuous orthogonal images for images. Ongoing orthogonal continuous activity is used, consistent in rotation and measurement, and highly improved. Polar Harmonic 作者: Credence 時間: 2025-3-24 04:22 作者: Archipelago 時間: 2025-3-24 09:28 作者: Alienated 時間: 2025-3-24 11:51
https://doi.org/10.1007/978-3-031-21750-0artificial intelligence; computer hardware; computer networks; computer security; computer systems; crypt作者: 發(fā)展 時間: 2025-3-24 18:22 作者: 不易燃 時間: 2025-3-24 19:40 作者: 做方舟 時間: 2025-3-25 03:09
https://doi.org/10.1007/978-0-387-49985-7 of data kept in the cloud. Data is the gold of our era; thus, it is important to protect it against any attacks. The intrusion detection system IDS is considered among of the most important solutions that address security issues and threats in the different models of cloud service delivery. IDS-bas作者: acclimate 時間: 2025-3-25 06:50
D. P. Jones,T. Y. Aw,D. P. Kowalskisubstantial practical success. A deep learning model’s (DL) performance is influenced by a number of hyperparameters during model formation. The learning rate is one of them (LR). The examination of the widely used Adam optimizer’s LR impact on performance metrics and the choice of the best LR with 作者: Monolithic 時間: 2025-3-25 07:31
A. Noel,F. Kebers,E. Maquoi,J. M. Foidartless functions can be orchestrated in the form of workflow and can be deployed and executed in serverless frameworks. A number of serverless frameworks have emerged recently to provide orchestration services for serverless workflow. It is necessary to explore the potential of serverless frameworks w作者: Offset 時間: 2025-3-25 13:09
Tissue and Organ Regeneration in Adultschain is that any changes incorporated by the authorized user in the system have been inserted into the transaction and would be traceable. The smart contract access control mechanisms have gained considerable attention since its applications. However, there are no systematic efforts to analyze exis作者: 形容詞詞尾 時間: 2025-3-25 19:42 作者: 不要嚴(yán)酷 時間: 2025-3-25 22:52
Anatomically Well-Defined Defects,h process by mimicking the search for prey and attacking strategy of grey wolfs. To further improve its performance, here we have hybridized with Jaya algorithm that improves the exploration capability and hence maintains a trade between exploitation and exploration. An extensive simulation work is 作者: CAMP 時間: 2025-3-26 03:45
Tissue and Organ Regeneration in Adultsat an early stage that helps to avoid sudden cardiac death. The optimization algorithms are adaptable and flexible enough to handle difficult non-linear problems. A heart disease prediction model is proposed using Bayesian Optimization of Support Vector Machine, Salp Swarm Optimized Neural Network C作者: Painstaking 時間: 2025-3-26 05:04 作者: SHRIK 時間: 2025-3-26 09:47 作者: Terminal 時間: 2025-3-26 14:58
Tissue and Organ Regeneration in Adultsal challenges such as high source impedance, lower specific power density of MFC and ultra low voltage of MFC which limits the usability of the fuel cell. Different energy harvesting schemes to extract energy from MFC are being investigated by the researchers over the past several years. This work p作者: Mosaic 時間: 2025-3-26 18:55 作者: 兇殘 時間: 2025-3-26 21:46 作者: Ceremony 時間: 2025-3-27 04:47 作者: 大喘氣 時間: 2025-3-27 05:28 作者: avarice 時間: 2025-3-27 11:26
Gerd Lütjering,James C. Williamsf respective privacy information. It expects gadgets that they trade their ML parameters. Subsequently, it expects to be together get familiar with a solid model relies upon the quantity of preparing ventures and boundary time for transmission per each step. Practically, It’s transmissions are regul作者: 暴發(fā)戶 時間: 2025-3-27 13:54 作者: Hallowed 時間: 2025-3-27 18:31
Computing, Communication and Learning978-3-031-21750-0Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: recede 時間: 2025-3-27 23:44
Conference proceedings 2022Warangal, India, in October 2022..The 25 full papers and 1 short paper presented were carefully reviewed and selected from 117 submissions. The CoCoLe conference focuses on three broad areas of computer science and other allied branches, namely computing, communication, and learning..作者: nocturia 時間: 2025-3-28 05:39
https://doi.org/10.1007/978-0-387-49985-7 system that combines filter-based feature selection with the support-vector-machine (SVM) model as a classifier. The NSL-KDD, Kyoto, and the CSE-CIC-IDS-2018 datasets are used to validate our system. We have compared with many existing methodologies and found that our proposed system outperformed t作者: 光明正大 時間: 2025-3-28 06:14 作者: 微粒 時間: 2025-3-28 12:11 作者: hedonic 時間: 2025-3-28 15:57
Anatomically Well-Defined Defects,test of the proposed model is conducted by performing Friedman and Nemenyi hypothesis test and Duncan’s multiple test. The obtained results from the statistical test show the superiority of our proposed method with respect to other meta-heuristic based clustering methods.作者: 牌帶來 時間: 2025-3-28 22:48 作者: FEMUR 時間: 2025-3-29 00:47 作者: 可互換 時間: 2025-3-29 05:02 作者: 過渡時期 時間: 2025-3-29 08:16
Engineering Materials and Processeshin the cover image may have an impact on the process of decision-making. So, the features of medical images, collected as a set of data will be extracted. We use the Arnold modification of binary sequencing images to be generated for a selected moment to improve security objectives. Then the waterm作者: Irrigate 時間: 2025-3-29 14:20
Engineering Materials and Processesnal image. The proficiency of present technique has been analyzed in respect of performance parameters such as MSE, SSIM, PSNR, NC. Also, simulation results signify the high embedding capacity of the proposed work.作者: Ptosis 時間: 2025-3-29 18:57
Gerd Lütjering,James C. Williamsspondence proficient FL system is proposed to together further develop the FL union time, hence the preparation misfortune. During this system, a probabilistic gadget choice plan is implied such as the gadgets which will altogether further develop the union speed and prepare misfortune to get the hi作者: 厭倦嗎你 時間: 2025-3-29 22:00
Sanjaya Kumar Panda,Rashmi Ranjan Rout,Rajkumar Bu作者: 執(zhí) 時間: 2025-3-30 02:30
Developing a?Cloud Intrusion Detection System with?Filter-Based Features Selection Techniques and?SV system that combines filter-based feature selection with the support-vector-machine (SVM) model as a classifier. The NSL-KDD, Kyoto, and the CSE-CIC-IDS-2018 datasets are used to validate our system. We have compared with many existing methodologies and found that our proposed system outperformed t作者: myelography 時間: 2025-3-30 06:12 作者: Blemish 時間: 2025-3-30 11:11
Granular Access Control of?Smart Contract Using Hyperledger Frameworkentity accessing a service. This paper’s objective is to propose an access control mechanism of smart contracts to ensure that only authorized users can access the authorized component of the object in the Hyperledger framework.