派博傳思國際中心

標(biāo)題: Titlebook: Data Science and Security; Proceedings of IDSCS Dharm Singh Jat,Samiksha Shukla,Durgesh Kumar Mish Conference proceedings 2021 The Editor(s [打印本頁]

作者: MAXIM    時間: 2025-3-21 16:29
書目名稱Data Science and Security影響因子(影響力)




書目名稱Data Science and Security影響因子(影響力)學(xué)科排名




書目名稱Data Science and Security網(wǎng)絡(luò)公開度




書目名稱Data Science and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Data Science and Security被引頻次




書目名稱Data Science and Security被引頻次學(xué)科排名




書目名稱Data Science and Security年度引用




書目名稱Data Science and Security年度引用學(xué)科排名




書目名稱Data Science and Security讀者反饋




書目名稱Data Science and Security讀者反饋學(xué)科排名





作者: Pepsin    時間: 2025-3-21 20:46
,A Novel Approach to Human–Computer Interaction Using Hand Gesture Recognition,their utilization. Henceforth, there has been developing enthusiasm for the improvement of new methodologies and innovations for bridging this barrier. In this project, a novel approach has been presented toward hand gesture recognition using smartphone sensor reading, which can be applied to intera
作者: 朝圣者    時間: 2025-3-22 02:13

作者: 新字    時間: 2025-3-22 05:42

作者: 商業(yè)上    時間: 2025-3-22 10:07

作者: Ambulatory    時間: 2025-3-22 13:52
Data Mining Models Applied in Prediction of IVF Success Rates: An Overview, as input and produce prediction as output are the need of the hour in IVF research area. The automated systems include mechanism for pre-processing of input metrics and prediction stage that is built using algorithms such as decision trees, na?ve Bayes classifiers, case-based reasoning system, logi
作者: Ambulatory    時間: 2025-3-22 18:31
,TreeXP—An Instantiation of XPattern Framework,only used over cross-platforms. XML clustering is an active research area. Because of the complexity of XML clustering, it remains a challenging area in data analytics, especially when Big Data is considered. In this paper, we focus on clustering of XML based on structure. A novel method for represe
作者: POINT    時間: 2025-3-22 22:14

作者: PLAYS    時間: 2025-3-23 02:09
Survey on DNS-Specific Security Issues and Solution Approaches,ailable to all users to resolve their hostnames. They are not configured with any administrative control. DNS is an open resolver so that it is a hot cake for attackers to perform various attacks such as cache poisonings, DOS, and DDOS attacks. DNS only converts domain names to their matching IP add
作者: Meditate    時間: 2025-3-23 08:50

作者: 留戀    時間: 2025-3-23 12:56

作者: 全能    時間: 2025-3-23 14:42
A Survey on Guiding Customer Purchasing Patterns in Modern Consumerism Scenario in India,e shopping malls user does happy shopping but feels tired and sick for standing in the long queues for the billing. Each product can be billed by reading the barcode on each product; thus, a single person scanning thousands of products of hundreds and more customers is a tedious task. Thus, we have
作者: Expiration    時間: 2025-3-23 20:40

作者: Ancillary    時間: 2025-3-23 23:05
ALOSI: Aspect-Level Opinion Spam Identification,form on social media and e-commerce for users to express/explore opinions on products and/or product manufacturers for the betterment of the product development. A tentative product rating can be derived from the product opinions mined. ALOSI takes opinion mining to a deeper level performing opinion
作者: corn732    時間: 2025-3-24 04:26
Adaptive Artificial Bee Colony (AABC)-Based Malignancy Pre-Diagnosis,and the timely prognosis. Hence, early detection of anomalous malignant cells is needed for pre-diagnosis of lung cancer as it plays a major role in the prognosis and treatment. In this work, an innovative pre-diagnosis approach is suggested, wherein the size of the dataset comprising risk factors a
作者: Memorial    時間: 2025-3-24 07:23

作者: neoplasm    時間: 2025-3-24 12:26
Classifying Bipolar Personality Disorder (BPD) Using Long Short-Term Memory (LSTM),pportunities in psychiatry where the diagnosis relies on the historical data of patients as well as the states of mood that increase the complexity of distinguishing between bipolar disorder and borderline disorder during diagnosis. This paper is inspired by prior work where the symptoms were treate
作者: 割公牛膨脹    時間: 2025-3-24 15:54
An IoT-Based Fog Computing Approach for Retrieval of Patient Vitals,r technologies for an efficient use. Cloud computing has been a greater part in Internet of Things, since all the data from the sensors are stored in the cloud for later retrieval or comparison. To retrieve time-sensitive data to end users within a needed time, fog computing plays a vital role. Due
作者: 公共汽車    時間: 2025-3-24 19:13

作者: abstemious    時間: 2025-3-25 01:40

作者: 放肆的你    時間: 2025-3-25 05:38

作者: 吞下    時間: 2025-3-25 10:36

作者: 都相信我的話    時間: 2025-3-25 13:58

作者: Admire    時間: 2025-3-25 19:42

作者: 要素    時間: 2025-3-25 21:48
https://doi.org/10.1007/978-1-4419-0730-1combination of current time value and back-end server-generated value with some random operations on that combined value. This value is 32 bit in size which will give a combination of 8-digit numbers. The proposed OTP algorithm is easier to develop on the other side difficult to reverse engineer and gives efficient performance.
作者: GRIN    時間: 2025-3-26 03:34

作者: Perigee    時間: 2025-3-26 06:13
An Approach to Predict Potential Edges in Online Social Networks,roaches. In this paper, we have tried to develop an edge prediction model which will be trained using a supervised machine learning technique. For experimental analysis, Wikipedia network has been used.
作者: Commentary    時間: 2025-3-26 10:11
A Novel Approach of OTP Generation Using Time-Based OTP and Randomization Techniques,combination of current time value and back-end server-generated value with some random operations on that combined value. This value is 32 bit in size which will give a combination of 8-digit numbers. The proposed OTP algorithm is easier to develop on the other side difficult to reverse engineer and gives efficient performance.
作者: 宴會    時間: 2025-3-26 16:17

作者: minion    時間: 2025-3-26 20:45

作者: cajole    時間: 2025-3-27 00:10

作者: Microaneurysm    時間: 2025-3-27 01:33
Arthur S. Sherman,Yue-Xian Li,Joel E. Keizerat of cloud computing in terms of retrieval latency using parameters such as temperature, humidity, and heartbeat. With this experiment, it has been proved that fog computing performs better than cloud computing in terms of retrieval latency.
作者: 審問,審訊    時間: 2025-3-27 08:18

作者: Wernickes-area    時間: 2025-3-27 11:36
Adaptive Artificial Bee Colony (AABC)-Based Malignancy Pre-Diagnosis, well-guided FFBNN-AABC to authenticate whether the supplied investigational data is competent to effectively forecast the lung disorder or not. The results obtained show a considerable improvement in the classification performance compared to other approaches like Genetic Algorithm (GA) and Particle Swarm Optimization (PSO).
作者: 逢迎春日    時間: 2025-3-27 14:47

作者: 增長    時間: 2025-3-27 19:47
Computational Biomechanics for Medicine, classifies the data using deep learning algorithms. Furthermore, once the gesture has been accurately classified, the gesture is mapped to an action. This paper also provides an analysis of a comparative study done for this area.
作者: inculpate    時間: 2025-3-28 01:19
Martyn P. Nash,Adam Wittek,Karol Millerty technique to achieve the security requirement of the devices connected to IoT, communicating between the legitimate users. This enables to develop a secure channel to configure the device without the application of any complex system or changes in the hardware of the device.
作者: 使混合    時間: 2025-3-28 04:43
Computational Biomechanics for Medicineructure, clustering is carried out with a new algorithm, TreeXP, which follows the XPattern framework. The performances of the proposed representation and clustering algorithm are compared with a well-established PathXP algorithm and found to give the same performance, but require very less time.
作者: 使困惑    時間: 2025-3-28 08:56

作者: 弄污    時間: 2025-3-28 12:30
9. Modeling of Cardiac Electro-Mechanics,retinopathy detection using deep architectures. Further, two architectures are implemented with minor modifications. Experiments are carried out with different sample sizes, and the detection accuracies of the two architectures are compared.
作者: dura-mater    時間: 2025-3-28 16:23

作者: 褲子    時間: 2025-3-28 18:54

作者: 致命    時間: 2025-3-29 01:57
,TreeXP—An Instantiation of XPattern Framework,ructure, clustering is carried out with a new algorithm, TreeXP, which follows the XPattern framework. The performances of the proposed representation and clustering algorithm are compared with a well-established PathXP algorithm and found to give the same performance, but require very less time.
作者: Entrancing    時間: 2025-3-29 06:32
Algorithms for the Metric Dimension of a Simple Graph,of metric basis is called the metric dimension of .. In this paper, we develop algorithms to find the metric dimension and a metric basis of a simple graph. These algorithms have the worst-case complexity of .(.).
作者: flammable    時間: 2025-3-29 08:36
,Diabetic Retinopathy Detection Using Convolutional Neural Network—A Study,retinopathy detection using deep architectures. Further, two architectures are implemented with minor modifications. Experiments are carried out with different sample sizes, and the detection accuracies of the two architectures are compared.
作者: demote    時間: 2025-3-29 13:27

作者: 多嘴    時間: 2025-3-29 18:54

作者: Serenity    時間: 2025-3-29 22:01

作者: 小故事    時間: 2025-3-30 01:03
https://doi.org/10.1007/978-3-319-15503-6eatures. The framework uses the domain knowledge to build the private model to analyze unique food characteristics. The proposed recommender model generates diet recommendation list for thyroid patients using food items rating patterns and similarity scores. The experimental setup validated the prop
作者: 冰河期    時間: 2025-3-30 04:21

作者: Efflorescent    時間: 2025-3-30 11:45
https://doi.org/10.1007/978-3-031-09327-2eural Network (CNN) algorithm to integrate multilayer perceptron for image segmentation. In this process, we combined both traditional feature extraction and high-level feature extraction to classify lung images. The convolutional neural network for feature extraction will identify lung cancer cells
作者: Medley    時間: 2025-3-30 15:16
Christopher P. Fall,Joel E. Keizeriscussed in this study. The model is tested with the synthetic signature dataset provided by the Alan Turing Institute in signature-psychiatry repository. The end result has 0.95 AUC which is an improvement over the last result of 0.90 AUC.
作者: 尖    時間: 2025-3-30 18:49
Simone Rizzetto,Attila Csikász-Nagyerformance levels. This method can help students a great deal by letting them as well as their instructors identify areas for improvement, especially in large classes, and take appropriate action in a timely manner.
作者: enterprise    時間: 2025-3-30 20:51

作者: 帶來墨水    時間: 2025-3-31 04:32

作者: Junction    時間: 2025-3-31 09:03

作者: 不合    時間: 2025-3-31 12:40

作者: 夾死提手勢    時間: 2025-3-31 17:11
Survey on DNS-Specific Security Issues and Solution Approaches,dentiality, packet fragmentation, amplification attack, and mainly it is a strong source of a DDOS attack. In this paper, we discuss how to increase the security of DNSSEC protocol by adding an extra layer of security using the EV-SSL certificate to overcome DNS security threats.
作者: 招惹    時間: 2025-3-31 19:27

作者: IOTA    時間: 2025-3-31 22:51
Classifying Bipolar Personality Disorder (BPD) Using Long Short-Term Memory (LSTM),iscussed in this study. The model is tested with the synthetic signature dataset provided by the Alan Turing Institute in signature-psychiatry repository. The end result has 0.95 AUC which is an improvement over the last result of 0.90 AUC.
作者: CLAIM    時間: 2025-4-1 04:31

作者: 價值在貶值    時間: 2025-4-1 08:21
https://doi.org/10.1007/978-981-15-5309-7Data Security; Cyber Security; DNS Security; Privacy on the Internet; Internet Measurement; QoS and Inter
作者: 小步走路    時間: 2025-4-1 11:22

作者: 動脈    時間: 2025-4-1 16:45

作者: 嚴(yán)峻考驗    時間: 2025-4-1 21:51

作者: Friction    時間: 2025-4-2 02:34

作者: Oscillate    時間: 2025-4-2 04:00
Computational Biomechanics for Medicinetion in recent years, produces enormous text data related to the human behaviours based on their interactions with each other. This data is intrinsically unstructured and ambiguous in nature. The data involves incorrect spellings and inaccurate grammars leading to lexical, syntactic and semantic amb
作者: 奇思怪想    時間: 2025-4-2 08:06





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
皋兰县| 衡水市| 闽侯县| 瑞金市| 万源市| 赣州市| 乐业县| 孟村| 盱眙县| 岳阳县| 桐柏县| 章丘市| 神农架林区| 南宁市| 福州市| 吴旗县| 兴山县| 香港| 金乡县| 武宣县| 大新县| 丹东市| 定结县| 丹阳市| 新乡市| 琼海市| 尼玛县| 利辛县| 鸡东县| 察隅县| 平安县| 和林格尔县| 犍为县| 崇信县| 克什克腾旗| 无棣县| 广昌县| 会同县| 商河县| 东光县| 天祝|