BRISK 发表于 2025-3-21 19:20:15

书目名称Applied Computing for Software and Smart Systems影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0159713<br><br>        <br><br>书目名称Applied Computing for Software and Smart Systems影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0159713<br><br>        <br><br>书目名称Applied Computing for Software and Smart Systems网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0159713<br><br>        <br><br>书目名称Applied Computing for Software and Smart Systems网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0159713<br><br>        <br><br>书目名称Applied Computing for Software and Smart Systems被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0159713<br><br>        <br><br>书目名称Applied Computing for Software and Smart Systems被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0159713<br><br>        <br><br>书目名称Applied Computing for Software and Smart Systems年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0159713<br><br>        <br><br>书目名称Applied Computing for Software and Smart Systems年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0159713<br><br>        <br><br>书目名称Applied Computing for Software and Smart Systems读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0159713<br><br>        <br><br>书目名称Applied Computing for Software and Smart Systems读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0159713<br><br>        <br><br>

草率女 发表于 2025-3-21 22:18:38

http://reply.papertrans.cn/16/1598/159713/159713_2.png

相容 发表于 2025-3-22 02:11:42

Protocol-Based Engineering of Microserviceser key using Sudoku-hash which provides a secured and authenticated encryption process. Our proposed method can resist brute force attacks, phishing attacks, man-in-the-middle attacks, dictionary attacks, and credential stuffing attacks in an efficient and effective way.

Type-1-Diabetes 发表于 2025-3-22 06:55:24

http://reply.papertrans.cn/16/1598/159713/159713_4.png

驳船 发表于 2025-3-22 12:05:53

CapsFraud: A Deep Method to Identify Fraudulent Transaction in Blockchain Using Capsule Network features, which causes abnormal behavior in financial transaction. Therefore, in this proposed work, a deep model has been incorporated with blockchain to identify the fraudulent transaction. The results reveal that the proposed method can recognize illicit transactions with gratifying performance.

Fermentation 发表于 2025-3-22 14:54:16

http://reply.papertrans.cn/16/1598/159713/159713_6.png

MONY 发表于 2025-3-22 17:15:58

http://reply.papertrans.cn/16/1598/159713/159713_7.png

罗盘 发表于 2025-3-22 22:44:26

http://reply.papertrans.cn/16/1598/159713/159713_8.png

Ophthalmoscope 发表于 2025-3-23 03:24:57

http://reply.papertrans.cn/16/1598/159713/159713_9.png

扩音器 发表于 2025-3-23 08:27:19

2367-3370 as a reference resource for researchers and practitioners in.This book features a collection of high-quality research papers presented at the 10th International Symposium on Applied Computing for Software and Smart systems (ACSS 2023), to be held during September 15–16, 2023, in Kolkata, India. The
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Applied Computing for Software and Smart Systems; Proceedings of ACSS Rituparna Chaki,Nabendu Chaki,Khalid Saeed Conference proceedings 20