即席演说 发表于 2025-3-28 16:41:00

http://reply.papertrans.cn/17/1622/162144/162144_41.png

小臼 发表于 2025-3-28 19:50:58

,A Comprehensive Survey on RF Module at 433 MHz for Different Applications,The RF that is discussed in this paper works on 433 MHz frequency, and various applications using the same are mentioned. RF technology is widely used in many situations to ease the difficulty. The RF has a transmitter section and a receiver section. The data is analysed differently based on the application.

格言 发表于 2025-3-29 00:04:35

A Novel Approach for Analysing and Detection of Obfuscated Malware Payloads in Android Platform Usithey develop from being repackaged and analysed. These tools and techniques obfuscate and encrypt the strings and classes, API calls and control flows in the Dalvik bytecode. The obfuscated and encrypted Android applications which are obtained from sources such as Koodous, Virus Total, etc. need to

代替 发表于 2025-3-29 05:32:49

http://reply.papertrans.cn/17/1622/162144/162144_44.png

最初 发表于 2025-3-29 09:34:32

http://reply.papertrans.cn/17/1622/162144/162144_45.png

Resign 发表于 2025-3-29 13:33:53

Stable Multi-agent Clustering Method to Improve the Security in VANET,ty, traffic information, performance, data splitting, etc. Clustering is an effective method for dealing with the regular shift in vehicular ad hoc network topology by regional coordination. We present stable clustering based on multi-agent to give stable, which in convert combination the life of th

发表于 2025-3-29 19:28:42

Anonymous Block Chain, Electronic Voting Using Linkable Ring Signatures,egrity, and availability of votes. The application of block chain in electronic voting seems to match the above qualities of an electronic voting system. However, recent researches have shown that block chain technology lacks anonymity. Transactions are pseudonymous and not anonymous. For this cause

说明 发表于 2025-3-29 23:03:39

A Comprehensive Study on Ransomware Attacks in Online Pharmacy Community,mprised of a ransomware Petya malicious virus. Online pharmacy communities are doing their best for delivering care and treatment with Internet support, but the attackers exploit vulnerabilities in operating systems to identify software flaws. The attackers access patient summary records and threate

prolate 发表于 2025-3-30 02:17:13

,A Comprehensive Survey on RF Module at 433 MHz for Different Applications,ison of those applications. This paper has also a glimpse of various components in RF. It also talks about the significance of various modules of RF. The RF that is discussed in this paper works on 433 MHz frequency, and various applications using the same are mentioned. RF technology is widely used

缺陷 发表于 2025-3-30 05:20:56

A Memory-Efficient Tool for Bengali Parts of Speech Tagging, detect the parts of speech of words in a Bengali sentence with higher accuracy and memory optimization. In this study, we develop such a parts of speech tagging tool specifically for those people who want to learn or research on Bengali grammar. Besides, it has an impact on the quality of education
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Artificial Intelligence Techniques for Advanced Computing Applications; Proceedings of ICACT D. Jude Hemanth,G. Vadivu,Valentina Emilia Bal