欲望 发表于 2025-3-28 14:49:22
http://reply.papertrans.cn/17/1623/162277/162277_41.png合适 发表于 2025-3-28 22:37:36
http://reply.papertrans.cn/17/1623/162277/162277_42.pngANNUL 发表于 2025-3-29 00:49:55
1865-0929 nce and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS...The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully rev有发明天才 发表于 2025-3-29 06:43:56
Erweiterung des Wertebereiches,es related to pre-set topics. This paper designs and implements a network data collector and in order to improve the search efficiency, this paper uses annealing genetic algorithm by studying the hybrid genetic algorithm based on simulated annealing. The result indicated the hybrid algorithm can increase page coverage and crawling efficiency.mydriatic 发表于 2025-3-29 08:21:00
Erweiterung des Wertebereiches, this paper focuses on the security problems of fog computing in industrial Internet and proposes a model for measuring the security situation of industrial fog Internet. In this paper, ELM algorithm is adopted to verify the proposed model. The result shows the effectiveness of the model, and ELM has a good performance in the prediction effect.Crayon 发表于 2025-3-29 11:36:07
http://reply.papertrans.cn/17/1623/162277/162277_46.png无脊椎 发表于 2025-3-29 18:42:50
http://reply.papertrans.cn/17/1623/162277/162277_47.pngosteoclasts 发表于 2025-3-29 21:55:21
The Study of Fog Computing Security Situation Prediction in Industrial Internet this paper focuses on the security problems of fog computing in industrial Internet and proposes a model for measuring the security situation of industrial fog Internet. In this paper, ELM algorithm is adopted to verify the proposed model. The result shows the effectiveness of the model, and ELM has a good performance in the prediction effect.Morphine 发表于 2025-3-30 00:42:31
A Novel Keypoints-Based Image Registration Method with Fully Convolutional Neural Networkperform key-points detection and feature extraction on the image, which is applied to the registration. Experiments show that the proposed method achieves better performance and is superior to the traditional key-points based registration method.LAP 发表于 2025-3-30 05:37:09
Conference proceedings 2020curity, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS...The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and