Noctambulant 发表于 2025-3-23 11:52:30

COVID-19 Detection Using State-of-the-Art Deep Learning Models on X-Ray and CT Imagespatient reveals the existence of COVID-19. The performance measures used to evaluate these models are compared in this research. This research suggests that when compared to other models, the GDCNN model performs better. These findings suggest that the DarkCovidNet and DenseNet201-based TL models wo

fibroblast 发表于 2025-3-23 15:39:45

Sniffit: A Packet Sniffing Tool Using Wiresharkall a new sniffer tool called sniffit and to introduce the protocols that are used to analyse packets. According to implementation results, the Sniffer tool builds a packet database that is encoded. Moreover, the front end shows the relevant data in response to user requests or needs.

concert 发表于 2025-3-23 20:16:19

http://reply.papertrans.cn/24/2305/230491/230491_13.png

鸵鸟 发表于 2025-3-24 01:33:10

http://reply.papertrans.cn/24/2305/230491/230491_14.png

aerobic 发表于 2025-3-24 05:18:53

http://reply.papertrans.cn/24/2305/230491/230491_15.png

constellation 发表于 2025-3-24 09:12:02

http://reply.papertrans.cn/24/2305/230491/230491_16.png

富饶 发表于 2025-3-24 10:47:13

http://reply.papertrans.cn/24/2305/230491/230491_17.png

约会 发表于 2025-3-24 17:30:15

Methodologies to Classify Faults in Power Transmission Linesctrical power transmission lines in order to improve the efficiency of the system and avert catastrophic damage. A wide variety of methods are proposed in the technical literature for this goal. This survey paper examines different methodologies used to classify faults in an electrical power transmi

ferment 发表于 2025-3-24 21:34:34

Recent Copy Move Forgery Detection Techniques: A Reviewthenticity and trustworthiness of digital images has become a challenging task. Thus, copy-move forgery detection (CMFD) has become one of the key domains in the current research field for the authentication of digital images. Copy-move forgery is the way of duplicating one area in an image over ano

温顺 发表于 2025-3-25 01:09:33

A Robust Graphical Authentication System for the Shoulder Surfing Attackser knows. Every security system is created in such a way that it must include at least one authentication technique to safeguard an individual’s identity. There are numerous authentication methods available today, but each method has its own advantages and drawbacks that allow attackers to carry ou
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Communication, Networks and Computing; Third International Ranjeet Singh Tomar,Shekhar Verma,Ramjee Prasad Conference proceedings 2023 The