meritorious 发表于 2025-3-25 06:53:38

Implications of Forensic Investigation in Dark Webes such as drug trafficking, money laundering, and cybercrime. Dark web forensics involves the collection, analysis, and preservation of digital evidence from the dark web, which presents several challenges such as anonymity, encryption, and the use of cryptocurrencies. This paper presents a compreh

量被毁坏 发表于 2025-3-25 09:51:12

http://reply.papertrans.cn/24/2305/230491/230491_22.png

DUCE 发表于 2025-3-25 12:01:47

Prevention and Detection of Poisoning Attacks in Medical-Based Machine Learning Web Applications motives to change the outcomes of the models and applications generated by algorithms and techniques of machine learning. The project revolves around the detection and prevention of poisoning attacks on the medical models of machine learning by either an Anomaly detection method or cryptographicall

方便 发表于 2025-3-25 19:19:45

http://reply.papertrans.cn/24/2305/230491/230491_24.png

一致性 发表于 2025-3-25 21:06:31

Securing Internet of Things Using Machine Learning Techniques: A Systematic Reviewd the stationing of huge number associated smart and familiar appliances in evaluative system like industries, Agriculture, Healthcare, Transportation, Home automation and environment control. The data transmission over the network without necessitating of any human to human (H2H) or human to machin

Tortuous 发表于 2025-3-26 00:27:50

http://reply.papertrans.cn/24/2305/230491/230491_26.png

正式通知 发表于 2025-3-26 06:13:44

COVID-19 Detection Using State-of-the-Art Deep Learning Models on X-Ray and CT Imagesrd for detecting COVID-19 illness relies on nasopharyngeal swabs, which can lead to mistakes due to human error. These tests are not sensitive enough to be used for early diagnosis. These disadvantages highlight the requirement for a completely automated system that can detect COVID-19 disorders uti

TOXIN 发表于 2025-3-26 09:54:20

http://reply.papertrans.cn/24/2305/230491/230491_28.png

额外的事 发表于 2025-3-26 13:58:13

Sniffit: A Packet Sniffing Tool Using Wiresharklity to manage computer networks effectively and efficiently. Sniffer allows us to control, observe, and record passwords used for telnet, user login, and FTP connections. Without changing them, this inspects and sniffs packets as they move via a network. Network administrators can evaluate, compreh

Eructation 发表于 2025-3-26 17:36:45

Analysis and Comparison of Posture Detection Using Deep Learning Algorithmdeep learning. The paper reviews the literature of deep learning algorithm for posture recognition. We describe the algorithms and literature of deep learning that were most widely used for posture detection and did a comparative analysis based on parameters that were used in literature.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Communication, Networks and Computing; Third International Ranjeet Singh Tomar,Shekhar Verma,Ramjee Prasad Conference proceedings 2023 The