充满装饰 发表于 2025-3-30 11:39:47

Dynamic Priority Based Application Offloading Strategy in Mobile Cloud Computing. In paper [.], the cloudlets were selected based on the execution time. Execution time of the applications is a fixed parameter and therefore it was a static priority algorithm. In this paper, we are going to introduce the dynamic priority algorithm for the selection of the cloudlets to offload an

nonsensical 发表于 2025-3-30 15:02:43

http://reply.papertrans.cn/24/2325/232473/232473_52.png

善辩 发表于 2025-3-30 20:28:01

Authentication and Access Control by Face Recognition and Intrusion Detection System, however none of them function completely error-free. This study uses face detection and recognition by Haar cascade classifier and LBPH for authentication initially, and then an intrusion detection system (IDS) using machine learning algorithm like FNT and KNN can identify fraudulent behavior. The

atrophy 发表于 2025-3-31 00:20:44

http://reply.papertrans.cn/24/2325/232473/232473_54.png

Type-1-Diabetes 发表于 2025-3-31 03:36:59

Qualitative and Quantitative Analysis of Modifications in Playfair Cipher Multiple encryption techniques are used to ensure the same. Certain famous classical ciphers which were in prevalent use during ancient times are now not robust enough to keep up with security requirements of modern world. This paper analyses the different modifications proposed to one such cipher

狂乱 发表于 2025-3-31 09:03:10

http://reply.papertrans.cn/24/2325/232473/232473_56.png

Aspirin 发表于 2025-3-31 11:02:11

http://reply.papertrans.cn/24/2325/232473/232473_57.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Computational Intelligence in Communications and Business Analytics; 5th International Co Kousik Dasgupta,Somnath Mukhopadhyay,Paramartha D