约会 发表于 2025-3-25 06:17:46

Phishing Detection Using Computer Vision, deep learning and machine learning classifiers to detect phishing website and their brands. Some of the experiments include Transfer Learning and Representation Learning techniques by utilizing various off-the-shelf Convolutional Neural Network (CNN) architectures to extract image features. It is o

Middle-Ear 发表于 2025-3-25 09:26:59

Keylogger Threat to the Android Mobile Banking Applications,ts are being used for financial communications with the banks or financial institutions, by allowing clients and users to conduct a variety of transactions. In android app store (Google Play) keylogger apps are initially blocked but using some vulnerabilities in app permission it can be installed wi

Accede 发表于 2025-3-25 12:51:40

Irrelevant Racist Tweets Identification Using Data Mining Techniques, helps in finding the relevance of text content in the tweet and its hashtag #whitelivesmatter in specific. In this paper, supervised data analysis techniques like text classification are used to get the required output.

我邪恶 发表于 2025-3-25 17:30:21

Smart Farming System Using IoT and Cloud,y, and temperature. Also, this research work implements proper measures for those concepts on receiving the collected information without human input and later the detected quantities are stored for further data analysis within the cloud. Real-time feeds are being supervised upon this webpage as wel

Abjure 发表于 2025-3-25 23:04:40

http://reply.papertrans.cn/24/2337/233664/233664_25.png

使痛苦 发表于 2025-3-26 00:27:39

Deep Face-Iris Recognition Using Robust Image Segmentation and Hyperparameter Tuning,ll deep learning algorithms are provided with augmented data, included in the tuning process, enabling additional accuracy gains. Highlights include near-perfect fivefold cross-validation accuracy on the IITD-Iris dataset when performing identification. Verification tests were carried out on the cha

Fissure 发表于 2025-3-26 06:17:22

http://reply.papertrans.cn/24/2337/233664/233664_27.png

Focus-Words 发表于 2025-3-26 10:54:03

http://reply.papertrans.cn/24/2337/233664/233664_28.png

面包屑 发表于 2025-3-26 15:19:48

http://reply.papertrans.cn/24/2337/233664/233664_29.png

稀释前 发表于 2025-3-26 17:24:37

http://reply.papertrans.cn/24/2337/233664/233664_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Computer Networks and Inventive Communication Technologies; Proceedings of Fourt S. Smys,Robert Bestak,Ivan Kotuliak Conference proceedings