减少 发表于 2025-3-23 11:33:32

Snaring Cyber Attacks on IoT Devices with Honeynet,s things which interconnect uniquely in already prevailing Internet infrastructure called as the Internet of things. Due to wider implementation of IoT, devices are prone to cyber attacks. To beat those attacks, concept of a Honeypot is implemented in IoT. The Honeypot is the security resource frame

怕失去钱 发表于 2025-3-23 16:49:36

http://reply.papertrans.cn/24/2348/234797/234797_12.png

无目标 发表于 2025-3-23 21:55:44

Evaluation of e-NAM Adoption: A Case of ,, Gujarat,gricultural markets. e-NAM aims to reduce information asymmetry between buyers and sellers and facilitate the provision of real-time price discovery. Through a pilot study of the project in ., Gujarat, the authors intend to bring out the issues and challenges in adoption and implementation by variou

CHURL 发表于 2025-3-24 01:33:58

A New Technique for Extrinsic Text Summarization,t essential points of the primary text. The present work is one new type of extrinsic technique of summarization, which finds an exemplary subset of the original sentence set, which possesses the precise erudition of the primary text.

Noctambulant 发表于 2025-3-24 05:43:10

Dynamic Provisioning of Cloud Resources Based on Workload Prediction,vides various services like software as a service (SAAS), infrastructure as a service (IAAS) or anything as a service (XAAS) that is required to develop and deploy any business application. These cloud services are provided as virtual machines (VM) that can handle the end-user’s requirements. The cl

随意 发表于 2025-3-24 09:35:24

http://reply.papertrans.cn/24/2348/234797/234797_16.png

periodontitis 发表于 2025-3-24 12:13:23

The Role of Social Factors in Education: A Case Study in Social Network Perspective,ting and transmitting knowledge depends on so many social factors. Social network analysis is a growing body of research with a great deal of opportunities. The study of social network is a multidisciplinary area involving social, mathematical, statistical and computer sciences. The idea is to map s

散步 发表于 2025-3-24 16:29:16

Investigating the Effect of Compression and Decompression in Video Using Fractal Technique,and large amount of bandwidth for the transmission of video. The largest part of multimedia is video. There is upsurge in demand of compressed data due to excessive usage of multimedia applications on Internet. Hence in success of multimedia data, video compression and decompression are majorly used

清唱剧 发表于 2025-3-24 19:36:14

Classifier Ensembling: Dataset Learning Using Bagging and Boosting,ing have been projected such as association rules, decision trees, neural networks, etc. from many years it takes its position in center. The efficiency of the real time or artificial is being enhanced using certain data mining techniques like bagging and boosting and AdaBoost by which the accuracy

真实的人 发表于 2025-3-25 00:51:27

http://reply.papertrans.cn/24/2348/234797/234797_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Computing and Network Sustainability; Proceedings of IRSCN Sheng-Lung Peng,Nilanjan Dey,Mahesh Bundele Conference proceedings 2019 Springer