本义 发表于 2025-3-21 17:09:53

书目名称Computing, Communication and Learning影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0234837<br><br>        <br><br>书目名称Computing, Communication and Learning影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0234837<br><br>        <br><br>书目名称Computing, Communication and Learning网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0234837<br><br>        <br><br>书目名称Computing, Communication and Learning网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0234837<br><br>        <br><br>书目名称Computing, Communication and Learning被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0234837<br><br>        <br><br>书目名称Computing, Communication and Learning被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0234837<br><br>        <br><br>书目名称Computing, Communication and Learning年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0234837<br><br>        <br><br>书目名称Computing, Communication and Learning年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0234837<br><br>        <br><br>书目名称Computing, Communication and Learning读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0234837<br><br>        <br><br>书目名称Computing, Communication and Learning读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0234837<br><br>        <br><br>

coalition 发表于 2025-3-21 22:02:25

Developing a Cloud Intrusion Detection System with Filter-Based Features Selection Techniques and SV of data kept in the cloud. Data is the gold of our era; thus, it is important to protect it against any attacks. The intrusion detection system IDS is considered among of the most important solutions that address security issues and threats in the different models of cloud service delivery. IDS-bas

异端 发表于 2025-3-22 01:21:08

http://reply.papertrans.cn/24/2349/234837/234837_3.png

hermitage 发表于 2025-3-22 05:06:45

http://reply.papertrans.cn/24/2349/234837/234837_4.png

harbinger 发表于 2025-3-22 08:58:33

Granular Access Control of Smart Contract Using Hyperledger Frameworkchain is that any changes incorporated by the authorized user in the system have been inserted into the transaction and would be traceable. The smart contract access control mechanisms have gained considerable attention since its applications. However, there are no systematic efforts to analyze exis

万神殿 发表于 2025-3-22 16:55:45

http://reply.papertrans.cn/24/2349/234837/234837_6.png

万神殿 发表于 2025-3-22 17:50:47

An Improved GWO Algorithm for Data Clusteringh process by mimicking the search for prey and attacking strategy of grey wolfs. To further improve its performance, here we have hybridized with Jaya algorithm that improves the exploration capability and hence maintains a trade between exploitation and exploration. An extensive simulation work is

mastoid-bone 发表于 2025-3-22 21:19:36

http://reply.papertrans.cn/24/2349/234837/234837_8.png

迅速成长 发表于 2025-3-23 04:52:50

http://reply.papertrans.cn/24/2349/234837/234837_9.png

帐单 发表于 2025-3-23 09:22:47

http://reply.papertrans.cn/24/2349/234837/234837_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Computing, Communication and Learning; First International Sanjaya Kumar Panda,Rashmi Ranjan Rout,Rajkumar Bu Conference proceedings 2022