诱拐 发表于 2025-3-23 11:05:28

STAR-1 Content: Speaker’s Perspective order to ensure secure transmission of data. The proposed algorithm in this paper uses line graphs along with adjacency matrix and matrix properties to encrypt and decrypt data securely in order to arrive at a ciphertext using a shared-key.

lactic 发表于 2025-3-23 15:49:10

https://doi.org/10.1007/978-3-031-37499-9paper, a new algorithm was proposed to improve aerial images. The proposed algorithm using Dark Channel Prior (DCP) to enhance the color compounds only in HSV space and a Multiscale Retinex (MSR) using to enhance the lightness component in the same space. To know the efficiency of enhancement aerial

overbearing 发表于 2025-3-23 19:14:26

STAR-2 Content: Hearer’s Perspectivened environments with constraints like energy, power and bandwidth. Wormhole attack is a highly alarming attack in mobile ad hoc networks., where an attacking node, on receipt of a packet at one location, replays them at another one, which is situated remotely far distance. In this comparative analy

浮雕 发表于 2025-3-23 23:17:07

Conclusion: the Fundamental Alternativesaused due to unhealthy lifestyles and diet. Considering this, recognizing the right type and amount of food to eat with a suitable exercise set is essential to obtain good health. The proposed work develops a framework to recommend the proper diet plans for thyroid patients, and medical experts vali

Arctic 发表于 2025-3-24 02:50:08

http://reply.papertrans.cn/27/2632/263108/263108_15.png

cacophony 发表于 2025-3-24 07:47:20

http://reply.papertrans.cn/27/2632/263108/263108_16.png

极小 发表于 2025-3-24 12:01:36

http://reply.papertrans.cn/27/2632/263108/263108_17.png

Muscularis 发表于 2025-3-24 16:35:46

Ben Aidlin,Armin Shmilovici,Mark Last recommender system which is ontology focused and complaint to Web 3.0. In view of this challenge, we present Ontology Driven Framework for web service recommendation (ODFWR) which considers User Query, Web Usage Data of the user, Metadata, Dynamically Modeled Ontology, Real-World Application Stores

Isolate 发表于 2025-3-24 21:06:57

http://reply.papertrans.cn/27/2632/263108/263108_19.png

沉着 发表于 2025-3-24 23:48:57

https://doi.org/10.1007/978-3-030-63007-2ticity. The heteroskedasticity is associated with event when clusters from single sample are characterized by different values of variance. In operation theory heteroskedasticity occurs in case of equipment technical condition deterioration. The paper describes the method for taking into account het
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Data Science and Security; Proceedings of IDSCS Samiksha Shukla,Aynur Unal,Dong Seog Han Conference proceedings 2021 The Editor(s) (if appl