Occlusion 发表于 2025-3-26 21:25:11

https://doi.org/10.1057/9780230270329, and we will also make comparisons of the different techniques used mainly in binary or multi-class classification, and we will evaluate the possibility of using embedded systems to accomplish the tasks solved by DL.

平淡而无味 发表于 2025-3-27 03:52:29

http://reply.papertrans.cn/29/2820/281945/281945_32.png

教唆 发表于 2025-3-27 08:39:27

http://reply.papertrans.cn/29/2820/281945/281945_33.png

归功于 发表于 2025-3-27 12:18:37

Security and Privacy Issues in Smart City,elaborate on the various challenges that are posed by the security and confidentiality of a person’s data. Furthermore, we underline on the multiple open research methodology that is used to target the security and private areas in the smart cities and addresses the existing solutions.

敬礼 发表于 2025-3-27 17:04:24

Anomaly Detection-Based Negative Selection Algorithm,urther, during the training phase traditional classification algorithms require samples for total classes. This chapter begins with a review of anomaly detection. Then, we present a description of negative selection algorithms.

Encapsulate 发表于 2025-3-27 17:58:45

Strategic Prediction of Sustainable Development Territory on the Basis of Convergence Processes,nt a practical implementation of indicators value forecasting methods for the socioeconomic development of the territory. They propose information technology modules for the automation of socioeconomic analysis and develop the appropriate software.

hallow 发表于 2025-3-28 01:59:51

http://reply.papertrans.cn/29/2820/281945/281945_37.png

护身符 发表于 2025-3-28 05:05:42

https://doi.org/10.1057/9780230253162formation to drivers and enhance road safety is based on the transmission between vehicles and Road Side Unit (RSU) connected by a wireless. The attackers may cause the dropping of incoming packets and creates one of the most security challenges: the black hole. Proposed study aims to identify and exclude attackers from the SDN-based VANET.

嘲笑 发表于 2025-3-28 09:36:58

https://doi.org/10.1057/9780230253162s. To evaluate the efficiency of the proposed model, a performance-based comparison was made with anther routing model. The simulation results show that the proposed model has a better performance in terms of global energy consumption and network load.

deforestation 发表于 2025-3-28 13:43:11

https://doi.org/10.1057/9780230253162technology for certificate revocation. Then we propose a new approach for a lightweight PKI based in elliptic curve cryptography (ECC); furthermore, we present a public key infrastructure model for certificate revocation, as well we elaborate the deployment of the presented Model.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Distributed Sensing and Intelligent Systems; Proceedings of ICDSI Mohamed Elhoseny,Xiaohui Yuan,Salah-ddine Krit Conference proceedings 202