可以任性 发表于 2025-3-25 04:47:49
http://reply.papertrans.cn/39/3827/382661/382661_21.pngdura-mater 发表于 2025-3-25 10:25:51
Improving the Searching Capacity of Evolved Bat Algorithm by the Periodic Signalcapacity of the evolved bat algorithm. Three test functions, of which the global optimum values are known, are used in the experiments. The experimental results indicate that our proposed strategy improves the searching accuracy of the evolved bat algorithm about 45.722% in average.Intentional 发表于 2025-3-25 15:39:25
http://reply.papertrans.cn/39/3827/382661/382661_23.png骄傲 发表于 2025-3-25 19:01:05
A New Digital Image Compression Method Using Chrestenson Transform is first proved in [.] that Chrestenson transform of p-adic process is equivalent to K-L transform. We proposes a new method to generate the p-adic process from image data by extrapolating the data in a specific way. The result is verified and proved by initial simulations, and our method is shown to outperform the usual DCT transform.该得 发表于 2025-3-25 21:32:21
Design of Multifunctional Communication Card Based on Reflective Memoryodel and physical model, the card has serial interface and the ability of interaction with reflective memory network through serial interface. The experiments proved that the multifunctional communication card’s bandwidth is up to 30 MB/s, its bit error rate is lower than 10., its time delay is up to the rank of the deep microsecond.隐藏 发表于 2025-3-26 04:04:18
Robust Reversible Colour Image Digital Watermarking Using Offset Coefficient Technique generated by the proposed method is good while the payload size is superior to existing techniques. Moreover, the marked images generated by our method are resisting from manipulations such as brightness, contrast, color quantization, equalized, (edge) sharpening, inversion, JPEG, JPEG2000, noise additions, pixel-truncation, and winding.断断续续 发表于 2025-3-26 07:54:02
Enhancement of Preventing Application Layer Based on DDOS Attacks by Using Hidden Semi-Markov Modelnot been solved yet. The defense approaches can be classified as protection, detection and prevention. Therefore, for information security, it is needed to create own DDoS defense system to solve the DDoS attack problems. The aim of the research work is to protect Distributed Denial of Service attacks.投射 发表于 2025-3-26 12:10:02
http://reply.papertrans.cn/39/3827/382661/382661_28.png诱使 发表于 2025-3-26 12:51:37
http://reply.papertrans.cn/39/3827/382661/382661_29.png浅滩 发表于 2025-3-26 17:37:17
http://reply.papertrans.cn/39/3827/382661/382661_30.png