Cerebrovascular 发表于 2025-3-25 07:07:20
http://reply.papertrans.cn/48/4701/470015/470015_21.png发源 发表于 2025-3-25 09:05:06
http://reply.papertrans.cn/48/4701/470015/470015_22.png带子 发表于 2025-3-25 11:48:00
,Detection of Fake URLs Using Deep LSTM Architecture over Social Media,enience comes with challenges as Clickbait and malicious activities pose significant risks to users and such cybercrimes result in substantial financial losses annually. Addressing this issue is paramount to safeguard users and maintain the integrity of OSNs. This study proposes a two-level Uniform拥挤前 发表于 2025-3-25 19:00:44
http://reply.papertrans.cn/48/4701/470015/470015_24.pngMortal 发表于 2025-3-25 22:08:32
,A Hybrid Differential-Evolution-Based Approach to the Sensor Network Localisation Problem,calisation problem can be mathematically formulated as a graph realisation problem where the positions of the nodes have to be estimated based on the information about some other nodes. To solve this problem, we propose a hybrid differential evolution algorithm. Comparisons with other methods conducJAMB 发表于 2025-3-26 03:35:40
A Review on Physical Abuse Detection Techniques Using Video Surveillance Systems,ention as a potential tool for detecting and preventing physical abuse incidents. This review paper presents an in-depth analysis of the existing literature on physical abuse detection using video surveillance systems. The review begins by discussing the importance of physical abuse detection, applialleviate 发表于 2025-3-26 05:53:12
http://reply.papertrans.cn/48/4701/470015/470015_27.pngAsparagus 发表于 2025-3-26 11:12:39
,A Simple Genetic Algorithm for the Maximum Min-Sum Dispersion Problem (Max-MinSum DP) and New Node cle, a new genetic algorithm is proposed to solve the base variant of the problem. Comparisons with other methods show the effectiveness of the proposed algorithm. As a further step, we extend the dispersion problem: Instead of the basic distance function, other node similarity-based measures are us言行自由 发表于 2025-3-26 16:36:42
Towards Analysis of Threat Modeling of Software Systems According to Key Criteria,rious techniques and methodologies are integrated to ensure software security in the software development life cycle. This includes applying diverse approaches and methodologies for preventing threats and attacks on software. Various methodologies, such as modeling potential threats and attacks on s上腭 发表于 2025-3-26 19:16:11
,Deepfake Detection System for Facial Evidence Verification in Criminal Justice and Its Legal and Etvideos and images raises concerns about the authenticity and admissibility of such evidence in court. This research proposes a deepfake detection system for facial evidence verification to combat the threat of deepfake technology on facial evidence in criminal justice. Our experimental results indic