剥削 发表于 2025-3-26 23:10:56
A Metaheuristic Based Virtual Machine Allocation Technique Using Whale Optimization Algorithm in Cl of resources are allocated and deallocated on the datacenters in a fraction of the time using the virtual machine (VM). Thus, VM scheduling in cloud computing always remains a significant concern by cloud vendors to address the resource allocation problem. The critical concentration in this regard鬼魂 发表于 2025-3-27 03:51:59
Data Sampling-Based Feature Selection Framework for Software Defect Prediction,ls in software defect prediction (SDP). As a viable solution, data sampling and feature selection (FS) has been used to address the class imbalance and high dimensionality problem respectively. Most of the existing studies in SDP addressed these data quality problem individually which often affectsFallibility 发表于 2025-3-27 08:36:28
http://reply.papertrans.cn/48/4714/471384/471384_33.pngCRUMB 发表于 2025-3-27 11:51:14
Investigative Study of Unigram and Bigram Features for Short Message Spam Detection,ations. Studies have shown that spammers have used mobile short message service (SMS) and microblogging as a channel of communication for disseminating unsolicited spam messages containing novel words and abbreviation. Over the years, a growing number of research works have been conducted in the are不法行为 发表于 2025-3-27 15:52:24
Application of K-Nearest Neighbor Algorithm for Prediction of Television Advertisement Rating,n is the rating of the programs on the television. This parameter is also the consideration of advertisers in choosing a television station. For companies engaged in the advertising industry generally will provide offers to prospective customers using historical data related to ratings that have beeParameter 发表于 2025-3-27 20:39:43
http://reply.papertrans.cn/48/4714/471384/471384_36.pngSystemic 发表于 2025-3-27 23:20:42
An Evaluation of the Frameworks for Predicting COVID-19 in Nigeria Using Time Series Data Analyticss. The pandemic has resulted in the loss of thousands of lives, the collapse of businesses, indefinite closure of schools, and other activities resulting to the need for a ‘new normal’. Virologists, epidemiologists, and all other scientists are working round the clock to bring a stop to this ravaginHirsutism 发表于 2025-3-28 05:51:58
http://reply.papertrans.cn/48/4714/471384/471384_38.png适宜 发表于 2025-3-28 08:56:41
A Logistic Predictive Model for Determining the Prevalent Mode of Financial Cybercrime in Sub-Saharnd sensitive information from a target. Any crime perpetrated using a computer and/or the Internet is considered as cybercrime, of which cyber fraud is an aspect of. Cybercrime cost has been on the increase, estimated to cost the world over 6 trillion US Dollars by 2021. Its impact on all aspects ofaquatic 发表于 2025-3-28 13:37:05
PEDAM: Priority Execution Based Approach for Detecting Android Malware,determined to take advantage of over 2.5 billion monthly active users of Android devices. Despite Google’s various protection measures, android malware continues to grow in complexity and scope. In recent time, many research efforts have focused on detecting malware on the Android operating system u