喊叫 发表于 2025-3-23 10:36:06

A Comprehensive Survey on Passive Video Forgery Detection Techniques,ement of genuineness and uprightness of inventiveness. With the progression in innovation, video preparing apparatuses and procedures are accessible for modifying the recordings for falsification. The adjustment or changes in current video is imperative to identify, since this video can be utilized

灰姑娘 发表于 2025-3-23 15:04:28

DDOS Detection Using Machine Learning Technique,enial-of-service (DDoS) attack is a persistent attack which affects the availability of the network. Command and Control (C & C) mechanism is used to perform such kind of attack. Various researchers have proposed different methods based on machine learning technique to detect these attacks. In this

Jogging 发表于 2025-3-23 22:06:53

Enhancements in Performance of Reduced Order Modelling of Large-Scale Control Systems,le systems to easier the task to study the large-scale systems. In this paper, the enhancements occurring in the field of model order reduction is studied with the help of a test example. The initially developed techniques like balanced truncation are studied and compared with newly developed MOR te

rheumatism 发表于 2025-3-24 01:37:57

http://reply.papertrans.cn/83/8234/823357/823357_14.png

Kidney-Failure 发表于 2025-3-24 04:30:56

http://reply.papertrans.cn/83/8234/823357/823357_15.png

adroit 发表于 2025-3-24 07:12:56

IBRP: An Infrastructure-Based Routing Protocol Using Static Clusters in Urban VANETs,ity to control the network infrastructure. The data routing is one of the most significant challenges in VANETs due to its special characteristics. In this paper, an effective cluster-based routing algorithm for VANETs has been proposed. Unlike other clustering approaches, RSUs have been considered

homocysteine 发表于 2025-3-24 13:45:59

A Comprehensive Survey on Passive Video Forgery Detection Techniques,ntra-frame forgery & compression-based forgery detection that can be used for video tampering detection. Thorough analysis of newly developed techniques, passive video forgery detection is helpful for finding the problems and getting out new opportunities in the area of passive video forgery detection.

Adulate 发表于 2025-3-24 17:48:27

http://reply.papertrans.cn/83/8234/823357/823357_18.png

太空 发表于 2025-3-24 21:27:59

An Efficient Link Prediction Model Using Supervised Machine Learning,ted through a graph or sociograph. Supervised machine learning approach has been used for classification of potential node pairs for possible links. The proposed model is trained and tested using standard available online social network datasets and evaluated on state-of-the-art performance parameters.

攀登 发表于 2025-3-24 23:55:58

DDOS Detection Using Machine Learning Technique,paper, DDoS attack was performed using ping of death technique and detected using machine learning technique by using WEKA tool. NSL-KDD dataset was used in this experiment. Random forest algorithm was used to perform classification of the normal and attack samples. 99.76% of the samples were correctly classified.
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Recent Studies on Computational Intelligence; Doctoral Symposium o Ashish Khanna,Awadhesh Kumar Singh,Abhishek Swaroo Book 2021 The Editor(