bibliophile 发表于 2025-3-26 21:12:29
http://reply.papertrans.cn/83/8280/827968/827968_31.pngcardiac-arrest 发表于 2025-3-27 01:19:50
Conference proceedings 2024ember 12-13, 2023. ..The 16 full papers included in this book were carefully reviewed and selected from 72 submissions. The CRI 2023 proceedings focus on artificial intelligence, machine learning, natural language processing, computer vision, cryptography and distributed computing..Anhydrous 发表于 2025-3-27 08:52:15
,Application of the Multilingual Acoustic Representation Model XLSR-53 for the Transcription of Ewonn, . . . ) and Ewondo strongly impacts the performance of the transcription model. The highest performances obtained are around 70.8% on the WER and 28% on the CER. An analysis of these preliminary results is carried out and then interpreted; in order to ultimately propose effective ways of improvement.吞噬 发表于 2025-3-27 12:41:25
http://reply.papertrans.cn/83/8280/827968/827968_34.png冬眠 发表于 2025-3-27 15:38:07
,Building and Validating an Ontology for Public Procurement: The Case of Cameroon,y that semantically describes the publication stage of the public procurement process. We use the . ontology to generate a knowledge graph for Cameroonian public procurement that will facilitate information retrieval and data analysis in Cameroonian public procurement.憎恶 发表于 2025-3-27 18:51:30
http://reply.papertrans.cn/83/8280/827968/827968_36.pngobscurity 发表于 2025-3-27 23:22:23
,A New Hybrid Algorithm Based on Ant Colony Optimization and Recurrent Neural Networks with Attentioights are then used to predict the next towns to visit for each city. Experimental results on instances TSP from the TSPLIB library demonstrate that this hybrid approach is better compared to the classic ACO.装入胶囊 发表于 2025-3-28 04:46:18
,Two High Capacity Text Steganography Schemes Based on Color Coding,nd to the receiver by mail. After experiments, the results obtained show that our models performs a better hiding process in terms of hiding capacity as compared to the scheme of Aruna Malik et al. on which our idea is based.pulse-pressure 发表于 2025-3-28 07:21:43
,Integration of the Triple Block Data Security Model Based on Distributed Crypto-Steganography in a rate the published security model in any type of distributed system such as Cloud, Grids or Clusters Computing. The integration of this solution is tested in a real cluster environment and data integrity tests showed the effectiveness of the deployment.Working-Memory 发表于 2025-3-28 12:47:39
,Convolutional Neural Network Based Detection Approach of Undesirable SMS (Short Message Service) innicate easily. Many commercial companies, entities or individuals also use SMS to send out advertisements, unwanted messages containing links or malicious content that may violate customer privacy. This raises the question of how to help users to avoid being trapped? Several works have been proposed