colostrum 发表于 2025-3-28 18:31:04

A Comparative Study of Machine Learning Techniques for Phishing Website Detectionsteals the personal and credential information of the users. Website phishing is one of them in which attackers try to deceive the users by creating a fake website similar to the original one. In this paper, we have developed various machine learning-based phishing detection techniques to secure Int

售穴 发表于 2025-3-28 21:30:57

Source Camera Identification Using Hybrid Feature Set and Machine Learning Classifiersially in the domain of digital image forensics. Earlier, photo response non-uniformity (PRNU)–based methods were used to identify the source camera of images, but it involves a lot of complexity as PRNU noise gets highly contaminated by image scenes which results in the wrong classification. With th

博识 发表于 2025-3-29 00:49:47

http://reply.papertrans.cn/84/8316/831519/831519_43.png

矛盾心理 发表于 2025-3-29 06:04:48

Reliable System for Bidding System Using Blockchaind security. The work applies the blockchain method to the e-sale to determine the two issues. The blockchain is a shared access structure with the end goal that focuses on the structure can confide in one another focuses. Every area can safely convey, verify, and move information to any of different

600 发表于 2025-3-29 11:04:44

Security Challenges and Solutions for Next-Generation VANETs: An Exploratory Study communication technology and reduction in cost of advanced technologies increased the popularity of next-generation (NG) VANETs. In next-generation VANETs, vehicular communication is going to be deployed on a high-speed network in coming times. Therefore, NG-VANETs will play a key role in designing

WAG 发表于 2025-3-29 12:00:35

iTeach: A User-Friendly Learning Management Systemcorporation in education has enabled students to learn in different styles altogether by making the process more comfortable and empowering educators by developing automation tools to create content and effective teaching. Many prevalent platforms provide electronic learning functionality, but they

饮料 发表于 2025-3-29 18:33:42

http://reply.papertrans.cn/84/8316/831519/831519_47.png

SLAG 发表于 2025-3-29 22:14:48

http://reply.papertrans.cn/84/8316/831519/831519_48.png

性行为放纵者 发表于 2025-3-30 01:00:31

Medical Image Processing by Swarm-Based Methodsese images. In addition, there is a set of processes that are commonly applied to these images to obtain useful information for experts, such as segmentation or classification. Various techniques have been proposed over the years to apply these processes. This chapter describes the use of a novel me

LAIR 发表于 2025-3-30 06:01:46

Left Ventricle Volume Analysis in Cardiac MRI Images Using Convolutional Neural Networksere are numerous methods to detect cardiac diseases in the early stages. But in this chapter, we discussed convolutional neural networks, which are used to predict cardiovascular diseases. Convolutional neural networks are used for image segmentation, particularly for finding left ventricle volume s
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Role of Data-Intensive Distributed Computing Systems in Designing Data Solutions; Sarvesh Pandey,Udai Shanker,Rajinikumar Ramalingam Book