Spinous-Process 发表于 2025-3-25 06:52:30

The New Approach for Creating the Knowledge Base Using WikiPedia,t traverse through the Wikipedia graph and builds knowledge base using similarity measurement between seed data and traversed upcoming pages of wiki graph. Any expert AI systems uses gold standard knowledge base to take any decisions.

植物学 发表于 2025-3-25 08:38:33

http://reply.papertrans.cn/87/8632/863135/863135_22.png

Infiltrate 发表于 2025-3-25 14:27:49

Framework for Data Hiding Operation Using Motion Vectors for Effective Imperceptibility Performancesecret information among different ends in a vulnerable network. However, majority of data hiding scheme evolved till date is focused on its embedding capacity or else focused on introducing the distinct parameters of encryption. However, all these approaches will not only make the embedded file bul

Dealing 发表于 2025-3-25 18:20:26

Privacy Protection and Con Dentiality in Medical IoT,oT device. The ranges of security in these methods are different in various IoT architectures. This paper is a comparative study of these security schemes to determine which scheme allows the fastest and most accurate output. Our findings indicate that the attribute matching functions decreases the

pacific 发表于 2025-3-25 20:28:19

http://reply.papertrans.cn/87/8632/863135/863135_25.png

懒惰人民 发表于 2025-3-26 00:12:59

A Healthcare Application Model for Smarthome Using Frequent Pattern Based KNN Algorithm,. So in this century, the studies behind this idea are growing fast. In urban areas most of the homes are being equipped with smart devices and therefore the scope of the healthcare applications in this area can be done without any awkwardness. In this paper, the data collected from the smart device

extemporaneous 发表于 2025-3-26 08:10:17

http://reply.papertrans.cn/87/8632/863135/863135_27.png

没血色 发表于 2025-3-26 10:23:51

Data Science for Internet of Things (IoT),erates more than 2.5 quintillion bytes of statistics step by step, which could basically impact the business shapes. There is no doubt that the rising technology of IoE (Internet of Everything) is dependent on Data Science concept. The Industrial Internet of Things (IIoT) which makes up a good propo

Cumbersome 发表于 2025-3-26 15:47:17

ECDSEC: An Efficient Group Key Management Scheme for Secure Data Sharing Among Mobile Users in Cloucybercriminal can hack the sensitive documents in the cloud and sell it for mere profit or a cloud server may be curious to learn the contents of documents. Though many works for securely distributing the keys to the mobile cloud users have been proposed, they are vulnerable to attacks and incur hig

不透明性 发表于 2025-3-26 19:14:03

Comparative Study on Deep Learning Frameworks for Object Detection,gnition of object is imminent to identify numerous pertinent objects from an image or video. Several deep neural learning, machine learning based techniques are used for object detection in digital images and videos. This paper discusses a comparative study of some deep learning based object detecti
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Second International Conference on Computer Networks and Communication Technologies; ICCNCT 2019 S. Smys,Tomonobu Senjyu,Pavel Lafata Confe