ALT 发表于 2025-3-25 03:34:10
Performance Study of Multi-target Tracking Using Kalman Filter and Hungarian Algorithm,with two different data sets. In Data set – I, no target leave or enter the frame and in Data set – II, targets leave and enter the frame at regular intervals. This tracking method deals with the data association problem that arises with multiple targets in a single frame and also the dimensionality荣幸 发表于 2025-3-25 10:48:37
SaaS - Microservices-Based Scalable Smart Contract Architecture,endent business logic, they run on a single monolithic container. This dependence on a monolithic container can be a performance bottleneck during the processing of a large number of transactions. To address this challenge, microservice-based architecture is adopted in the blockchain smart contractsminion 发表于 2025-3-25 11:45:25
GIDS: Anomaly Detection Using Generative Adversarial Networks, learning technique has been used in advanced intrusion detection system (IDS) which detects new attacks by analyzing existing attacks’ metrics with the help of rich collection of datasets. Generative Adversarial Networks (GAN) has found lots of attentions in recent times, in particular, for forgery摘要记录 发表于 2025-3-25 18:22:40
Audio Steganography Using Multi LSB and IGS Techniques, necessity. In this paper, different methodologies are explored to find an efficient steganographic method for embedding one form of data into another, with the aim of enhancing data security. The proposed approach involves embedding an image into an audio signal. Image encryption methods are also eGlaci冰 发表于 2025-3-25 21:36:08
http://reply.papertrans.cn/87/8636/863584/863584_25.pngBOOST 发表于 2025-3-26 02:42:24
http://reply.papertrans.cn/87/8636/863584/863584_26.pngjettison 发表于 2025-3-26 05:23:25
http://reply.papertrans.cn/87/8636/863584/863584_27.png放肆的你 发表于 2025-3-26 10:35:45
http://reply.papertrans.cn/87/8636/863584/863584_28.png药物 发表于 2025-3-26 12:39:58
http://reply.papertrans.cn/87/8636/863584/863584_29.pngFID 发表于 2025-3-26 19:09:23
Conference proceedings 2021ted were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy..