ALT
发表于 2025-3-25 03:34:10
Performance Study of Multi-target Tracking Using Kalman Filter and Hungarian Algorithm,with two different data sets. In Data set – I, no target leave or enter the frame and in Data set – II, targets leave and enter the frame at regular intervals. This tracking method deals with the data association problem that arises with multiple targets in a single frame and also the dimensionality
荣幸
发表于 2025-3-25 10:48:37
SaaS - Microservices-Based Scalable Smart Contract Architecture,endent business logic, they run on a single monolithic container. This dependence on a monolithic container can be a performance bottleneck during the processing of a large number of transactions. To address this challenge, microservice-based architecture is adopted in the blockchain smart contracts
minion
发表于 2025-3-25 11:45:25
GIDS: Anomaly Detection Using Generative Adversarial Networks, learning technique has been used in advanced intrusion detection system (IDS) which detects new attacks by analyzing existing attacks’ metrics with the help of rich collection of datasets. Generative Adversarial Networks (GAN) has found lots of attentions in recent times, in particular, for forgery
摘要记录
发表于 2025-3-25 18:22:40
Audio Steganography Using Multi LSB and IGS Techniques, necessity. In this paper, different methodologies are explored to find an efficient steganographic method for embedding one form of data into another, with the aim of enhancing data security. The proposed approach involves embedding an image into an audio signal. Image encryption methods are also e
Glaci冰
发表于 2025-3-25 21:36:08
http://reply.papertrans.cn/87/8636/863584/863584_25.png
BOOST
发表于 2025-3-26 02:42:24
http://reply.papertrans.cn/87/8636/863584/863584_26.png
jettison
发表于 2025-3-26 05:23:25
http://reply.papertrans.cn/87/8636/863584/863584_27.png
放肆的你
发表于 2025-3-26 10:35:45
http://reply.papertrans.cn/87/8636/863584/863584_28.png
药物
发表于 2025-3-26 12:39:58
http://reply.papertrans.cn/87/8636/863584/863584_29.png
FID
发表于 2025-3-26 19:09:23
Conference proceedings 2021ted were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy..