ALT 发表于 2025-3-25 03:34:10

Performance Study of Multi-target Tracking Using Kalman Filter and Hungarian Algorithm,with two different data sets. In Data set – I, no target leave or enter the frame and in Data set – II, targets leave and enter the frame at regular intervals. This tracking method deals with the data association problem that arises with multiple targets in a single frame and also the dimensionality

荣幸 发表于 2025-3-25 10:48:37

SaaS - Microservices-Based Scalable Smart Contract Architecture,endent business logic, they run on a single monolithic container. This dependence on a monolithic container can be a performance bottleneck during the processing of a large number of transactions. To address this challenge, microservice-based architecture is adopted in the blockchain smart contracts

minion 发表于 2025-3-25 11:45:25

GIDS: Anomaly Detection Using Generative Adversarial Networks, learning technique has been used in advanced intrusion detection system (IDS) which detects new attacks by analyzing existing attacks’ metrics with the help of rich collection of datasets. Generative Adversarial Networks (GAN) has found lots of attentions in recent times, in particular, for forgery

摘要记录 发表于 2025-3-25 18:22:40

Audio Steganography Using Multi LSB and IGS Techniques, necessity. In this paper, different methodologies are explored to find an efficient steganographic method for embedding one form of data into another, with the aim of enhancing data security. The proposed approach involves embedding an image into an audio signal. Image encryption methods are also e

Glaci冰 发表于 2025-3-25 21:36:08

http://reply.papertrans.cn/87/8636/863584/863584_25.png

BOOST 发表于 2025-3-26 02:42:24

http://reply.papertrans.cn/87/8636/863584/863584_26.png

jettison 发表于 2025-3-26 05:23:25

http://reply.papertrans.cn/87/8636/863584/863584_27.png

放肆的你 发表于 2025-3-26 10:35:45

http://reply.papertrans.cn/87/8636/863584/863584_28.png

药物 发表于 2025-3-26 12:39:58

http://reply.papertrans.cn/87/8636/863584/863584_29.png

FID 发表于 2025-3-26 19:09:23

Conference proceedings 2021ted were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy..
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Security in Computing and Communications; 8th International Sy Sabu M. Thampi,Guojun Wang,Chun-I Fan Conference proceedings 2021 Springer N