表主动 发表于 2025-3-28 17:47:04
Vikash Kumar,Ashish Ranjan,Md Shah Fahad,Akshay Deepakmydriatic 发表于 2025-3-28 19:10:45
http://reply.papertrans.cn/87/8637/863630/863630_42.pngCRUMB 发表于 2025-3-29 01:18:41
Md Shah Fahad,Aparna Juhi,Shambhavi,Ashish Ranjan,Akshay Deepak观点 发表于 2025-3-29 04:32:51
Rishikesh Choudhari,M. Shivakumar,Shreyas Nandavar,Shruti Maigur,Saroja V. Siddamal,Suneeta V. BudihSTENT 发表于 2025-3-29 11:01:46
http://reply.papertrans.cn/87/8637/863630/863630_45.png不合 发表于 2025-3-29 12:51:20
http://reply.papertrans.cn/87/8637/863630/863630_46.png皱痕 发表于 2025-3-29 17:42:15
http://reply.papertrans.cn/87/8637/863630/863630_47.pnghomocysteine 发表于 2025-3-29 23:16:45
Detection of False Data Injection Cyber-Attack in Smart Grid by Convolutional Neural Network-Based ) are prepared, tuned and their performance are tested. Some Deep Learning (DL)-based models, e.g., Convolutional Neural Network (CNN), Artificial Neural Network (ANN) are also experimented with. The CNN models show better results, so a number of configurations are tested on. Finally, a CNN-based mo数量 发表于 2025-3-30 02:59:14
http://reply.papertrans.cn/87/8637/863630/863630_49.png合并 发表于 2025-3-30 08:02:04
Multimodal Biometric Authentication Using Watermarking Technique,mbining the feature, feature level fusion is used. The main concept of proposed technique is to use a fingerprint image and demographic data to watermark an individual‘s face and finger vein image. For embedding the watermark, PSO is used to select the best Discrete Cosine Transform (DCT) coefficien