找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Artificial Intelligence Techniques for Advanced Computing Applications; Proceedings of ICACT D. Jude Hemanth,G. Vadivu,Valentina Emilia Bal

[复制链接]
楼主: 并排一起
发表于 2025-3-28 16:41:00 | 显示全部楼层
发表于 2025-3-28 19:50:58 | 显示全部楼层
,A Comprehensive Survey on RF Module at 433 MHz for Different Applications,The RF that is discussed in this paper works on 433 MHz frequency, and various applications using the same are mentioned. RF technology is widely used in many situations to ease the difficulty. The RF has a transmitter section and a receiver section. The data is analysed differently based on the application.
发表于 2025-3-29 00:04:35 | 显示全部楼层
A Novel Approach for Analysing and Detection of Obfuscated Malware Payloads in Android Platform Usithey develop from being repackaged and analysed. These tools and techniques obfuscate and encrypt the strings and classes, API calls and control flows in the Dalvik bytecode. The obfuscated and encrypted Android applications which are obtained from sources such as Koodous, Virus Total, etc. need to
发表于 2025-3-29 05:32:49 | 显示全部楼层
发表于 2025-3-29 09:34:32 | 显示全部楼层
发表于 2025-3-29 13:33:53 | 显示全部楼层
Stable Multi-agent Clustering Method to Improve the Security in VANET,ty, traffic information, performance, data splitting, etc. Clustering is an effective method for dealing with the regular shift in vehicular ad hoc network topology by regional coordination. We present stable clustering based on multi-agent to give stable, which in convert combination the life of th
发表于 2025-3-29 19:28:42 | 显示全部楼层
Anonymous Block Chain, Electronic Voting Using Linkable Ring Signatures,egrity, and availability of votes. The application of block chain in electronic voting seems to match the above qualities of an electronic voting system. However, recent researches have shown that block chain technology lacks anonymity. Transactions are pseudonymous and not anonymous. For this cause
发表于 2025-3-29 23:03:39 | 显示全部楼层
A Comprehensive Study on Ransomware Attacks in Online Pharmacy Community,mprised of a ransomware Petya malicious virus. Online pharmacy communities are doing their best for delivering care and treatment with Internet support, but the attackers exploit vulnerabilities in operating systems to identify software flaws. The attackers access patient summary records and threate
发表于 2025-3-30 02:17:13 | 显示全部楼层
,A Comprehensive Survey on RF Module at 433 MHz for Different Applications,ison of those applications. This paper has also a glimpse of various components in RF. It also talks about the significance of various modules of RF. The RF that is discussed in this paper works on 433 MHz frequency, and various applications using the same are mentioned. RF technology is widely used
发表于 2025-3-30 05:20:56 | 显示全部楼层
A Memory-Efficient Tool for Bengali Parts of Speech Tagging, detect the parts of speech of words in a Bengali sentence with higher accuracy and memory optimization. In this study, we develop such a parts of speech tagging tool specifically for those people who want to learn or research on Bengali grammar. Besides, it has an impact on the quality of education
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-14 05:30
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表