找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Communication, Networks and Computing; Third International Ranjeet Singh Tomar,Shekhar Verma,Ramjee Prasad Conference proceedings 2023 The

[复制链接]
楼主: 武士精神
发表于 2025-3-23 11:52:30 | 显示全部楼层
COVID-19 Detection Using State-of-the-Art Deep Learning Models on X-Ray and CT Imagespatient reveals the existence of COVID-19. The performance measures used to evaluate these models are compared in this research. This research suggests that when compared to other models, the GDCNN model performs better. These findings suggest that the DarkCovidNet and DenseNet201-based TL models wo
发表于 2025-3-23 15:39:45 | 显示全部楼层
Sniffit: A Packet Sniffing Tool Using Wiresharkall a new sniffer tool called sniffit and to introduce the protocols that are used to analyse packets. According to implementation results, the Sniffer tool builds a packet database that is encoded. Moreover, the front end shows the relevant data in response to user requests or needs.
发表于 2025-3-23 20:16:19 | 显示全部楼层
发表于 2025-3-24 01:33:10 | 显示全部楼层
发表于 2025-3-24 05:18:53 | 显示全部楼层
发表于 2025-3-24 09:12:02 | 显示全部楼层
发表于 2025-3-24 10:47:13 | 显示全部楼层
发表于 2025-3-24 17:30:15 | 显示全部楼层
Methodologies to Classify Faults in Power Transmission Linesctrical power transmission lines in order to improve the efficiency of the system and avert catastrophic damage. A wide variety of methods are proposed in the technical literature for this goal. This survey paper examines different methodologies used to classify faults in an electrical power transmi
发表于 2025-3-24 21:34:34 | 显示全部楼层
Recent Copy Move Forgery Detection Techniques: A Reviewthenticity and trustworthiness of digital images has become a challenging task. Thus, copy-move forgery detection (CMFD) has become one of the key domains in the current research field for the authentication of digital images. Copy-move forgery is the way of duplicating one area in an image over ano
发表于 2025-3-25 01:09:33 | 显示全部楼层
A Robust Graphical Authentication System for the Shoulder Surfing Attackser knows. Every security system is created in such a way that it must include at least one authentication technique to safeguard an individual’s identity. There are numerous authentication methods available today, but each method has its own advantages and drawbacks that allow attackers to carry ou
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-25 22:12
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表