找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Networks and Inventive Communication Technologies; Proceedings of Fourt S. Smys,Robert Bestak,Ivan Kotuliak Conference proceedings

[复制链接]
楼主: Fillmore
发表于 2025-3-23 09:47:47 | 显示全部楼层
Design of Prioritized ,-Wise Testingh develops a parking management software that actually identifies the existence of parking areas. The data from video footage is used to train the Mask R-CNN architecture, where a computer vision image recognition model is used to automatically identify the parking spaces. To label the car parking p
发表于 2025-3-23 15:31:30 | 显示全部楼层
发表于 2025-3-23 21:57:51 | 显示全部楼层
Computer Networks and Inventive Communication TechnologiesProceedings of Fourt
发表于 2025-3-23 22:21:53 | 显示全部楼层
2367-4512 ection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advanced work in the area. 978-981-16-3727-8978-981-16-3728-5Series ISSN 2367-4512 Series E-ISSN 2367-4520
发表于 2025-3-24 05:26:44 | 显示全部楼层
Energy Efficient Clustering in Wireless Sensor Networks by Opposition-Based Initialization Bat Algovalidated by conducting a comparative analysis with its original version, and also with other metaheuristics approaches that were tested for the same problem. Obtained results from conducted experiments suggest that the proposed method’s performance is superior, and that it could bring valuable resu
发表于 2025-3-24 08:32:32 | 显示全部楼层
Job Scheduling in Cloud Computing Based on DGPSO,em capacity, memory size, and processing speed. On the dataset, the task sizes are examined and separated according to the priority levels. On which the high priority comprises video files, the audio files under medium-level priority, and the remaining text documents, ppts, etc. included in under lo
发表于 2025-3-24 12:16:44 | 显示全部楼层
发表于 2025-3-24 16:49:26 | 显示全部楼层
发表于 2025-3-24 21:42:57 | 显示全部楼层
Affine Recurrence Based Key Scheduling Algorithm for the Advanced Encryption Standard,orithm of the AES. It has also been tested to have inferior strict avalanche criteria in comparison with other contenders of the AES such as Serpent and Twofish. Usage of the concept of affine recurrence ensures this in the proposed model. In affine recurrence, no two outputs of the operation will h
发表于 2025-3-25 03:14:25 | 显示全部楼层
Simplify Your Neural Networks: An Empirical Study on Cross-Project Defect Prediction, in a particular field. In this paper, we tackle this problem by testing six different NNs on a dataset of twenty software from the PROMISE repository in a strict CPDP setting. We then compare the best architecture to three proposed methods for CPDP, which cover a wide range of scenarios. During our
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-6 04:44
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表