找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: International Conference on Advanced Computing Networking and Informatics; ICANI-2018 Raj Kamal,Michael Henshaw,Pramod S. Nair Conference p

[复制链接]
楼主: 转变
发表于 2025-3-23 13:15:46 | 显示全部楼层
Person-Dependent Face Recognition Using Histogram of Oriented Gradients (HOG) and Convolution Neuraon system for person-dependent and person-independent variants. To extract relevant facial features, we are using the convolutional neural network. These features allow comparing faces of different subjects in an optimized manner. The system training module, firstly recognizes different subjects of
发表于 2025-3-23 17:24:02 | 显示全部楼层
发表于 2025-3-23 20:06:33 | 显示全部楼层
发表于 2025-3-23 22:58:46 | 显示全部楼层
Enhanced Entity Extraction Using Big Data Mechanics, like social networking, organizations and any business applications. Big data refers to enormous digital data that are high in volume, velocity, varieties. The traditional conventional approach fails to handle large data sets using their tools and techniques. Big data proved to be an effective mean
发表于 2025-3-24 04:04:43 | 显示全部楼层
Sharing Organizational Data Outside Its Domain Using ABE in Cloud Environment, and organizations to put their data online. Organizations are outsourcing their shared data on cloud storage systems for low maintenance cost and flexibility. The outsourced data may be sensitive, so it is stored in encrypted form. There are a large number of users with different privileges and aut
发表于 2025-3-24 09:41:09 | 显示全部楼层
Improving the Cloud Server Resource Management in Uncertain Load Conditions Using ACO and Linear Red memory units. These infrastructures are not working alone they are always shared with the other cloud infrastructures. Therefore these services can deal with the fluctuating loads on servers. Additionally, scaled when more and more resource requirements appears. Therefore any of the servers can fa
发表于 2025-3-24 13:19:15 | 显示全部楼层
发表于 2025-3-24 16:37:25 | 显示全部楼层
发表于 2025-3-24 19:18:15 | 显示全部楼层
A Framework for Data Storage Security with Efficient Computing in Cloud,ction according to the classification of data. In this framework, cloud service provider (CSP) selects the eminent server using cuckoo algorithm with Markov chain process and Levy’s flight. After server selection, user encrypts their data using elliptic curve integrated encryption scheme (ECIES) at
发表于 2025-3-24 23:20:39 | 显示全部楼层
Trust and Security to Shared Data in Cloud Computing: Open Issues,er expected to restrict the authorised or unauthorised users from modification. It is essential to have a robust cryptographic mechanism which can provide fine-grained data access control with confidentiality, authenticity and anonymity at the same time. In addition, framework is needed for analysin
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-6 03:28
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表