找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Research in Computer Science; 6th Conference, CRI Paulin Melatagia Yonta,Kamel Barkaoui,Omer-Blaise Conference proceedings 2024 The Edito

[复制链接]
楼主: inroad
发表于 2025-3-26 21:12:29 | 显示全部楼层
发表于 2025-3-27 01:19:50 | 显示全部楼层
Conference proceedings 2024ember 12-13, 2023. ..The 16 full papers included in this book were carefully reviewed and selected from 72 submissions. The CRI 2023 proceedings focus on artificial intelligence, machine learning, natural language processing, computer vision, cryptography and distributed computing..
发表于 2025-3-27 08:52:15 | 显示全部楼层
,Application of the Multilingual Acoustic Representation Model XLSR-53 for the Transcription of Ewonn, . . . ) and Ewondo strongly impacts the performance of the transcription model. The highest performances obtained are around 70.8% on the WER and 28% on the CER. An analysis of these preliminary results is carried out and then interpreted; in order to ultimately propose effective ways of improvement.
发表于 2025-3-27 12:41:25 | 显示全部楼层
发表于 2025-3-27 15:38:07 | 显示全部楼层
,Building and Validating an Ontology for Public Procurement: The Case of Cameroon,y that semantically describes the publication stage of the public procurement process. We use the . ontology to generate a knowledge graph for Cameroonian public procurement that will facilitate information retrieval and data analysis in Cameroonian public procurement.
发表于 2025-3-27 18:51:30 | 显示全部楼层
发表于 2025-3-27 23:22:23 | 显示全部楼层
,A New Hybrid Algorithm Based on Ant Colony Optimization and Recurrent Neural Networks with Attentioights are then used to predict the next towns to visit for each city. Experimental results on instances TSP from the TSPLIB library demonstrate that this hybrid approach is better compared to the classic ACO.
发表于 2025-3-28 04:46:18 | 显示全部楼层
,Two High Capacity Text Steganography Schemes Based on Color Coding,nd to the receiver by mail. After experiments, the results obtained show that our models performs a better hiding process in terms of hiding capacity as compared to the scheme of Aruna Malik et al. on which our idea is based.
发表于 2025-3-28 07:21:43 | 显示全部楼层
,Integration of the Triple Block Data Security Model Based on Distributed Crypto-Steganography in a rate the published security model in any type of distributed system such as Cloud, Grids or Clusters Computing. The integration of this solution is tested in a real cluster environment and data integrity tests showed the effectiveness of the deployment.
发表于 2025-3-28 12:47:39 | 显示全部楼层
,Convolutional Neural Network Based Detection Approach of Undesirable SMS (Short Message Service) innicate easily. Many commercial companies, entities or individuals also use SMS to send out advertisements, unwanted messages containing links or malicious content that may violate customer privacy. This raises the question of how to help users to avoid being trapped? Several works have been proposed
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-10 14:32
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表