找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Second International Conference on Computer Networks and Communication Technologies; ICCNCT 2019 S. Smys,Tomonobu Senjyu,Pavel Lafata Confe

[复制链接]
楼主: Auditory-Nerve
发表于 2025-3-25 06:52:30 | 显示全部楼层
The New Approach for Creating the Knowledge Base Using WikiPedia,t traverse through the Wikipedia graph and builds knowledge base using similarity measurement between seed data and traversed upcoming pages of wiki graph. Any expert AI systems uses gold standard knowledge base to take any decisions.
发表于 2025-3-25 08:38:33 | 显示全部楼层
发表于 2025-3-25 14:27:49 | 显示全部楼层
Framework for Data Hiding Operation Using Motion Vectors for Effective Imperceptibility Performancesecret information among different ends in a vulnerable network. However, majority of data hiding scheme evolved till date is focused on its embedding capacity or else focused on introducing the distinct parameters of encryption. However, all these approaches will not only make the embedded file bul
发表于 2025-3-25 18:20:26 | 显示全部楼层
Privacy Protection and Con Dentiality in Medical IoT,oT device. The ranges of security in these methods are different in various IoT architectures. This paper is a comparative study of these security schemes to determine which scheme allows the fastest and most accurate output. Our findings indicate that the attribute matching functions decreases the
发表于 2025-3-25 20:28:19 | 显示全部楼层
发表于 2025-3-26 00:12:59 | 显示全部楼层
A Healthcare Application Model for Smarthome Using Frequent Pattern Based KNN Algorithm,. So in this century, the studies behind this idea are growing fast. In urban areas most of the homes are being equipped with smart devices and therefore the scope of the healthcare applications in this area can be done without any awkwardness. In this paper, the data collected from the smart device
发表于 2025-3-26 08:10:17 | 显示全部楼层
发表于 2025-3-26 10:23:51 | 显示全部楼层
Data Science for Internet of Things (IoT),erates more than 2.5 quintillion bytes of statistics step by step, which could basically impact the business shapes. There is no doubt that the rising technology of IoE (Internet of Everything) is dependent on Data Science concept. The Industrial Internet of Things (IIoT) which makes up a good propo
发表于 2025-3-26 15:47:17 | 显示全部楼层
ECDSEC: An Efficient Group Key Management Scheme for Secure Data Sharing Among Mobile Users in Cloucybercriminal can hack the sensitive documents in the cloud and sell it for mere profit or a cloud server may be curious to learn the contents of documents. Though many works for securely distributing the keys to the mobile cloud users have been proposed, they are vulnerable to attacks and incur hig
发表于 2025-3-26 19:14:03 | 显示全部楼层
Comparative Study on Deep Learning Frameworks for Object Detection,gnition of object is imminent to identify numerous pertinent objects from an image or video. Several deep neural learning, machine learning based techniques are used for object detection in digital images and videos. This paper discusses a comparative study of some deep learning based object detecti
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 14:16
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表