派博傳思國際中心

標題: Titlebook: Data Science and Security; Proceedings of IDSCS Samiksha Shukla,Aynur Unal,Dong Seog Han Conference proceedings 2021 The Editor(s) (if appl [打印本頁]

作者: HABIT    時間: 2025-3-21 19:35
書目名稱Data Science and Security影響因子(影響力)




書目名稱Data Science and Security影響因子(影響力)學(xué)科排名




書目名稱Data Science and Security網(wǎng)絡(luò)公開度




書目名稱Data Science and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Data Science and Security被引頻次




書目名稱Data Science and Security被引頻次學(xué)科排名




書目名稱Data Science and Security年度引用




書目名稱Data Science and Security年度引用學(xué)科排名




書目名稱Data Science and Security讀者反饋




書目名稱Data Science and Security讀者反饋學(xué)科排名





作者: 立即    時間: 2025-3-21 23:31
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/d/image/263108.jpg
作者: 不適當    時間: 2025-3-22 03:30

作者: 教義    時間: 2025-3-22 06:28
https://doi.org/10.1007/978-1-4939-8618-7 abnormal RBCs, the first step in this algorithm identifies the regions of interest depending on morphology operations and the second step uses the rotate features to verify that the detected object is an abnormal RBCs. Two criteria were used to measure detection accuracy depending on the detection
作者: 正論    時間: 2025-3-22 09:31

作者: 吞噬    時間: 2025-3-22 13:59
https://doi.org/10.1007/978-1-4939-8639-2tack. This attack is meant to temporarily or indefinitely make unavailable a machine or network resources thereby making the system inaccessible. In this paper, an intrusion detection system is built using Deep Learning approaches Deep neural network and Convolutional Neural Network to detect DoS at
作者: 吞噬    時間: 2025-3-22 20:06

作者: 高度贊揚    時間: 2025-3-22 22:57

作者: 貝雷帽    時間: 2025-3-23 05:12
Parsing Compound–Protein Bioactivity Tables healthcare helps medical professionals monitor patients and provide services remotely. With the increased adoption of IoMT comes an increased risk profile. Private and confidential medical data is gathered across various IoMT devices and transmitted to medical servers. Privacy breach or unauthorize
作者: Culmination    時間: 2025-3-23 08:20
https://doi.org/10.1007/978-3-031-37499-9sis and reduce mortality rates. This paper concerns sensitivity analysis on an existing cervical cancer risk classification algorithm with respect to the number of epochs, number of neurons in the input layer (NIN), and number of neurons in the hidden layer (NNIHL). Sensitivity analysis is used to a
作者: 誘拐    時間: 2025-3-23 11:05
STAR-1 Content: Speaker’s Perspective order to ensure secure transmission of data. The proposed algorithm in this paper uses line graphs along with adjacency matrix and matrix properties to encrypt and decrypt data securely in order to arrive at a ciphertext using a shared-key.
作者: lactic    時間: 2025-3-23 15:49
https://doi.org/10.1007/978-3-031-37499-9paper, a new algorithm was proposed to improve aerial images. The proposed algorithm using Dark Channel Prior (DCP) to enhance the color compounds only in HSV space and a Multiscale Retinex (MSR) using to enhance the lightness component in the same space. To know the efficiency of enhancement aerial
作者: overbearing    時間: 2025-3-23 19:14
STAR-2 Content: Hearer’s Perspectivened environments with constraints like energy, power and bandwidth. Wormhole attack is a highly alarming attack in mobile ad hoc networks., where an attacking node, on receipt of a packet at one location, replays them at another one, which is situated remotely far distance. In this comparative analy
作者: 浮雕    時間: 2025-3-23 23:17
Conclusion: the Fundamental Alternativesaused due to unhealthy lifestyles and diet. Considering this, recognizing the right type and amount of food to eat with a suitable exercise set is essential to obtain good health. The proposed work develops a framework to recommend the proper diet plans for thyroid patients, and medical experts vali
作者: Arctic    時間: 2025-3-24 02:50

作者: cacophony    時間: 2025-3-24 07:47

作者: 極小    時間: 2025-3-24 12:01

作者: Muscularis    時間: 2025-3-24 16:35
Ben Aidlin,Armin Shmilovici,Mark Last recommender system which is ontology focused and complaint to Web 3.0. In view of this challenge, we present Ontology Driven Framework for web service recommendation (ODFWR) which considers User Query, Web Usage Data of the user, Metadata, Dynamically Modeled Ontology, Real-World Application Stores
作者: Isolate    時間: 2025-3-24 21:06

作者: 沉著    時間: 2025-3-24 23:48
https://doi.org/10.1007/978-3-030-63007-2ticity. The heteroskedasticity is associated with event when clusters from single sample are characterized by different values of variance. In operation theory heteroskedasticity occurs in case of equipment technical condition deterioration. The paper describes the method for taking into account het
作者: Stagger    時間: 2025-3-25 07:00
Computational Collective Intelligenceiences combined with new technologies, revealed an outbreak of certain large amounts of genomic sequences. Analysis of such huge data in an appropriate way will ensure accurate prediction of disease which helps to adopt preventive mechanisms which can ultimately improve the human quality of life. In
作者: Interim    時間: 2025-3-25 10:56
https://doi.org/10.1007/978-981-16-4486-3Data Science; Artificial Intelligence; Machine Learning; Quantum Computing; Data and Network Security; Co
作者: Restenosis    時間: 2025-3-25 12:04
978-981-16-4485-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
作者: 沙文主義    時間: 2025-3-25 19:42
Data Science and Security978-981-16-4486-3Series ISSN 2367-3370 Series E-ISSN 2367-3389
作者: 向外    時間: 2025-3-25 21:42

作者: hedonic    時間: 2025-3-26 01:49

作者: 碎石    時間: 2025-3-26 05:27
Parsing Compound–Protein Bioactivity Tablesf privacy in ML, classifies current privacy threats, and describes state-of-the-art mitigation techniques named Privacy-Preserving Machine Learning (PPML) techniques. The paper compares existing PPML techniques based on relevant parameters, thereby presenting gaps in the existing literature and proposing probable future research drifts.
作者: 樹膠    時間: 2025-3-26 09:17
https://doi.org/10.1007/978-3-031-37499-9re used to see the quality of the proposed method in comparison with DCP, Histogram equalization (HE), Image Entropy and Information Fidelity (IEIF) and Multiscale Retinex with color restoration (MSRCR). Through the analysis of the results, it is found that the proposed method has succeeded in improving aerial images better than other methods.
作者: 親愛    時間: 2025-3-26 14:40
ViewpointS: Towards a Collective Brainhich are then matched with ontologies and hence classification is done using deep learning-based classifier. A series of experiments are taken up on these news documents, and hence an inference for the proposed method is marked out for it being much reliable than other existing systems for emotion detection of a text document.
作者: 建筑師    時間: 2025-3-26 18:39

作者: Juvenile    時間: 2025-3-26 22:55
Computational Collective Intelligence for security and privacy concerns and a new taxonomy proposed that could accommodate all potential threats. A detailed review of available security and privacy audit tools has also been done for common smart contract platforms. At last, identified the challenges required to be addressed to make the smart contract more efficient.
作者: 江湖騙子    時間: 2025-3-27 03:06

作者: 粗野    時間: 2025-3-27 07:50
A Systematic Review of Challenges and Techniques of Privacy-Preserving Machine Learning,f privacy in ML, classifies current privacy threats, and describes state-of-the-art mitigation techniques named Privacy-Preserving Machine Learning (PPML) techniques. The paper compares existing PPML techniques based on relevant parameters, thereby presenting gaps in the existing literature and proposing probable future research drifts.
作者: synovitis    時間: 2025-3-27 11:35

作者: 變異    時間: 2025-3-27 16:54

作者: Esophagus    時間: 2025-3-27 20:21

作者: Chipmunk    時間: 2025-3-28 01:33
Smart Contract Security and Privacy Taxonomy, Tools, and Challenges, for security and privacy concerns and a new taxonomy proposed that could accommodate all potential threats. A detailed review of available security and privacy audit tools has also been done for common smart contract platforms. At last, identified the challenges required to be addressed to make the smart contract more efficient.
作者: 慢慢流出    時間: 2025-3-28 05:48

作者: dearth    時間: 2025-3-28 08:51

作者: 思想    時間: 2025-3-28 12:13
Deep Learning Methods for Intrusion Detection System,his paper, an intrusion detection system is built using Deep Learning approaches Deep neural network and Convolutional Neural Network to detect DoS attacks. CICIDS2017 dataset is used to train the model and test the performance of the model. The experimental trials show that the proposed model outperforms all the previously implemented models.
作者: 個阿姨勾引你    時間: 2025-3-28 18:33

作者: ANNUL    時間: 2025-3-28 21:55

作者: anticipate    時間: 2025-3-29 02:25

作者: 無法治愈    時間: 2025-3-29 05:53

作者: 清晰    時間: 2025-3-29 09:26
2367-3370 , during March 2021.Serves as a reference for researchers an.This book presents the best-selected?papers presented at the International Conference on Data Science, Computation and Security (IDSCS-2021), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus
作者: 盤旋    時間: 2025-3-29 11:41

作者: 落葉劑    時間: 2025-3-29 16:00
https://doi.org/10.1007/978-1-4939-8639-2his paper, an intrusion detection system is built using Deep Learning approaches Deep neural network and Convolutional Neural Network to detect DoS attacks. CICIDS2017 dataset is used to train the model and test the performance of the model. The experimental trials show that the proposed model outperforms all the previously implemented models.
作者: fender    時間: 2025-3-29 20:09

作者: 知識    時間: 2025-3-30 01:00

作者: 比喻好    時間: 2025-3-30 04:23

作者: diathermy    時間: 2025-3-30 10:43

作者: Itinerant    時間: 2025-3-30 14:22
STAR-2 Content: Hearer’s Perspectivehe performance with respect to packet delivery ratio, throughput, packet loss, average end to end delay and jitter. At last depending upon the simulation we explored the most impacted routing protocol with respect to network metrics.
作者: glisten    時間: 2025-3-30 18:56
Ben Aidlin,Armin Shmilovici,Mark Lastd other variations of the ODFWR and it was found that ODFWR is superior in terms of performance where the precision, recall, accuracy, F-measure and FDR of 96.89, 98.84, 97.18, 97.86% and 0.0311 respectively.
作者: shrill    時間: 2025-3-30 22:50

作者: 聯(lián)想    時間: 2025-3-31 00:55

作者: triptans    時間: 2025-3-31 06:32

作者: Inveterate    時間: 2025-3-31 12:22
ODFWR: An Ontology Driven Framework for Web Service Recommendation,d other variations of the ODFWR and it was found that ODFWR is superior in terms of performance where the precision, recall, accuracy, F-measure and FDR of 96.89, 98.84, 97.18, 97.86% and 0.0311 respectively.
作者: PANEL    時間: 2025-3-31 13:33

作者: 精密    時間: 2025-3-31 19:50





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
宁武县| 江西省| 社旗县| 甘孜县| 高陵县| 太谷县| 五大连池市| 宁明县| 宁阳县| 陆良县| 托克托县| 金溪县| 青铜峡市| 廉江市| 夏邑县| 丰镇市| 龙江县| 南京市| 团风县| 呈贡县| 浮山县| 山西省| 盘山县| 随州市| 肇庆市| 嵩明县| 柳河县| 江都市| 松阳县| 彭泽县| 云安县| 防城港市| 丹棱县| 衡阳县| 沙洋县| 盱眙县| 富阳市| 葫芦岛市| 正蓝旗| 全州县| 甘德县|