找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: International Conference on Innovative Computing and Communications; Proceedings of ICICC Deepak Gupta,Ashish Khanna,Ajay Jaiswal Conferenc

[復(fù)制鏈接]
樓主: 雜技演員
11#
發(fā)表于 2025-3-23 11:14:09 | 只看該作者
Malware Classification Using Multi-layer Perceptron Model,, loss function and alpha (regularization parameter) are used for training the multi-layer perceptron model to develop the optimal malware classifier. The proposed malware classifier produced an accuracy of 99.2% using the Adam loss function in binary classification of the?executable files.
12#
發(fā)表于 2025-3-23 17:13:26 | 只看該作者
Protocol Random Forest Model to Enhance the Effectiveness of Intrusion Detection Identification,. Three protocol datasets, which represent subsets of the NSL-KDD dataset, are used for the experiment. The finding is sufficient to prove that our protocol random forest (Protocol-RF) model detects the attacks with the highest precision of 0.907 and a low false-positive rate of 0.001.
13#
發(fā)表于 2025-3-23 19:48:30 | 只看該作者
14#
發(fā)表于 2025-3-24 00:39:48 | 只看該作者
Conference proceedings 2021ative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications..
15#
發(fā)表于 2025-3-24 05:18:35 | 只看該作者
Selection of Probabilistic Data Structures for SPV Wallet Filtering,er which has much better ability to perform than bloom filter by means of limited counting, offers deletion algorithm, and also maintains the space complexity at the same time. Cuckoo hashing can be used to resolve collisions and maintain a compressed cuckoo hash table.
16#
發(fā)表于 2025-3-24 08:23:47 | 只看該作者
A Dummy Location Generation Model for Location Privacy in Vehicular Ad hoc Networks, applications require the access to location of vehicles participating in the network and may lead to life-threatening situations. Hence, a careful solution is required while sharing the credentials including location. In this work, we propose to use the dummy location generation of the vehicles. Th
17#
發(fā)表于 2025-3-24 13:56:30 | 只看該作者
18#
發(fā)表于 2025-3-24 17:48:28 | 只看該作者
19#
發(fā)表于 2025-3-24 19:44:56 | 只看該作者
20#
發(fā)表于 2025-3-25 01:03:42 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-28 15:51
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
巢湖市| 永登县| 府谷县| 成武县| 图们市| 碌曲县| 图木舒克市| 龙山县| 遂溪县| 自贡市| 汕尾市| 上杭县| 南平市| 永丰县| 竹北市| 林周县| 罗定市| 舒城县| 阿图什市| 宜宾县| 仙游县| 五原县| 乌鲁木齐县| 苏州市| 阿瓦提县| 巴南区| 金门县| 西林县| 鞍山市| 琼海市| 通化市| 十堰市| 高雄市| 嘉鱼县| 乌恰县| 克什克腾旗| 南阳市| 贡嘎县| 读书| 射阳县| 宁远县|