Искусственный интеллект - 004.8

Научные статьи

В разделе "Искусственный интеллект"
Improving the Proactive Recommendation in Smart Home Environments: An Approach Based on Case Based Reasoning and BP-Neural Network
Gouttaya Nesrine, Belghini Naouar, Begdouri Ahlame, Zarghili Arslane
Energy Aware Ad Hoc On-Demand Multipath Distance Vector Routing
Koffka Khan, Wayne Goodridge
A Few Applications of Imprecise Matrices
Sahalad Borgoyary
Fuzzy Agent Oriented Software Effort Estimate with COCOMO
Mohammad Saber Iraji
Trust Based Resource Selection in Cloud Computing Using Hybrid Algorithm
V.Suresh Kumar, M. Aramudhan
Biometric Person Identification System: A Multimodal Approach Employing Spectral Graph Characteristics of Hand Geometry and Palmprint
Shanmukhappa A. Angadi, Sanjeevakumar M. Hatture
Detection of Metamorphic Malware based on HMM: A Hierarchical Approach
Mina Gharacheh, Vali Derhami, Sattar Hashemi, Seyed Mehdi Hazrati Fard
Proposed Representation Approach Based on Description Logics Formalism
Yasser Yahiaoui, Ahmed Lehireche, Djelloul Bouchiha
Reliable Mobile Ad-Hoc Network Routing Using Firefly Algorithm
D Jinil Persis, T Paul Robert
Steganographic Data Hiding using Modified APSO
E Divya, P Raj Kumar
Automated Forecasting Approach Minimizing Prediction Errors of CPU Availability in Distributed Computing Systems
N. Chabbah Sekma, A. Elleuch, N. Dridi
A Review on Large Scale Graph Processing Using Big Data Based Parallel Programming Models
Anuraj Mohan, Remya G
Using Machine Learning Techniques to Support Group Formation in an Online Collaborative Learning Environment
Elizaphan M. Maina, Robert O. Oboko, Peter W. Waiganjo
An Empirical Perspective of Roundtrip Engineering for the Development of Secure Web Application Using UML 2.0
Nitish Pathak, B. M. Singh, Girish Sharma
Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control
Luqun Li
Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks
Wazir Zada Khan, Xiang, Mohammed Y Aalsalem, Quratulain Arshad
A Model of Workflow-oriented Attributed Based Access Control
Guoping Zhang, Jing Liu
The Research of Unconditionally Secure Authentication Code For Multi-Source Network Coding
Hong Yang, Mingxi Yang
A Novel Framework to Carry Out Cloud Penetration Test
Jianbin Hu, Yonggang Wang, Cong Tang, Zhi Guan, Fengxian Ren, Zhong Chen
Searching Methods of MP2P Based on Diffusion Strategy of Resources Index
Fangfang Guo, Jing Xu
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
Manjusha Pandey, Shekhar Verma
Deliberate Secure Grid Computing Blueprint Design in Indian Context
Sanjeev Puri, Harsh Dev
A Robust Image Steganography using DWT Difference Modulation (DWTDM)
Souvik Bhattacharyya, Gautam Sanyal
A Procedure of Text Steganography Using Indian Regional Language
Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal
Methodology for Benchmarking IPsec Gateways
Adam Tisovský, Ivan Baroňák
Self Organized Replica Overlay Scheme for P2P Networks
Shashi Bhushan, Mayank Dave, R. B. Patel
Application of Artificial Neural Network for Clutter Rejection
Priyabrata Karmakar, Sourav Dhar, Mithun Chakraborty, Tirthankar Paul
Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols
G.Sunayana, Sukrutharaj.M, Lalitha rani.N, M.B.Kamakshi
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
IBalasaheb N. Jagdale, Nileema S. Gawande
Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach
G.RoslineNesakumari, V.Vijayakumar, B.V.Ramana Reddy
User's Profile Replication Tree and On Demand Replica Update in Wireless Communication
Prem Nath, Chiranjeev Kumar
A Novel Routing Scheme for Mobile Ad Hoc Network
Prem Chand, M.K.Soni
Analysis of Reconfigurable Processors Using Petri Net
Hadis Heidari
Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation
Awadhesh Kumar, Prabhat Singh, Vinay Kumar, Neeraj Tyagi
Improved Trial Division Technique for Primality Checking in RSA Algorithm
Kumarjit Banerjee, Satyendra Nath Mandal, Sanjoy Kumar Das
Performance Evaluation of Routing Protocols in Vehicular Networks
Ameur BENNAOUI, Mustapha GUEZOURI, Mokhtar KECHE
An Update based Energy-Efficient Reactive Routing Protocol for Mobile Ad Hoc Networks
Dhirendra Kumar Sharma, Amar Nath Patra, Chiranjeev Kumar
Performance Evaluation and Comparison of Network Firewalls under DDoS Attack
Chirag Sheth, Rajesh Thakker
An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding
Aarti, Pushpendra K Rajput
Classification via Clustering for Anonymization Data
Sridhar Mandapati, Raveendra Babu Bhogapathi, M.V.P.C.Sekhara Rao