Искусственный интеллект - 004.8

Научные статьи

В разделе "Искусственный интеллект"
Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme
Raman Kumar
Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System
Geetha Mary A, D.P. Acharjya, N. Ch. S. N. Iyengar
Distributed Monitoring for Wireless Sensor Networks: a Multi-Agent Approach
Bechar Rachid, Haffaf Hafid
Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network
Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari
HTTP Packet Inspection Policy for Improvising Internal Network Security
Kuldeep Tomar, S.S. Tyagi
Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2
Hassen Mestiri, Fatma Kahri, Belgacem Bouallegue, Mohsen Machhout
Performance Evaluation of Power Aware VM Consolidation using Live Migration
Gaganpreet Kaur Sehdev, Anil Kumar
Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count
Md. Ibrahim Abdullah, Mohammad Muntasir Rahman, Mukul Chandra Roy
Information Hiding Using Least Significant Bit Steganography and Cryptography
Shailender Gupta, Ankur Goyal, Bharat Bhushan
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
Alaeddin Almubayed, Ali Hadi, Jalal Atoum
Analysis of Base Station Assisted Novel Network Design Space for Edge-based WSNs
Muni Venkateswarlu K., A. Kandasamy, Chandrasekaran K.
Day-ahead Pricing Model for Smart Cloud using Time Dependent Pricing
Chetan Chawla, Inderveer Chana
Enhanced Voting based Secure Localization for Wireless Sensor Networks
M. B. Nirmala, A. S. Manjunatha
An Intrusion Detection and Prevention System based on Automatic Learning of Traffic Anomalies
Abdurrahman A. Nasr, Mohamed M. Ezz, Mohamed Z. Abdulmaged
Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform
Siddharth Singh, Tanveer J. Siddiqui
Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings
Jianhua Zhu, Guohua Cui, Shiyang Zhou
An Improved Hybrid Mechanism for Secure Data Communication
Sangeeta Dhall, Bharat Bhushan, Shailender Gupta
Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks
Yasmine Medjadba, Somia Sahraoui
A Novel Scheme for Image Authentication and Secret Data Sharing
Auqib Hamid Lone, Ab Waheed Lone, Moin Uddin
Alternative Equations for Guillou-Quisquater Signature Scheme
J. Ettanfouhi, O. Khadir
Using String Kernel for Document Clustering
Qingwei Shi, Xiaodong Qiao, Guangquan Xu
Impact of Variation in Pause Time and Network Load in AODV and AOMDV Protocols
P.Periyasamy, E.Karthikeyan
Database Semantic Interoperability based on Information Flow Theory and Formal Concept Analysis
Guanghui Yang, Junkang Feng
Offline Handwritten Devanagari Script Recognition
Ved Prakash Agnihotri
Design of an Android Application for Secure Chatting
Ammar H. Ali, Ali M. Sagheer
A Text Analysis Based Seamless Framework for Predicting Human Personality Traits from Social Networking Sites
Ramya Sharada K, Arti Arya, Ragini S, Harish Kumar, Abinaya G
Prediction of Missing Values for Decision Attribute
T. Medhat
Symmetric Key Encryption using Iterated Fractal Functions
Shafali Agarwal
A Novel and Efficient Method for Protecting Internet Usage from Unauthorized Access Using Map Reduce
P. Srinivasa Rao, K. Thammi Reddy, MHM. Krishna Prasad
Application of Cosmos's law of Merge and Split for Data Encryption
Sanjay Kr. Pal, Nupur Chakraborty
Malware-Free Intrusions: Exploitation of Built-in Pre-Authentication Services for APT Attack Vectors
Aaron Zimba, Zhaoshun Wang
Trust Establishment in SDN: Controller and Applications
Bassey Isong, Tebogo Kgogo, Francis Lugayizi
On Classical Cryptographic Protocols in Post-Quantum World
István Vajda
CVSHR: Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation
Mohamed A. Elsharkawey, Hosam E. Refaat
Towards Modeling Malicious Agents in Decentralized Wireless Sensor Networks: A Case of Vertical Worm Transmissions and Containment
ChukwuNonso H. Nwokoye, Virginia E. Ejiofor, Moses O. Onyesolu, Boniface Ekechukwu
An Efficient Graph-Coloring Algorithm for Processor Allocation
Mohammed Hasan Mahafzah
Systematic Review and Classification on Video Surveillance Systems
Fereshteh Falah Chamasemani, Lilly Suriani Affendey
On Approximate Equivalences of Multigranular Rough Sets and Approximate Reasoning
B. K. Tripathy, Anirban Mitra
A Cluster Based Job Scheduling Algorithm for Grid Computing
Reza Fotohi, Mehdi Effatparvar
Extraction and Analysis of Mural Diseases Information Based on Digital Orthophoto Map
Miao-le Hou, Song Tian