Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Прикладные науки. Медицина. Технология
Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68
Научные статьи
В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
A feature selection based ensemble classification framework for software defect prediction
Ahmed Iqbal,
Shabib Aftab,
Israr Ullah,
Muhammad Salman Bashir,
Muhammad Anwaar Saeed
Mining the dark web: a novel approach for placing a dark website under investigation
Bassel Alkhatib,
Randa S. Basheer
Determining proficient time quantum to improve the performance of round robin scheduling algorithm
Dipto Biswas,
Md. Samsuddoha
High-reliability vehicle detection and lane collision warning system
Yassin Kortli,
Mehrez Marzougui,
Mohamed Atri
A power-based method for improving the ODMRP protocol performance in mobile ad-hoc networks
Arash.Ghafouri,
Ahmad Ghasemi,
Mohammad Reza. Hasani Ahangar
A novel energy efficient cluster head selection method for wireless sensor networks
Jasvir Kaur,
Sukhchandan Randhawa,
Sushma Jain
Lattice-reduction-aided equalization for V2V communication channel
Samarendra Nath Sur,
Rabindranath Bera,
Bansibadan Maji
Performance optimization of ad hoc on demand vector routing protocol in cognitive radio network
Shruti Singh Roy,
P. L. Zade
Clustering algorithms of wireless sensor networks: a survey
Muhammad Noman Riaz
Preserving privacy in cloud identity management systems using DCM (Dual Certificate Management)
Kamyab Khajehei
PPLS: personnel presence locator system – an amalgam of RF ranging & Zigbee in WSN
Syed Rameem Zahra,
Mir Shahnawaz Ahmad
A proof of work: securing majority-attack in blockchain using machine learning and algorithmic game theory
Somdip Dey
Reduction of inter-symbol interference using artifical neural network system in multicarrier OFDM system
Jyoti Makka,
Himanshu Monga,
Silki Baghla
Classification of attacks on wireless sensor networks: a survey
Muhammad Noman Riaz,
Attaullah Buriro,
Athar Mahboob
EGEC: an energy efficient exponentially generated clustering mechanism for reactive wireless sensor networks
Sundareswaran P.,
Rajesh R. S.,
Vardharajulu K. N.
Prevention of session hijacking attack in VANETs using intrusion detection system
Jeevitha.R.,
N.Sudha Bhuvaneswari
Performance analysis of NLM interleaving scheme for CPM OFDM system
Gayatri Gupta,
Aasheesh Shukla
DDoS attack detection using C5.0 machine learning algorithm
Hariharan. M.,
Abhishek H. K.,
B. G. Prasad
Interference mitigation and mobility management for D2D communication in LTE-A networks
Ravindra S.,
Siddesh G. K.
Smart locker: IOT based intelligent locker with password protection and face detection approach
Niaz Mostakim,
Ratna R. Sarkar,
Md. Anowar Hossain
Analysis of filter bank multi-carrier system for 5G communications
Sarala Patchala,
M.Sailaja
Interoperability in connected vehicles – a review
Shaik Mazhar Hussain,
Kamaludin Mohamad Yusof,
Shaik Ashfaq Hussain
Detection and extraction of OFDM parameters using difference of gaussians
Amin Naemi
Remote sensing global ranged door lock security system via mobile communication
Md Mostafizur Rahman Komol,
Amit Kumer Podder,
Abdullah Arafat,
Tanzim Nabeed
An energy efficient clustering-based load adaptive MAC (CLA-MAC) protocol for wireless sensor networks in IoT
Atul Kumar Pandey,
Nisha Gupta
ZBLE: zone based leader selection energy constrained AOMDV routing protocol
Rani Sahu,
Sanjay Sharma,
M.A. Rizvi
Active Defense Strategy against Jamming Attack in Wireless Sensor Networks
Nawfal F. Abdulqader AL-Shaihk,
Reza Hassanpour
An Efficient (n, n) Visual Secret Image Sharing using Random Grids with XOR Recovery
Ram Gopal Sharma,
Hitendra Garg,
Priti Dimri
Message Based Key Distribution Technique for Establishing a Secure Communication Channel in IoT Networks
G.V.Hindumathi,
D. Lalitha Bhaskari
A Domains Approach to Remote Access Logical Vulnerabilities Classification
Samuel Ndichu,
Sylvester McOyowo,
Henry Okoyo,
Cyrus Wekesa
Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine
Zeeshan Ashraf,
Adnan Sohail,
Muhammad Yousaf
Design and Implementation of Runtime Reconfigurable Encryption Algorithms using Custom ICAP Processor
Jamuna S.,
Dinesha P.,
K. P. Shashikala,
Kishore Kumar K.
A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem
Ahmet Ali Süzen
Evaluation of QoS Support of AODV and its Multicast Extension for Multimedia over MANETs
Lavanya. Poluboyina,
Sivakumar Reddy. V.,
Mallikarjuna Prasad. A.
Centralized Relay Selection and Optical Filtering Based System Design for Reliable Free Space Optical Communication over Atmospheric Turbulence
M. Mubasher Hassan,
G. M. Rather
Analysis of VoIP over Wired & Wireless Network with Implementation of QoS CBWFQ & 802.11e
Zahid Ali,
Falak Naz,
Javed,
Muhammad Qurban,
Muhammad Yasir,
Shehroz Jehangir
Running Google Colaboratory as a server – transferring dynamic data in and out of colabs
Samarth V. Halyal
News Impact on Stock Trend
Protim Dey,
Nadia Nahar,
B. M. Mainul Hossain
An Enhanced Data Sparsity Reduction Method for Effective Collaborative Filtering Recommendations
Abubakar Roko,
Abba Almu,
Aminu Mohammed,
Ibrahim Saidu
An Image Impulsive Noise Denoising Method Based on Salp Swarm Algorithm
Wei Liu,
Ran Wang,
Jun Su
← Предыдущая
Следующая страница →
1
|
...
|
104
|
105
|
106
|
107
|
108
|
109
|
110
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.