Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Mitigating Technical Challenges via Redesigning Campus Network for Greater Efficiency, Scalability and Robustness: A Logical View
A.A. Ojugo, A.O. Eboka
House Price Prediction using a Machine Learning Model: A Survey of Literature
Nor Hamizah Zulkifley, Shuzlina Abdul Rahman, Nor Hasbiah Ubaidullah, Ismail Ibrahim
Optimal Control of Model Reduction Binary Distillation Column
Nasir Ahmed Alawad, Afaf Jebar Muter
Agent-based Modeling in doing Logic Programming in Fuzzy Hopfield Neural Network
Shehab Abdulhabib Saeed Alzaeemi, Saratha Sathasivam, Muraly Velavan
A Performance of the Scattered Averaging Technique based on the Dataset for the Cluster Center Initialization
Arief Bramanto Wicaksono Putra, Achmad Fanany Onnilita Gaffar, Bedi Suprapty, Mulyanto
An Overview of Reconfigurable Antennas for Wireless Body Area Networks and Possible Future Prospects
Hafiz Suliman Munawar
Modification of Maximal Ratio Combining Technique for Detection of Spectrum Hole in a Cognitive Radio Network
Abolade R.O., Ojo S.I., Ojerinde I.A., Adetunji J.S., Lawal A.T.
Design of Microwave Pyramidal Absorber for Semi Anechoic Chamber in 1 GHz~20 GHz range
Zahid Ali, Badar Muneer, Bhawani Shankar Chowdhry, Shehroz Jehangir, Ghulam Hyder
Reducing Energy Consumption in Wireless Sensor Networks Using a Routing Protocol Based on Multi-level Clustering and Genetic Algorithm
Amin Rezaeipanah, Hamed Nazari, Mohammad Javad Abdollahi
Modelling Manufacturing System Controller-based Siphon Petri Nets
Mowafak Hassan Abdul-Hussin
A Novel IoT Based Approach to Notify Motion Detection in User’s Absence through Handheld Devices
K. Murali Krishna, H. Jayashree
PRoPHET Using Optimal Path Hops
Salem Sati, Tareg Abulifa, Salah Shanab
Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network
Shahzad Ashraf, Sehrish Saleem, Tauqeer Ahmed
A Deep Analysis of Image Based Video Searching Techniques
Sadia Anayat, Arfa Sikandar, Sheeza Abdul Rasheed, Saher Butt
Application of Artificial Neural Networks for Detecting Malicious Embedded Codes in Word Processing Documents
Sisay Tumsa
Virobot the Artificial Assistant Nurse for Health Monitoring, Telemedicine and Sterilization through the Internet
Punith Kumar M. B., D. Manikant Amaresh Savadatti
A Metric for Evaluating Security Models based on Implementation of Public Key Infrastructure
Sigsbert Rwiza, Mussa Kissaka, Kosmas Kapis
Impact of Wall Coating on the Behavior of Indoor OWC under Diffuse Topology
Mohamed B. El-Mashade, Hanaa H. Qamer
An Ontology based Approach for Context-Aware Security in the Internet of Things (IoT)
Asifa Nazir, Sahil Sholla, Adil Bashir
Machine Learning Based Analysis of Cellular Spectrum
Muhammad Yasir, Zafi Sherhan Shah, Sajjad Ali Memon, Zahid Ali
Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation
Anjan K. Koundinya, Gautham S.K.
SQL Injection Detection Tools Advantages and Drawbacks
Hazem M. Harb, Derar Eleyan, Amna Eleyan
Supporting Audio Privacy-aware Services in Emerging IoT Environment
Naushin Nower
A Node Localization Algorithm based on Woa-Bp Optimization
Lang Fenghao, Sun Yun, Su Jun, Song Wenguang
CNN-based Security Authentication for Wireless Multimedia Devices
Gautham S.K., Anjan K. Koundinya
Pattern-based and Time-Synchronised Passwords
Mian Saeed Akbar, Asif Khan, Sara
Resource Efficient Security Mechanism for Cloud of Things
Adil Bashir, Sahil Sholla
An improved IOT Authentication Process based on Distributed OTP and Blake2
Hind EL Makhtoum, Youssef Bentaleb
TreeLoc: An Ensemble Learning-based Approach for Range Based Indoor Localization
M.W.P Maduranga, Ruvan Abeysekera
An Efficient and Cloud Based Architecture for Smart Grid Security
Mohammad Rasoul Momeni, Fatemeh Haghighat, Mohsen Haghighat
Artificial Neural Network Training Criterion Formulation Using Error Continuous Domain
Zhengbing Hu, Mykhailo Ivashchenko, Lesya Lyushenko, Dmytro Klyushnyk
A Potrace-based Tracing Algorithm for Prescribing Two-dimensional Trajectories in Inertial Sensors Simulation Software
Bohdan R. Tsizh, Tetyana A. Marusenkova
A Block Permutational Steganographic Algorithm for Scanned Documents and other Images
Saitulaa Naranong, Surapong Auwatanamongkol
A Verifiable Ring Signature Scheme of Anonymous Signcryption Using ECC
Pratik Gupta, Manoj Kumar
Accuracy Analysis for the Solution of Initial Value Problem of ODEs Using Modified Euler Method
Mohammad Asif Arefin, Nazrul Islam, Biswajit Gain, Md. Roknujjaman
A LSB Based Image Steganography Using Random Pixel and Bit Selection for High Payload
U. A. Md. Ehsan Ali, Emran Ali, Md. Sohrawordi, Md. Nahid Sultan
Novel Quantum Random Number Generator with the Improved Certification Method
Maksim Iavich, Tamari Kuchukhidze, Giorgi Iashvili, Sergiy Gnatyuk, Razvan Bocu
Application of Levenberg-Marguardt Algorithm for Prime Radio Propagation Wave Attenuation Modelling in Typical Urban, Suburban and Rural Terrains
Joseph Isabona, Divine O. Ojuh
Multi Agent Assisted Safety Information Dissemination Scheme for V2V Communication in VANETs: Intelligent Agent Approach
Ramesh B. Koti, Mahabaleshwar S. Kakkasageri
Fish Image Classification by XgBoost Based on Gist and GLCM Features
Prashengit Dhar, Sunanda Guha