Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
A Node Confident based IDS to Avoid Packet Drop Attacks for Wireless Sensor Network
Kareti Madhava Rao, S. Ramakrishna
Generalized Galois-Fibonacci Matrix Generators Pseudo-Random Sequences
Anatoly Beletsky
A Reinforcement Learning-based Offload Decision Model (RL-OLD) for Vehicle Number Plate Detection
Yadavendra Atul Sakharkar, Mrinalini Singh, Kakelli Anil Kumar, Aju D
A Survey of Data Mining Techniques for Indoor Localization
Usman S. Toro, Nasir A. Yakub, Aliyu B. Dala, Murtala A. Baba, Kabiru I. Jahun, Usman I. Bature, Abbas M. Hassan
Application of Artificial Neural Networking Technique to Predict the Geotechnical Aspects of Expansive Soil: A Review
Goutham D.R., A.J.Krishnaiah
Face Recognition System based on Convolution Neural Networks
Htwe Pa Pa Win, Phyo Thu Thu Khine, Khin Nwe Ni Tun
A Comparative Study of Soft Biometric Traits and Fusion Systems for Face-based Person Recognition
Samuel Ezichi, Ijeoma J.F. Ezika, Ogechukwu N. Iloanusi
Mobile-based Attendance Monitoring System Using Face Tagging Technology
Mariel Y. Cabrillas, Ruth G. Luciano, Maria Isidra P. Marcos, Jet C. Aquino, Ronnie Camilo F. Robles
Performance of Machine Learning Algorithms with Different K Values in K-fold Cross-Validation
Isaac Kofi Nti, Owusu Nyarko-Boateng, Justice Aning
Heuristic-based Approach for Dynamic Consolidation of Software Licenses in Cloud Data Centers
Leila Helali, Mohamed Nazih Omri
Data Analysis for the Aero Derivative Engines Bleed System Failure Identification and Prediction
Khalid Salmanov, Hadi Harb
Inhomogeneous Assessment of New Mechanism of Adaptive Detection of Partially-correlated χ2-Targets
Mohamed Bakry El-Mashede
Improving Deceased Identification and Claiming System in Mortuaries Using Fingerprint: A Developing Country Perspective
Iwara I. Arikpo, Chidalu Prince Egeonu
Comparative Analysis of Performance Run Length (RLE) Data Compression Design by VHDL and Design by Microcontroller
Marvin Chandra Wijaya
Quantitative Analysis of Software Security through Fuzzy PROMETHEE-II Methodology: A Design Perspective
Suhel Ahmad Khan, Mohd Nadeem, Alka Agrawal, Raees Ahmad Khan, Rajeev Kumar
Increasing Teacher Competence in Cybersecurity Using the EU Security Frameworks
Ievgeniia Kuzminykh, Maryna Yevdokymenko, Oleksandra Yeremenko, Oleksandr Lemeshko
Boosted Lara Translation and Assessment Utilizing Fuzzy Grounded Impression in Wireless Communication
Ayesha Taranum, Reshma Banu, G. F Ali Ahammed
Android Based Inventory Management with NFC Enabled for Faster Tracking Items at a Steel Company: A Case Study
Suci Laksono
Feature Engineering for Cyber-attack detection in Internet of Things
Maheshi B. Dissanayake
System Monitoring Addon Analysis in System Load Simulation
Filip Gjorgjevikj, Kire Jakimoski
Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks
Mimi M. Cherian, Satishkumar L. Varma
Optimized Parallel Counting Sort Algorithm for Distinct Numeric Values on Biswapped Hyper Hexa-Cell Optoelectronic Network
Ashish Gupta
A Study on Performance Improvement of Intrusion Detection using Efficient Authentication and Distributed Monitoring
Hwanseok Yang
A Cross-Layer Design and Fuzzy Logic based Stability Oriented Routing Protocol
Surabhi Patel, Heman Pathak
Optimization of Maintenance Task Interval of Aircraft Systems
Onyedikachi Chioma Okoro, Maksym Zaliskyi, Serhii Dmytriiev, Oleksandr Solomentsev, Oksana Sribna
A Flaming Ions and Fire Accident Detection and Notification System: Imperative to Learning C-Programming Language
Salako E. Adekunle
Review on: Analysis of an IoT Based Blockchain Technology
Angotu Saida, R. K. Yadav
Achieving Performability and Reliability of Data Storage in the Internet of Things
Negar Taheri, Shahram Jamali, Mohammad Esmaeili
Smart Lighting System Using LoRa WAN Technology
Ashish Jha, Menuka Maharjan
Pyramid Image and Resize Based on Spline Model
Pylyp Prystavka, Olha Cholyshkina
Digital Method of Automated Non-destructive Diagnostics for High-power Magnetron Resonator Blocks
Serge Olszewski, Yaroslav Tanasiichuk, Viktor Mashkov, Volodymyr Lytvynenko, Irina Lurie
Object Tracking: An Experimental and Comprehensive Study on Vehicle Object in Video
Vo Hoai Viet, Huynh Nhat Duy
Towards Query Efficient and Derivative Free Black Box Adversarial Machine Learning Attack
Amir F. Mukeri, Dwarkoba P. Gaikwad
EMVD: Efficient Multitype Vehicle Detection Algorithm Using Deep Learning Approach in Vehicular Communication Network for Radio Resource Management
Vartika Agarwal, Sachin Sharma
Recent Object Detection Techniques: A Survey
Diwakar, Deepa Raj
Development "Acep the Explorer" an Educational Game Introduction Animal Ecosystem
Heny Pratiwi, Ita Arfyanti, Asep Nurhuda
Face Recognition Using Histogram of Oriented Gradients with TensorFlow in Surveillance Camera on Raspberry Pi
Reza Andrea, Nurul Ikhsan, Zulkarnain Sudirman
Investigation of Machine Learning Algorithms for Network Intrusion Detection
Shadman Latif, Faria Farzana Dola, MD. Mahir Afsar, Ishrat Jahan Esha, Dip Nandi
Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy
Alovsat Garaja Aliyev, Roza Ordukhan Shahverdiyeva
Decentralized Self-adaptation in the Presence of Partial Knowledge with Reduced Coordination Overhead
Kishan Kumar Ganguly, Moumita Asad, Kazi Sakib