Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
An Efficient Image Steganography Scheme Using Bit-plane Slicing with Elliptic Curve Cryptography and Wavelet Transform
Ganavi M., Prabhudeva S., Hemanth Kumar N.P.
Secured Wireless Sensor Network Protocol using Rabin-assisted Multifactor Authentication
Javeria Ambareen, Prabhakar M.
Prediction of Intermittent Failure by Presage Debacle Model in Network on Chip
Sangeeta Singh, J. V. R. Ravindra, B. Rajendra Naik
A Comprehensive Study with Challenges of Internet of Things (IoT) based Model for Smart Farming
Sonu Rana, Jyoti Verma, A.K. Gautam
Development of a Mobile Liquid Spraying Machine for Small and Medium Scale Crop Production
Olayinka Mohammed Olabanji
Efficient Design of Compact 8-bit Wallace Tree Multiplier Using Reversible Logic
Hemalatha K. N., Sangeetha B. G.
Optimal Call Failure Rates Modelling with Joint Support Vector Machine and Discrete Wavelet Transform
Isabona Joseph, Agbotiname Lucky Imoize, Stephen Ojo, Ikechi Risi
Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment
Sajaad Ahmed Lone, A.H. Mir
Cyber-resilient Routing for Internet of Vehicles Networks During Black Hole Attack
Mehnaz Tabassum, Aurenice Oliveira
A Theoretical Graph based Framework for Parameter Tuning of Multi-core Systems
Surendra Kumar Shukla, Devesh Pratap Singh, Shaili Gupta, Kireet Joshi, Vishan Kumar Gupta
Survey on 5G and Future 6G Access Networks for IoT Applications
Kok Yeow You
Sensitive Data Identification and Security Assurance in Cloud and IoT based Networks
Soumya Ray, Kamta Nath Mishra, Sandip Dutta
Detection of Unknown Insider Attack on Components of Big Data System: A Smart System Application for Big Data Cluster
Swagata Paul, Sajal Saha, Radha Tamal Goswami
Robust Distributed Power Control with Resource Allocation in D2D Communication Network for 5G-IoT Communication System
K. Pandey, R. Arya
A Secure LEACH Protocol for Efficient CH Selection and Secure Data Communication in WSNs
Ravi Kumar Sanapala, Srineevasa Rao Duggirala
Extended DragonDeBrujin Topology Synthesis Method
Artem Volokyta, Heorhii Loutskii, Pavlo Rehida, Artem Kaplunov, Bohdan Ivanishchev, Oleksandr Honcharenko, Dmytro Korenko
Performance Evaluation of Machine Learning-based Robocalls Detection Models in Telephony Networks
Bodunde O. Akinyemi, Oluwatoyin H. Odukoya, Mistura L. Sanni, Gilbert Sewagnon, Ganiyu A. Aderounmu
Neuro Fuzzy Model Based Routing Protocol in Mobile Ad-Hoc Networks
Siddesh G.K., Anu H., Chaithanya S., Sathish Shet K.
Modified ECC for Secure Data Transfer in Multi-Tenant Cloud Computing
S. Udhaya Chandrika, T. Pramananda Perumal
Synthesis of the Structure of a Computer System Functioning in Residual Classes
Victor Krasnobayev, Alexandr Kuznetsov, Kateryna Kuznetsova
Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage
Justice Odoom, Huang Xiaofang, Samuel Akwasi Danso, Richlove Samuel Soglo, Benedicta Nana Esi Nyarko
Outlier Detection Technique for Wireless Sensor Network Using GAN with Autoencoder to Increase the Network Lifetime
Biswaranjan Sarangi, Biswajit Tripathy
An Effective Data Dissemination Using Multi Objective Congestion Metric Based Artificial Ecosystem Optimization for Vehicular Ad-Hoc Network
Nagaraj B. Patil, Shaeista Begum
A Secure and Efficient Cryptography System Based on Chaotic Maps for Securing Data Image in Fog Computing
Samaa Y. Tarabay, Abeer Twakol, Ahmed S. Samrah, Ibrahim Yasser
Software Reliability Growth Models with Exponentiated-gompertz Testing Effort and Release Time Determination
Ahmad Raad Raheem, Shaheda Akthar
Development Web-GIS of Commodity Information System for Agriculture, Establishment and Forestry in Marangkayu District
Adelia Juli Kardika, Aulia Khoirunnita, Salman, Saharuddin, Indah Muliana
Diagnosis of Skin Cancer Using Machine Learning and Image Processing Techniques
Prashant Kaler, Shilpa Kodli, Sudhir Anakal
Augmented Reality and its Science
Nimesh Yadav, Aryan Sinha
High Accuracy Swin Transformers for Image-based Wafer Map Defect Detection
Thahmidul Islam Nafi, Erfanul Haque, Faisal Farhan, Asif Rahman
Gas Leakage Detector and Monitoring System
Yekini N. Asafe, Adigun J. Oyeranmi, Oloyede A. Olamide, Akinade O. Abigael
Extricate Features Utilizing Mel Frequency Cepstral Coefficient in Automatic Speech Recognition System
Gaurav D. Saxena, Nafees A. Farooqui, Saquib Ali
Towards the Development a Cost-effective Earthquake Monitoring System and Vibration Detector with SMS Notification Using IOT
Shaina Delia G. Tomaneng, Jubert Angelo P. Docdoc, Susanne A. Hierl, Patrick D. Cerna
An Adaptive User Authentication Architecture for Drunk Driving and Vehicle Theft Mitigation
Edward O. Ofoegbu
Analysis and Numerical Simulation of Deterministic Mathematical Model of Pediculosis Capitis
Emeka Emmanuel Otti, Ebelechukwu C. Okorie, Sunday M. Bulus
Automated Wall Painting Robot for Mixing Colors based on Mobile Application
Ayman Abdullah Ahmed Al Mawali, Shaik Mazhar Hussain
Artificial Bee Colony Optimized Multi-Histogram Equalization for Contrast Enhancement and Brightness Preservation of Color Images
Gurjinder Singh, Amandeep Kaur
Patch Based Sclera and Periocular Biometrics Using Deep Learning
V. Sandhya, Nagaratna P. Hegde
Two-Layer Security of Images Using Elliptic Curve Cryptography with Discrete Wavelet Transform
Ganavi M., Prabhudeva S.
LCDT-M: Log-Cluster DDoS Tree Mitigation Framework Using SDN in the Cloud Environment
Jeba Praba. J., R. Sridaran
Efficient Load Balancing in WSN Using Quasi –oppositional Based Jaya Optimization with Cluster Head Selection
M.S. Muthukkumar, S. Diwakaran