Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
A Modern Mechanism for Formal Analysis of Biometric Authentication Security Protocol
Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment
Void Avoidance in Underwater Acoustic Sensor Network Using Secure Opportunistic Energy Efficient Depth Routing Protocol
Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network
Self-healing AIS with Entropy Based SVM and Bayesian Aggregate Model for the Prediction and Isolation of Malicious Nodes Triggering DoS Attacks in VANET
Reinforcement Learning Based Efficient Power Control and Spectrum Utilization for D2D Communication in 5G Network
The Method of Restoring Parameters of Mobile Agents in a Unified Dynamic Environment Considering Similarity Coefficients
Encryption Using Binary Key Sequences in Chaotic Cryptosystem
Distributed Denial of Service Attack Detection Using Hyper Calls Analysis in Cloud
Reliable Data Delivery Using Fuzzy Reinforcement Learning in Wireless Sensor Networks
D2D Communication Using Distributive Deep Learning with Coot Bird Optimization Algorithm
Integer Programming Models for Task Scheduling and Resource Allocation in Mobile Cloud Computing
Method of Calculating Information Protection from Mutual Influence of Users in Social Networks
Hybrid Energy Regulated Constant Gain Kalman-Filter for Optimized Target Detection and Tracking in Wireless Sensor Networks
Flow-aware Segment Routing in SDN-enabled Data Center Networks
Energy Efficient Resource Allocation in 5G RAN Slicing with Grey Wolf Optimization
Dual-discriminator Conditional Generative Adversarial Network Optimized with Hybrid Momentum Search Algorithm and Giza Pyramids Construction Algorithm for Cluster-based Routing in WSN Assisted IoT
Cyber-physical Systems: Security Problems and Issues of Personnel Information Security Culture
Best Practices for Facing the Security Challenges of Internet of Things Devices Focusing on Software Development Life Cycle
Analysis on Image Enhancement Techniques
An Application of Rule-Based Classification with Fuzzy Logic to Image Subtraction
Design and Implementation of a Prototype of Piezo Transduced Intelligent Power Management System for Efficient Street Lighting
A Study on Ancient Temple Structural Elements Recognition Using Genetic Algorithm
Exploratory Study on Hyperledger Fabric Framework: Food Supply Chain as a Case Study
An Efficient Approach for Text-to-Speech Conversion Using Machine Learning and Image Processing Technique
Design Remote Monitoring System for Patients at Real-Time based on Internet of Things (IoT)
A Smart Bag for School Students Safety and Security in Oman
Deep Learning based Real Time Radio Signal Modulation Classification and Visualization
An Integrated Pipeline with Internal Image Processing for Efficient Image to Text to Speech Conversion
IOT Based Burglar Detection and Alarming System Using Raspberry Pi
Development of a 120kg Load Lifting Capacity Scissor Elevator Platform
Transformation of Classical to Quantum Image, Representation, Processing and Noise Mitigation
FeatureGAN: Combining GAN and Autoencoder for Pavement Crack Image Data Augmentations
MLSMBQS: Design of a Machine Learning Based Split & Merge Blockchain Model for QoSAware Secure IoT Deployments
Sliding Window Based High Utility Item-Sets Mining over Data Stream Using Extended Global Utility Item-Sets Tree
COVID-19 Automatic Detection from CT Images through Transfer Learning
Motion Pattern Based Anomalous Pedestrian Activity Detection
Shadow Image Processing of X-Ray Screening System for Aviation Security
A Comparative Analysis of Lossless Compression Algorithms on Uniformly Quantized Audio Signals
Algorithm of Processing Navigation Information in Systems of Quadrotor Motion Control