Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Smart Factory based on IIoT: Applications, Communication Networks and Cybersecurity
Yazen S. Sheet, Mohammed Younis Thanoun, Firas S. Alsharbaty
A Survey on the impact of Connection-Aware Congestion Identification in RLNC-Based Networks on Quality of Service
Syed Abid Husain, Baswaraj Gadgay, Shubhangi D.C.
Scheduling and Queuing Strategies for Energy Efficient Routings in WMSNs
Ashok K. Chikaraddi, Meena S. Maralappanavar, Suvarna G. Kanakaraddi, Vishwanath Chikkareddi
Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS
Gilson da Silva Francisco, Anderson Aparecido Alves da Silva, Marcelo Teixeira de Azevedo, Eduardo Takeo Ueda, Adilson Eduardo Guelfi, Jose Jesus Perez Alcazar
Detecting Android Malware by Mining Enhanced System Call Graphs
Rajif Agung Yunmar, Sri Suning Kusumawardani, Widyawan Widyawan, Fadi Mohsen
Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT
Dilip Kumar, Manoj Kumar
A Secure VM Placement Strategy to Defend against Co-residence Attack in Cloud Datacentres
Ankita Srivastava, Narander Kumar
Individual Updating Strategies-based Elephant Herding Optimization Algorithm for Effective Load Balancing in Cloud Environments
Syed Muqthadar Ali, N. Kumaran, G.N. Balaji
Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
A Novel Approach of DDOS Attack Classification with Genetic Algorithm-optimized Spiking Neural Network
Anuradha Pawar, Nidhi Tiwari
A Hybrid Intrusion Detection System to Mitigate Biomedical Malicious Nodes
Mohammed Abdessamad Goumidi, Ehlem Zigh, Naima Hadj-Said, Adda Belkacem Ali-Pacha
Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method
Ranganath Yadawad, Umakant P. Kulkarni, Jafar A. Alzubi
Cooperative MAC Protocol based on Best Data Rate (CMAC-DR)
Nagesh R., M.N. Sree Rangaraju, N.R. Kushar Gowda, Vinayak Shekharappa Antin
Traitor Traceable and Revocation-oriented Attribute Based Encryption with Proxy Decryption for Cloud Devices
G. Sravan Kumar, A. Sri Krishna
Parameter Estimation of Cellular Communication Systems Models in Computational MATLAB Environment: A Systematic Solver-based Numerical Optimization Approaches
Joseph Isabona, Sayo A. Akinwumi, Theophilus E. Arijaje, Odesanya Ituabhor, Agbotiname Lucky Imoize
Encrypted Access Mapping in a Distinctly Routed Optimized Immune System to Prevent DoS Attack Variants in VANET Architecture
Rama Mercy. S., G. Padmavathi
Information Technology for the Operational Processing of Military Content for Commanders of Tactical Army Units
Vitaliy Danylyk, Victoria Vysotska, Vasyl Andrunyk, Dmytro Uhryn, Yuriy Ushenko
Optimized Extreme Gradient Boosting with Remora Algorithm for Congestion Prediction in Transport Layer
Ajay Kumar, Naveen Hemrajani
Quality of Experience Improvement and Service Time Optimization through Dynamic Computation Offloading Algorithms in Multi-access Edge Computing Networks
Marouane Myyara, Oussama Lagnfdi, Anouar Darif, Abderrazak Farchane
Cascaded Machine Learning Approach with Data Augmentation for Intrusion Detection System
Argha Chandra Dhar, Arna Roy, M.A.H. Akhand, Md. Abdus Samad Kamal, Kou Yamada
Universal On-board Neural Network System for Restoring Information in Case of Helicopter Turboshaft Engine Sensor Failure
Serhii Vladov, Ruslan Yakovliev, Victoria Vysotska, Dmytro Uhryn, Yuriy Ushenko
BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment
Santhosh Kumar Medishetti, Ganesh Reddy Karri
Attack Modeling and Security Analysis Using Machine Learning Algorithms Enabled with Augmented Reality and Virtual Reality
Momina Mushtaq, Rakesh Kumar Jha, Manish C. Sabraj, Shubha Jain
An Enhanced Process Scheduler Using Multi-Access Edge Computing in An IoT Network
Padmini M.S., S. Kuzhalvaimozhi, Bhuvan K., Ramitha R., Tanisha Machaiah M.
Targeted Attacks Detection and Security Intruders Identification in the Cyber Space
Zhadyra Avkurova, Sergiy Gnatyuk, Bayan Abduraimova, Kaiyrbek Makulov
Survival Analysis of Computers at a University’s Computer Laboratory and Implication on Maintainability
Timothy Simpson, Joseph Danso, John Awuah Addor, Stephen Graham Anaman
Classification of Food Objects Using Deep Convolutional Neural Network Using Transfer Learning
Dipta Gomes
Towards an Intelligent Electricity Data Management
Amadou Diabagaté, Yazid Hambally Yacouba, Jean-Marc Owo, Adama Coulibaly
A Proposed Concept of Digital Libraries in Metaverse to Facilitate Education for School Students
Namira Khorshed Khan, Kaniz Fatema Kanta, Tabammum Haque Pranty, Dip Nandi
A Real-time Light-weight Computer Vision Application for Driver’s Drowsiness Detection
Saikat Baul, Md. Ratan Rana, Farzana Bente Alam
Vehicle Object Tracking Based on Fusing of Deep learning and Re-Identification
Huynh Nhat Duy, Vo Hoai Viet
Alleviating Unwanted Recommendations Issues in Collaborative Filtering Based Recommender Systems
Abba Almu, Abubakar Roko
HKCHB: Meta-heuristic Algorithm for Task Scheduling and Load Balancing in Cloud-fog Computing
Mahmoud Moshref, Sherin Hijazi, Azzam Sleit, Ahmad Sharieh
Smart Vehicle Accident Prevention and Road Safety System with Real Time Data Acquisition
Md. Nashim Uzzaman Nishad, Paul Baskey, Md. Toukir Ahmed
Control of Switched Reluctance Motor and Noise Reduction Using Fuzzy Controller in Matlab/Simulink
B. Srilatha, Sheeba Kumari C., Tina Elizabeth Thomas
A Solution for Monitoring Temperature and Humidity at 31 Explosive Materials Company
Chien Thang Vu, Trung Hieu Nguyen
Power Quality Analysis of ANFIS based Distributed Generation System with UPQC
Shravani Chapala, Narasimham R.L., Tulasi Ram Das. G.
Artificially Intelligent Surveillance and Security Sentinel for Technologically Enhanced and Protected Communities
Md. Mominur Rahman Meem, Partho Sharothi Chowhan, Farah Alam Mim, Md. Toukir Ahmed
Driver Drowsiness Detection System
Amit Kumar Jakhar, Bhupendra Kumar Pathak, Kaustubh Mishra, Rajiv Kumar
Comparative Exploration of the Contribution of Reinforcement Learning in Robotic Surgery
Cheima Bouden