Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Modified Kalman Filter with Chebyshev Points Based on a Recurrent Neural Network for Automatic Control System Measuring Channels Diagnosing and Parring off Failures
Serhii Vladov, Oleksandr Muzychuk, Victoria Vysotska, Alexey Yurko, Dmytro Uhryn
IBOA: Cost-aware Task Scheduling Model for Integrated Cloud-fog Environments
Santhosh Kumar Medishetti, Ganesh Reddy Karri, Rakesh Kumar Donthi
A Comparative Model for Blurred Text Detection in Wild Scene Using Independent Component Analysis (ICA) and Enhanced Genetic Algorithm (Using a Bird Approach) with Classifiers
Nwufoh C.V., Sakpere W.
Data-driven Approximation of Cumulative Distribution Function Using Particle Swarm Optimization based Finite Mixtures of Logistic Distribution
Rajasekharreddy Poreddy, Gopi E.S.
Deep Learning for Robust Facial Expression Recognition: A Resilient Defense Against Adversarial Attacks
Tinuk Agustin, Moch. Hari Purwidiantoro, Mochammad Luthfi Rahmadi
Identification of Customer Through Voice Biometric System in Call Centres
Amjad Hassan Khan M.K., P.S. Aithal
Optimizing Knapsack Problem with Improved SHLO Variations
Amol C. Adamuthe, Harshad Kumbhar
Heuristic – Driven Disjoint Alternate Path Switching – Based Fault Resilient Multi- Constraints Routing Protocol for SDN-mIOT
Suprith Kumar K.S., Eesha D., Pooja A.P., Monika Sharma D.
Machine Learning Algorithms for Detecting DDoS Attacks in Intrusion Detection Systems
Dandugudum Mahesh, T. Sampath Kumar
Proof of Notoriety: A Promised Consensus Mechanism for the Blockchain-based Copyright System
Ahmed Mounsif Kebir, Asmaa Boughrara
ANTMAC: Addressing Novel Congestion Technique Hybrid Model for Collision Control in IoT-based Environments using Contention-based MAC Protocol
Rabindra Kumar Shial, Premanshu Rath, Sudhir Ranjan Patnaik, Sarat Chandra Nayak, Umashankar Ghugar
Two-factor Mutual Authentication with Fingerprint and MAC Address Validation
J.S. Jolin, A. Theophilus, A. Kathirvel
GDAR: A Secure Authentication for Dapp Interoperability in Blockchain
Surekha Thota, Shantala Devi Patil, Gopal Krishna Shyam, Bhanu Prasad
Anti-jamming and Power Minimization Interference Nulling in Uplink MIMO-NOMA Technique
Suprith P.G., Mohammed Riyaz Ahmed, Mithileysh Sathiyanarayanan
A Novel GAN-based Chaotic Method with DNA Computing for Enhancing Security of Medical Images
Anita Murmu, Piyush Kumar
Green Optimization with Load balancing in Wireless Sensor Network using Elephant Herding Optimization
Rajit Ram Yadava, Ranvijay Ranvijay
An Approach to Improve Fisher-Yates Shuffling Based Image Encryption Using Parallelization on CPU
Sangeeta Sharma, Aman Chauhan, Nihal Srivastava, Kritik Danyal, Mukesh Kumar Giluka
Suspicious Activity Detection Model in Bank Transactions Using Deep Learning with Fog Computing Infrastructure
Girish Wali, Chetan Bulla
A Smart System for Monthly Electrical Energy Consumption Prediction Using Machine Learning
Md. Shimul Mahmud, Mahfuzul H. Chowdhury
IoT-Based Fish Recommendation System: A Machine Learning Approach via Mobile Application for Precision Agriculture
Md. Shahriar Hossain Apu, Md. Moshiur Rahman, Md. Toukir Ahmed
Enhancing Drug Recommender System for Peptic Ulcer Treatment
Theresa O. Omodunbi, Grace E. Alilu, Kennedy O. Obohwemu, Rhoda N. Ikono
Comparative Analysis of LSTM Variants for Stock Price Forecasting on NSE India: GRU's Dominance and Enhancements
Milind Kolambe, Sandhya Arora
Intelligent Identification of Cryptographic Ciphers using Machine Learning Techniques
Subinoy Sikdar, Malay Kule
Information Technology for Sound Analysis and Recognition in the Metropolis based on Machine Learning Methods
Lyubomyr Chyrun, Victoria Vysotska, Stepan Tchynetskyi, Yuriy Ushenko, Dmytro Uhryn
Deep Learning Based Traffic Management in Knowledge Defined Network
Tejas M. Modi, Kuna Venkateswararao, Pravati Swain
Fuzzy-based Bi-objective Energy Efficient Routing Protocol for Large Scale Mobile Ad-hoc Network
Subhrananda Goswami, Sukumar Mondal, Subhankar Joardar, Sovan Samanta, Chandan Bikash Das
Forecasting the Environmental Situation at Mining Company Treatment Facilities Based on Fuzzy Logic
Oleg Ivashchuk, Zhanat Kenzhebaeva, Hanna Martyniuk
Roman Domination in Semi-Middle Graphs: Insights and Applications in Computer Network Design
R. Vinodhini, T.N.M. Malini Mai
An Automated Solution for Secure Password Management
Prageeth Fernando, Navinda Dissanayake, Venusha Dushmantha, Chamara Liyanage, Chamila Karunatilake
Authentication in VANETs with Conditional Privacy-Preserving Property Using Certificateless Aggregate Signature Schemes
Parvin Rastegari
Blockchain-enabled Data Integrity in Wireless Sensor Networks
Yahye Adam Omar
Secure Communication in Wireless Body Area Networks with ECC-Based Key Management and Renewal Protocols
Yusuf Taofeek, Waziri Onomza Victor, Olalere Morufu, Noel Moses Dogonyaro
Enhanced Phishing URLs Detection using Feature Selection and Machine Learning Approaches
Dharmaraj R. Patil, Rajnikant B. Wagh, Vipul D. Punjabi, Shailendra M. Pardeshi
IoMT Survey: Device, Architecture, Communication Protocols, Application and Security
Dina Riyadh Ibrahim, Mohammed Younis Thanoun
Enhancing Web Security through Machine Learning-based Detection of Phishing Websites
Najla Odeh, Derar Eleyan, Amna Eleyan
Vowel based Speech Watermarking Techniques using FFT and Min Algorithm"
Rajeev Kumar, Kshitiz Singh, Jainath Yadav, Ajay Kumar, Indranath Chatterjee
Efficient Resource Allocation to Enhance the Quality of Service in Cloud Computing
Shubhangi Pandurang Tidake, Pramod N. Mulkalwar
Breast Cancer Diagnosis Improvement Based Deep Learning
Ibraheem H. Al-Dosari
Wireless Vehicular Communication
Saranya M., Archana N.
Method of Diagnostics of Multichannel Data Transmission System
Anatolii Taranenko, Yevhen Gabrousenko, Oleksii Holubnychyi, Oleksandr Lavrynenko, Maksym Zaliskyi