Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Прикладные науки. Медицина. Технология
Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68
Научные статьи
В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Post-quantum Digital Signatures using ElGamal Approach
RSKD Ensemble Classifier with Stable Ensemble Feature Selection for High Dimensional Low Sample Size Cancer Datasets
Spectrogram-based Deep Learning Approach for Anomaly Detection from Cough Sounds
Evaluating Energy-efficiency and Performance of Cloud-based Healthcare Systems Using Power-aware Algorithms: An Experimental Simulation Approach for Public Hospitals
Some Properties of Anti Imprecise Subgroup and its Application
Enhancing Sensor Node Energy Efficiency in Wireless Sensor Networks through an Adaptable Power Allocation Framework
A Comparative Analysis of Extended Low Energy Adaptive Clustering Hierarchy (X-Leach) Routing Protocol
Detection and Prevention of Phishing Short URLs Using Machine Learning and Blacklist Approaches
Implementation of Internet of Things Based Data Security Using Hybrid Cryptography
Robustness Assessment of Data Loss Prevention (DLP) Software for Data Leakage against Different Data Types and Sources
Query Auto-Completion Using Relational Graph Convolutional Network in Heterogeneous Graphs
Wireless Sensor Networks in Agriculture: Livestock Monitoring for the Farming Industries
Enhanced Write Performance and Power Efficiency in Approximate Match CAM Using SAPON Low Power and Transmission Gate Logic
Machine Learning-based Renewable Energy Adaptation: Case study Bangladesh
Human Opinion Analysis through Text Mining
A Novel Verkle Tree-based Post-quantum Digital Signature System with Enhanced Random Number Generation
Finding Optimal Routes in Internal Routing Networks based on a Modified Dijkstra’s Algorithm
A Hybrid PSO-GSA Approach for Cluster Head Selection and Fuzzy Logic Data Aggregation in DEEC-based WSNs
Real-time Sybil Attack Detection Based on Channel Characterization in VANET
Performance Optimization of Vehicle-to-vehicle Communication through Reactive Routing Protocol Analysis
Enhanced Fault Identification in Solar Panels through Binary Cascaded Convolutional Classifiers with Thermal-Visual Image Augmentation
Computed Tomography Image Segmentation Technology Based on ResNet Network Integrated into the Probabilistic Model
Enhancing In-loop Filter of HEVC with Integrated Residual Encoder-Decoder Network and Convolutional Neural Network
An Effective Hybrid HBA-MAO for Task Scheduling with a Hybrid Fault-Tolerant Approach in Cloud Environment
Spoof-formerNet: The Face Anti Spoofing Identifier with a Two Stage High Resolution Vision Transformer (HR-ViT) Network
Application of Tensor Networks Analysis to Optimize Traffic Management in a Critical Information and Telecommunications Network
Developing Audio-to-Text Converters with Natural Language Processing for Smart Assistants
A Scalable Blockchain Framework for Secure IoT Communication
IoT-based Crop Recommendation System using Machine Learning via Mobile Application for Precision Agriculture in Bangladesh
An Enhanced Adaptive B-spline Smoothing Approach for UAV Path Planning
Geodesic Curves Simulation on a Transcendental Surface with a Cycloidal Generatrix Using the Calculus of Variations
Leveraging Sensitivity Analysis for Configurable Kafka Clusters: A Multi-objective Model to Minimize Latency
Robust Price Tag Recognition Using Optimized Detection Pipelines
Determining the Number of Effective Distributions Based on Neural Network Ensemble
Mathematics and Software for Coordinated Planning Using Aggregated Linear Volume-time Models of Discrete Manufacturing Systems
Geospatial Detection and Movement Analysis System for Unmanned Aerial Vehicles Based on Computer Vision Methods
Methods of Increasing the Efficiency of Data Consistency in Information Systems
Software Quality Attributes in Requirements Engineering
STBO: Dynamic Resource-aware Scheduling in Cloud-fog Environments for Improved Task Allocation
Evaluating the Effectiveness of WPA3 Protocol against Advanced Hacking Attacks
← Предыдущая
Следующая страница →
1
|
...
|
122
|
123
|
124
|
125
|
126
|
127
|
128
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.