Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Intelligent Controller for Synchronization New Three Dimensional Chaotic System
Alireza Sahab, Masoud Taleb Ziabari
Lifetime of Sensor Network by Exploiting Heterogeneity- A Survey
Ritesh Kumar Singh, Ankit Bhadoria
Scheduling of Generating Unit Commitment by Quantum-Inspired Evolutionary Algorithm
Ebrahim Zare juybari, Seyed Mehdi Hosseini
An Improved Chaotic Bat Algorithm for Solving Integer Programming Problems
Osama Abdel-Raouf, Mohamed Abdel-Baset, Ibrahim El-henawy
A Survey on Face Detection and Recognition Techniques in Different Application Domain
Subrat Kumar Rath, Siddharth Swarup Rautaray
MLP based Reusability Assessment Automation Model for Java based Software Systems
Surbhi Maggo, Chetna Gupta
Sustaining Security In MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm
Sherin Zafar, M K Soni
Performance Evaluation of TPA-HE Based Fine Grained Data Access for Cloud Computing
Pawan Kumar Parmar, Megha Patidar, Mayank Kumar Sharma
Simulation of Peak Ground Acceleration by Artificial Neural Network and Radial Basis Function Network
Ali Nasrollahnejad, Hamid rajabi, Mohammad Bagher Nasrollahnejad, Samaneh Tahmasebi
A Novel Image Encryption Scheme Based on Multi-orbit Hybrid of Discrete Dynamical System
Ruisong Ye, Huiqing Huang, Xiangbo Tan
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
Neha Solanki, Sanjay K. Malik
A Survey on Scheduling Heuristics in Grid Computing Environment
Manoj Kumar Mishra, Yashwant Singh Patel, Yajnaseni Rout, G.B. Mund
A Study and Review on the Development of Mutation Testing Tools for Java and Aspect-J Programs
Pradeep Kumar Singh, Om Prakash Sangwan, Arun Sharma
A Novel Classification Method Using Hybridization of Fuzzy Clustering and Neural Networks for Intrusion Detection
Saeed Khazaee, Karim Faez
Prolong the Lifetime of WSN by Determining a Correlation Nodes in the Same Zone and Searching for the "Best" not the "Closest" C.H.
Mishall H. Awaad, Wid A. Jebbar
Designing a Novel Ternary Multiplier Using CNTFET
Nooshin Azimi, Hamidreza Hoseini, Abbas Shahsavari
Resource Allocation Policies for Fault Detection and Removal Process
Md. Nasar, Prashant Johri, Udayan Chanda
Module of System Galactica with Coulomb's Interaction
Joseph J. Smulsky
Information Interpretation Code For Providing Secure Data Integrity On Multi-Server Cloud Infrastructure
Sathiya Moorthy Srinivsan, Chandrasekar Chaillah
Comparative Study of High Speed Back- Propagation Learning Algorithms
Saduf, Mohd.Arif Wani
A Secure Framework for Discovering the Liabilities of a Network Server
Ulya Sabeel, Saima Maqbool
A Novel Testing Model for SOA based Services
Abhishek Kumar
Improved PSO tuned Classical Controllers (PID and SMC) for Robotic Manipulator
Neha Kapoor, Jyoti Ohri
Multi Objective Optimization Problem resolution based on Hybrid Ant-Bee Colony for Text Independent Speaker Verification
J. Sirisha Devi, Srinivas Yarramalle
An Evolving Neuro-Fuzzy System with Online Learning/Self-learning
Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Anastasiia O. Deineko
An Efficient Algorithm for Finding a Fuzzy Rough Set Reduct Using an Improved Harmony Search
Essam Al Daoud
Security Improvement of Object Oriented Design using Refactoring Rules
Suhel Ahmad Khan, Raees Ahmad Khan
Experimental Analysis of SPF Based Secure Web Application
Nitish Pathak, Girish Sharma, B. M. Singh
Study of Task Scheduling in Cloud Computing Environment Using Soft Computing Algorithms
Saurabh Bilgaiyan, Santwana Sagnika, Samaresh Mishra, Madhabananda Das
An Efficient Virtual Machine Scheduling Technique in Cloud Computing Environment
Vijaypal S. Rathor, R. K. Pateriya, Rajeev K. Gupta
Web-enabled Simulated and Remote Control Virtual Laboratory of Transducer
Vaibhav Gautam, Roop Pahuja
A New Hybrid Classification Method for Condensing of Large Datasets: A Case Study in the Field of Intrusion Detection
SAEED Khazaee, ALI Bozorgmehr
A New Approach for Dynamic Virtual Machine Consolidation in Cloud Data Centers
Esmail Asyabi, Mohsen Sharifi
An Appraisal of Off-line Signature Verification Techniques
Abdul Salam Shah, M. N. A. Khan, Asadullah Shah
Energy Efficient Unequal Clustering Algorithm with Disjoint Multi-hop Routing Scheme for Wireless Sensor Networks
Muni Venkateswarlu K., A. Kandasamy, Chandrasekaran K.
GPU Optimized Stereo Image Matching Technique for Computer Vision Applications
Kajal Sharma
Outlier Reduction using Hybrid Approach in Data Mining
Nancy Lekhi, Manish Mahajan
Face Recognition in Multi Camera Network with Sh Feature
R.Sumathy
A Proposed Modification of K-Means Algorithm
Sharfuddin Mahmood, Mohammad Saiedur Rahaman, Dip Nandi, Mashiour Rahman
Perspective of Database Services for Managing Large-Scale Data on the Cloud: A Comparative Study
Narinder K. Seera, Vishal Jain