Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
A Study of Time Series Models ARIMA and ETS
Er. Garima Jain, Bhawna Mallick
Optimizing Memory using Knapsack Algorithm
Dominic Asamoah, Evans Baidoo, Stephen Opoku Oppong
Proposed Automated Framework to Select Suitable Design Pattern
M. Rizwan Jameel Qureshi, Waleed Al-Geshari
Various Types of Image Noise and De-noising Algorithm
Gourav, Tejpal Sharma
A Novel Reduced-Precision Fault-Tolerant Floating-Point Multiplier
Maryam Mohajer, Mojtaba Valinataj
SXP: Simplified Extreme Programing Process Model
Faiza Anwer, Shabib Aftab
A New High-Performance Bridge Structure for 4-to-2 Compressor using CMOS and CNFET Technology
Mehdi Darvishi, Mehdi Bagherizadeh
Effect of Friction on Ball-On-Sphere System Modelled by Bond Graph
Abdulmumin M. Yesufu., Aliyu D. Usman
A Modified Particle Swarm Optimization Algorithm based on Self-Adaptive Acceleration Constants
Sudip Mandal
A Channel Theory based 2-Step Approach to Semantic Alignment in a Complex Environment
Andreas Bildstein, Junkang Feng
Measures for the Ontological Relations in Enterprise
Sabria Hadj Tayeb, Myriam Noureddine
Child based Level-Wise List Scheduling Algorithm
Lokesh Kr. Arya, Amandeep Verma
An Identity-based Blind Signature Approach for E-voting System
Mahender Kumar, C.P. Katti, P. C. Saxena
An evolutionary approach of attack graph to attack tree conversion
Md. Shariful Haque, Travis Atkison
Error prone transmission system to resist data loss in a wireless sensor network
Sunil Kumar, C. Rama Krishna, A. K. Solanki
Enhancing the QoS of IoT networks with lightweight security protocol using Contiki OS
Haytham Qushtom, Khalid Rabaya’h
Comparative analysis of KNN algorithm using various normalization techniques
Amit Pandey, Achin Jain
Energy consumption in mobile phones
Ambrin Javed, Muhammad Alyas Shahid, Muhammad Sharif, Mussarat Yasmin
A fault-tolerant improved OLSR protocol using k-Connected m-Dominating set
Vinayagam P. S.
A new approach for data hiding based on pixel pairs and chaotic map
Sengul Dogan
Security protocol of keys management system for transmission encrypted data
Rasha Subhi Ali, Alaa Kadhim F.
Achieving confidentiality in electronic health records using cloud systems
Robert French-Baidoo, Dominic Asamoah, Stephen Opoku Oppong
Validation of an adaptive risk-based access control model for the internet of things
Hany F. Atlam, Ahmed Alenezi, Raid Khalid Hussein, Gary B. Wills
An improved model for securing ambient home network against spoofing attack
Solomon A. Akinboro, Adebayo Omotosho, Modupe O. Odusami
Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR
Mohammed Abdul Samad AL-khatib, Auqib Hamid Lone
Effective use method of cloudlet resources by mobile users
Rashid G. Alakbarov, Oqtay R. Alakbarov
A multi-agent system-based method of detecting DDoS attacks
Xin Zhang, Ying Zhang, Raees Altaf, Xin Feng
Cyber attacks in cloud computing: modelling multi-stage attacks using probability density curves
Aaron Zimba, Victoria Chama
Inter integrated WSN for crude oil pipeline monitoring
Bhavyarani M. P., U. B. Mahadeva Swamy, M. B. Shrynik Jain
Image cryptography with matrix array symmetric key using chaos based approach
Tarun Kumar, Shikha Chauhan
The method of hidden terminal transmission of network attack signatures
Igor Ruban, Nataliia Lukova-Chuiko, Vadym Mukhin, Yaroslav Kornaga, Igor Grishko, Anton Smirnov
VLSI implementation of CMOS full adders with low leakage power
Manisha B. S., Rudraswamy S. B.
Linear improved gravitational search algorithm for load scheduling in cloud computing environment (LIGSA-C)
Divya Chaudhary, Bijendra Kumar
Intelligent energy aware fidelity based on-demand secure routing protocol for MANET
Himadri N. Saha, Prachatos Mitra
a novel energy efficient routing protocol EACBM for scalable wireless sensor networks
Amanjot Singh Toor, A.K. Jain
Security evaluation of cellular networks handover techniques
Vincent Omollo Nyangaresi, Silvance O. Abeka, Anthony Rodgrigues
Cryptography based on RGB color channels using ANNs
Sanjay Kumar Pal, Sumeet Anand
Improving the performance of fuzzy minimum spanning tree based routing process through P-node fuzzy multicasting approach in MANET
Soham Bandyopadhyay, Sunil Karforma
Alleviating malicious insider attacks in MANET using a multipath on-demand security mechanism
Shahnawaz Ahmad
A combined TCP-friendly rate control with WFQ approach for congestion control for MANET
Y. Narasimha Reddy, P V S. Srinivas