Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Optimizing Memory using Knapsack Algorithm
Proposed Automated Framework to Select Suitable Design Pattern
Various Types of Image Noise and De-noising Algorithm
A Novel Reduced-Precision Fault-Tolerant Floating-Point Multiplier
SXP: Simplified Extreme Programing Process Model
A New High-Performance Bridge Structure for 4-to-2 Compressor using CMOS and CNFET Technology
Effect of Friction on Ball-On-Sphere System Modelled by Bond Graph
A Modified Particle Swarm Optimization Algorithm based on Self-Adaptive Acceleration Constants
A Channel Theory based 2-Step Approach to Semantic Alignment in a Complex Environment
Measures for the Ontological Relations in Enterprise
Child based Level-Wise List Scheduling Algorithm
An Identity-based Blind Signature Approach for E-voting System
An evolutionary approach of attack graph to attack tree conversion
Error prone transmission system to resist data loss in a wireless sensor network
Enhancing the QoS of IoT networks with lightweight security protocol using Contiki OS
Comparative analysis of KNN algorithm using various normalization techniques
Energy consumption in mobile phones
A fault-tolerant improved OLSR protocol using k-Connected m-Dominating set
A new approach for data hiding based on pixel pairs and chaotic map
Security protocol of keys management system for transmission encrypted data
Achieving confidentiality in electronic health records using cloud systems
Validation of an adaptive risk-based access control model for the internet of things
An improved model for securing ambient home network against spoofing attack
Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR
Effective use method of cloudlet resources by mobile users
A multi-agent system-based method of detecting DDoS attacks
Cyber attacks in cloud computing: modelling multi-stage attacks using probability density curves
Inter integrated WSN for crude oil pipeline monitoring
Image cryptography with matrix array symmetric key using chaos based approach
The method of hidden terminal transmission of network attack signatures
VLSI implementation of CMOS full adders with low leakage power
Linear improved gravitational search algorithm for load scheduling in cloud computing environment (LIGSA-C)
Intelligent energy aware fidelity based on-demand secure routing protocol for MANET
a novel energy efficient routing protocol EACBM for scalable wireless sensor networks
Security evaluation of cellular networks handover techniques
Cryptography based on RGB color channels using ANNs
Improving the performance of fuzzy minimum spanning tree based routing process through P-node fuzzy multicasting approach in MANET
Alleviating malicious insider attacks in MANET using a multipath on-demand security mechanism
A combined TCP-friendly rate control with WFQ approach for congestion control for MANET
Analysis of CRT-based watermarking technique for authentication of multimedia content