Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Anomaly Detection in IoT Based Satellite Networks: NidaDeepMix
Nida Canpolat, Sengul Dogan, Mehmet Karakose, Turker Tuncer, Musa Yenilmez
Securing Drone Communications: A Vulnerability Analysis of MAVLink
Anuhya Murki, Mahati A. Kalale, Shriya Anil, P. Santhi Thilagam
An Innovative System for Daily Thunderstorm Event Prediction using Deep Learning
Md. Tasfirul Alam Siyam, Mahfuzul H. Chowdhury
Energy-Efficient Traffic Management Scheme for Wireless Sensor Network
Shailaja S. Halli, Poornima G. Patil
CLEFIA-based Lightweight Encryption for Resource-Constrained Systems: Design, Algorithms and Security Analysis
Sergiy Gnatyuk, Berik Akhmetov, Dauriya Zhaxygulova, Yuliia Polishchuk
A4C: A Novel Hybrid Algorithm for Resource-Aware Scheduling in Cloud Environment
Santhosh Kumar Medishetti, Bigul Sunitha Devi, Maheswari Bandi, Rani Sailaja Velamakanni, Rameshwaraiah Kurupati, Ganesh Reddy Karri
Scalable-pos: Towards Decentralized and Efficient Energy Saving Consensus in Blockchain
Anupama B.S., Sunitha N.R., G.S. Thejas
ITD-GMJN: Insider Thread Detection in Cloud Computing using Golf Optimized MICE based Jordan Neural Network
B. Gayathri
Hybrid LSTM-attention Model for DDoS Attack Detection in Software-defined Networking
Rikie Kartadie, Danny Kriestanto, Muhammad Agung Nugroho, Chuan-Ming Liu
Assault Type Detection in WSN Based on Modified DBSCAN with Osprey Optimization Using Hybrid Classifier LSTM with XGBOOST for Military Sector
R. Preethi
Benchmarking SHA256 vs Scrypt in Blockchain Block Discovery
Fitria, Joko Triloka, Eko Win Kenali, Riko Herwanto
Multi-Criteria Decision-Making (MCDM) Approach for Software Architecture Selection in Cloud Computing Using Evidential Reasoning and Bayesian Inference Techniques
Jide Ebenezer Taiwo Akinsola, Akinwale Olusolabomi Akinkunmi, Ifeoluwa Michael Olaniyi, John Edet Efiong, Emmanuel Ajayi Olajubu, Ganiyu Adesola Aderonmu
Exploring and Implementing Container Scheduling Methods: A Comparative Review and Practical Approach
Kanika Sharma, Parul Khurana
Secure Blockchain-based Routing with Narwhal Optimization for WSNs
Ranjeet Yadav, N. Manimegalai, Mercy Beulah E., Mohammed Al-Farouni
Proof-of-resource Enabled 6G Resource Management Using Quaternion-attentive Cascaded Capsule Networks
Sudha Y., Karthikeyan H., Prabha M., Sree Southry S.
Efficient Localization-based Clustering Approach for Increased Residual Energy and Enhanced Network Lifetime
Indira R. Umarji, S.M. Joshi
Multi-objective Clustering Framework for Energy-efficient Precision Agriculture in WSNs using Optimized Convolutional Autoencoder with Dual-key Transformer Network
M. Sudha, Abha Kiran Rajpoot, K. Narasimha Raju, Elangovan Muniyandy
Bacterial Foraging Inspired Mamdani Fuzzy Inference based AODV (BF-MFI-AODV) for VANET Route Management Optimization
R. Jasmine Immaculate Shelly, M. Milton Joe, B. Ramakrishnan
Innovative Forensics in IoT Clouds by Leveraging Blockchain for Data Integrity and Security
Ragu Gnanaprakasam, Ramamoorthy Sriramulu, Poorvadevi Ramamoorthy, Mervin Retnadhas
IoT Driven HRES Smart Grid with Advanced Routing and IQKM Security Mechanism
J.B. Shriram, P. Anbalagan, A. Vegi Fernando, Srikanth Mylapalli
EdSri: An Enhanced Approach Towards Optimizing Cloud Communication by Hybridizing Cryptography and Steganography with Huffman Compression Method
Edwin Xorsenyo Amenu, Sridaran Rajagopal.
Ensemble Fusion Model for Enhanced Speech Emotion Recognition and Confusion Resolution
Rania Ahmed, Mahmoud Hussein, Arabi Keshk
A Holistic Framework for Confidential Brain Tumor Diagnosis over IoMT: HWS-CSIWT and OBTSC-Net Integration
M.V.S. Ramprasad, Md. Zia Ur Rahman
Integrating Quantum Computing with Cloud Systems: Opportunities, Challenges, and Future Prospects
Satar Habib Mnaathr, Duha Ali Hasan
Design and Implementation of Intelligent Traffic Control Systems with Vehicular Ad Hoc Networks
Osita Miracle Nwakeze, Christopher Odeh, Obaze Caleb Akachukwu
Self-adaptive Resource Allocation in Fog-Cloud Systems Using Multi-agent Deep Reinforcement Learning with Meta-learning
Tapas K. Das, Santosh K. Das, Swarupananda Bissoyi, Deepak K. Patel
Delivering the Core Curriculum and Minimum Academic Standards (CCMAS) in a Virtual Platform in Nigeria: A Systematic Review
Gabriel James, Anietie Ekong, David O. Egete, Martha Orazulume, Iniobong Okon, Aniekan Effiong
Design of an Android-Based Information System for Marketing Organic Agricultural Products
Ita Arfyanti, Syafei Karim, Aulia Khoirunnita
Improving Agricultural Commodity Trading through Data Imputation Methods for Price Prediction Accuracy
Pattharaporn Thongnim, Sueppong Mueanchamnong
Understanding the Dynamics of Trust and Engagement in E-Commerce Recommender Systems: Trends and Influences
Folasade O. Isinkaye, Michael O. Olusanya, Jumoke Soyemi
Model Real-Time Viewer Monitoring Based on SDLC for Student Learning Outcomes
Wilda Susanti, Nicholas Renaldo, Gusrio Tendra, Torkis Nasution, Johan, Rahma Widi, Yulvia Nora Marlim
Sustainable and Fair Task Scheduling in Cloud Computing Using Hybrid Bio-Inspired Algorithms for Green Computing
Garima Verma
IoT-Enabled Estrus Detection in Dairy Cattle Using Machine Learning Technique
Rhutuja Kshirsagar, Kamlesh Kalbande, Pooja Yerunkar, Akhilesh Lokhande, Krishnendu Mondal, Harsh Jagtap, Rahul Chunarkar
IoT for Industrial Automation: A Review on Industry 4.0 Applications
Rafiul R. Zahid, Rakibul H. Rakib, Iftekhar Rahman, Md. A. Amin, Tanjum R. Akanto, Fahmida A. Antara, Sadia Enam
Methodological Foundations of Calculating Cybersecurity from Specialized Determinants of Communication Networks
Volodymyr Akhramovych, Vadym Akhramovych, Alla Kobozieva, Oleksandr Laptiev
Implementing Causal Observability for Practical Site Reliability Engineering in Cloud-Native Distributed Systems
Oreoluwa Omoike
An Adaptive Energy-Aware Clustering Algorithm for Lifetime Maximization in Homogeneous Wireless Sensor Networks
Ishaq A. Idris, Abdulkarim Bello, Abubakar B. Tambawal, Samaila Buda
FusionNet - SQL-Fusion-Based Deep Learning Model for SQL Injection Detection
Nayankumar Mali, Keyur Patel, Himani Joshi
Performance Evaluation of the AODV Routing Pro-tocol in Multi-hop WSNs for Target Detection
Parikesh Dhal, Narendra Kumar Kamila, Deepak Kumar Rakesh
Mobile OTP Authentication Protocol Design and Implementation for Local Federated Clients to Federated Central Server via MQTT
Narendra Babu Pamula, Ajoy Kumar Khan, Arnidam Sarkar