Improving network security based on trust-aware routing protocols using long short-term memory-queuing segment-routing algorithms
V Muthukumaran, VV Kumar, RB Joseph… - International Journal of …, 2021 - igi-global.com
Defending all single connection failures for a particular system, segment routing issue, the
switch will focus on the problems of selecting a small subset of trust-aware routing to …
switch will focus on the problems of selecting a small subset of trust-aware routing to …
Efficient text summarization method for blind people using text mining techniques
S Basheer, M Anbarasi, DG Sakshi… - International Journal of …, 2020 - Springer
Owing to the phenomenal growth in communication technology, most of us hardly have time
to read books. This habit of reading is slowly diminishing because of the busy lives of …
to read books. This habit of reading is slowly diminishing because of the busy lives of …
Design of computer network security defense system based on artificial intelligence and neural network
L Bian - Wireless Personal Communications, 2023 - Springer
In order to improve the effect of computer security defense, this paper applies artificial
intelligence technology and neural network technology to the design of computer network …
intelligence technology and neural network technology to the design of computer network …
An approach to feature selection in intrusion detection systems using machine learning algorithms
The rapid development of various services that are provided by information technology has
been widely accepted by the users who are making use of such services in their day-to-day …
been widely accepted by the users who are making use of such services in their day-to-day …
Three-dimensional submarine-to-submarine passive target tracking in the presence of non-gaussian noises
S Kodukula - International Journal of e-Collaboration (IJeC), 2021 - igi-global.com
In underwater surveillance, three-dimensional target tracking is a challenging task. The
angles-only measurements (ie, bearing and elevation) obtained by hull mounted sensors …
angles-only measurements (ie, bearing and elevation) obtained by hull mounted sensors …
Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring
Organizations have moved from the conventional industries to smart industries by
embracing the approach of industrial internet of things (IIoT), which has provided an avenue …
embracing the approach of industrial internet of things (IIoT), which has provided an avenue …
An effective content boosted collaborative filtering for movie recommendation systems using density based clustering with artificial flora optimization algorithm
J Parthasarathy, RB Kalivaradhan - International Journal of System …, 2021 - Springer
Recommender systems (RS) are information filtering approaches that intend to foresee the
rating for customers and products, mainly from big data for recommending their likes. Movie …
rating for customers and products, mainly from big data for recommending their likes. Movie …
Measure of nonlinearity with application to bearings-only target tracking
K Jahan, SK Rao - International Journal of e-Collaboration (IJeC), 2021 - igi-global.com
Using the recently proposed measure of nonlinearity (MoN), the authors try to find the
magnitude of nonlinearity for passive target tracking with bearings-only measurements in …
magnitude of nonlinearity for passive target tracking with bearings-only measurements in …
RETRACTED: An information extraction method based on improved mixed text density web pages
Y Zhou, X Yin, J Yan - Expert Systems, 2024 - Wiley Online Library
To improve the effect of web page information extraction, this paper proposes an improved
information extraction method of mixed text density grids. Under various power constraints of …
information extraction method of mixed text density grids. Under various power constraints of …
[Retracted] Reversible Data Hiding of Digital Image Based on Pixel Combination Algorithm
J Zhang - Advances in Multimedia, 2022 - Wiley Online Library
In order to improve the security effect of image information, this paper studies the reversible
information hiding of the digital images combined with the pixel combination algorithm and …
information hiding of the digital images combined with the pixel combination algorithm and …