Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system

S Manimurugan, A Majdi, M Mohmmed… - Microprocessors and …, 2020 - Elsevier
Intrusion detection system has become the fundamental part for the network security and
essential for network security because of the expansion of attacks which causes many …

Method of indirect information hiding in the process of video compression

ВВ Бараннік, НВ Бараннік, ОО Ігнатьєв… - … and Computer Systems, 2021 - nti.khai.edu
It is substantiated that steganographic systems should be used to ensure the protection of
special information resources in conditions of its prompt delivery. Here, steganographic …

Study of discrete PID controller for DC motor speed control using MATLAB

S Balamurugan, A Umarani - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
DC motors are known for simple design and consistency are used for control area section of
the industry. In many variable speed systems, it is commonly used where wide speed ranges …

Method for quantitative criterion based transformation of the video information alphabet

S Khmelevsky, I Tupitsya, O Khmelevska… - … and Computer Systems, 2022 - nti.khai.edu
Subject of study: technologies implemented in modern video coding algorithms to ensure
the appropriate level of reliability in the conditions of their compact presentation. The goal is …

Methodology of increasing the reliability of video information in infocommunication networks aerosegment

DV Karlov, IM Tupitsya… - Radio Electronics …, 2022 - ric.zntu.edu.ua
Context. The problem of localization of the effect of errors in data transmission channels
when using compression and noiseimmune coding methods in the conditions of compliance …

[PDF][PDF] Pixel based techniques for gray image compression: A review

ZH Abeda, GK AL-Khafaji - Journal of Al-Qadisiyah for computer science …, 2022 - iasj.net
Currently, with the huge increase in modern communication and network applications, the
speed of transformation and storing data in compact forms are pressing issues. Daily an …

DRCNN-IDS approach for intelligent intrusion detection system

V Manikandan, K Gowsic, T Prince… - … on Computing and …, 2020 - ieeexplore.ieee.org
In recent times, deep learning technique turns to be an interesting topic, which is extensively
utilized to construct an Intrusion Detection System (IDS) for identifying and classifying web …

A survey on various machine learning models in iot applications

V Porkodi, D Yuvaraj, J Khan… - … on Computing and …, 2020 - ieeexplore.ieee.org
This paper presents a recent survey on various machine learning (ML) methods that acts as
a backbone for various Internet of Things (IoT) applications. The study brings out the …

[PDF][PDF] Model of Transformation of the Alphabet of the Encoded Data as a Tool to Provide the Necessary Level of Video Image Qualityi in Aeromonitoring Systems.

S Khmelevskiy, I Tupitsya, M Parkhomenko… - IT&I Workshops, 2021 - ceur-ws.org
The drawbacks of the existing algorithms for coding data of video information resources in
the aero monitoring system are analyzed. The main ones are: the complexity of the …

Indirect information hiding technology on a multiadic basis

V Barannik, N Barannik… - … , Automatyka, Pomiary w …, 2021 - yadda.icm.edu.pl
It is shown that the current direction of increasing the safety of information resources when
transmitting information in info-communication systems is the use of methods of …