Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network
Moving towards recent technologies, Software Defined Networking (SDN) produces a
promising network framework to combine the overall network management system with …
promising network framework to combine the overall network management system with …
[PDF][PDF] An Improved Multi-Objective Particle Swarm Optimization Routing on MANET.
A Mobile Ad hoc Network (MANET) is a group of low-power consumption of wireless mobile
nodes that configure a wireless network without the assistance of any existing infrastructure …
nodes that configure a wireless network without the assistance of any existing infrastructure …
Hybrid cluster-based geographical routing protocol to mitigate malicious nodes in mobile ad hoc network
A mobile ad hoc network (MANET) consists of assorted mobile devices in a network without
centralised administration and infrastructure. Routing processes in MANETs rely on …
centralised administration and infrastructure. Routing processes in MANETs rely on …
[PDF][PDF] An optimized fuzzy based ant colony algorithm for 5G-MANET
The 5G demonstrations in a business has a significant role in today's fast-moving
technology. Manet in 5G, drives a wireless system intended at an enormously high data rate …
technology. Manet in 5G, drives a wireless system intended at an enormously high data rate …
Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption
VK Veerabathiran, D Mani, S Kuppusamy… - Soft Computing, 2020 - Springer
Cloud computing environment (CCE) can empower an association to re-appropriate
computing resources to increase monetary benefits. For both developers and the cloud …
computing resources to increase monetary benefits. For both developers and the cloud …
[PDF][PDF] Automatic Clustering of User Behaviour Profiles for Web Recommendation System.
Web usage mining, content mining, and structure mining comprise the web mining process.
Web-Page Recommendation (WPR) development by incorporating Data Mining Techniques …
Web-Page Recommendation (WPR) development by incorporating Data Mining Techniques …
Artificial Intelligence for Smart in Match Winning Prediction in Twenty20 Cricket League Using Machine Learning Model
M Subburaj, GRK Rao, B Parashar, I Jeyabalan… - Artificial Intelligence for …, 2023 - Springer
Artificial intelligence (AI) in cricket, particularly in the T20 series, has the most extreme
vulnerability, where a one-over can change the force of the game. With many players in the …
vulnerability, where a one-over can change the force of the game. With many players in the …
Design of QoS on data collection in wireless sensor network for automation process
HJ Hassan, GM Abdulsaheb… - International Journal of …, 2022 - inderscienceonline.com
WSNs facilitate the analysis of the universe with an unprecedented resolution. WSN is a
network that connects many low-cost, low-powered sensor nodes capable of …
network that connects many low-cost, low-powered sensor nodes capable of …
[PDF][PDF] Importance of cost efficiency in critical aspect of influences the decision-making process in banks
C Narawish, DK Sharma, SS Rajest… - Turkish Journal of …, 2021 - researchgate.net
Cost efficiency is an important and critical aspect that influences the decision-making
process. In cases of financial uncertainty, this becomes more basic and significant. Cost …
process. In cases of financial uncertainty, this becomes more basic and significant. Cost …
The impact of internal control practices on minimizing fraud in companies
Internal control structures are a collection of protocols and regulations that protect an
organization's properties, minimizing possibilities for theft and maintaining an organization's …
organization's properties, minimizing possibilities for theft and maintaining an organization's …