A review of secure neural networks and big data mining applications in financial risk assessment
The business activities of an enterprise are the unending development of the behaviours of
groups, and the financial risks that are formed are a direct result of the business activities of …
groups, and the financial risks that are formed are a direct result of the business activities of …
Information design and unifying approach for secured data sharing using attribute-based access control mechanisms
R Regin, AA Khanna, V Krishnan, M Gupta… - … in Machine and …, 2023 - igi-global.com
In response to the safety concerns surrounding the IoT, an attribute-based encryption and
access control scheme (ABE-ACS) has been proposed. This scheme can be more effectively …
access control scheme (ABE-ACS) has been proposed. This scheme can be more effectively …
Dynamic intelligence-driven engineering flooding attack prediction using ensemble learning
R Angeline, S Aarthi, R Regin… - Advances in Artificial and …, 2023 - igi-global.com
The rapid evolution of the Internet and communication technologies has fueled the
proliferation of wireless sensor network (WSN) technology, which is increasingly important in …
proliferation of wireless sensor network (WSN) technology, which is increasingly important in …
Advances in Solutions to Improve the Energy Performance of Agricultural Greenhouses: A Comprehensive Review.
RP Castro, P Dinho da Silva… - Applied Sciences (2076 …, 2024 - search.ebscohost.com
The increasing global population and the challenges faced by the food production sector,
including urbanization, reduction of arable land, and climatic extremes, necessitate …
including urbanization, reduction of arable land, and climatic extremes, necessitate …
An Improvised Virtual Queue Algorithm to Manipulate the Congestion in High-Speed Network
In the recent technological era, advancement in the application allows faster transmission of
data massively over the network, and it leads to the emergence of challenges related to high …
data massively over the network, and it leads to the emergence of challenges related to high …
[HTML][HTML] Towards a semantic structure for classifying IoT agriculture sensor datasets: An approach based on machine learning and web semantic technologies
With the increase in the number of IoT farming datasets, it has become so difficult to identify
the right data for IoT agriculture applications. Therefore, a meaningful structure is needed to …
the right data for IoT agriculture applications. Therefore, a meaningful structure is needed to …
[PDF][PDF] Application of Machine Learning to the Process of Crop Selection Based on Land Dataset
Annotation: We are well recognised that the vast majority of Indians work in agriculture. Most
farmers always grow the same thing, always use the same amount of fertilizer, and always …
farmers always grow the same thing, always use the same amount of fertilizer, and always …
The effects of effective management of human resources on the overall performance of an organization
The purpose of this research is to educate government agencies on the importance of
human resources. In the aftermath of numerous threats, the government did not have a …
human resources. In the aftermath of numerous threats, the government did not have a …
An Analytical Study of Development in Response to the COVID-19 Pandemic
R Regin, SS Rajest - Central Asian Journal of …, 2023 - cajmns.centralasianstudies.org
The common cold, severe acute respiratory syndrome, and Middle East respiratory
syndrome are all examples of disorders that can be caused by coronaviruses, which are a …
syndrome are all examples of disorders that can be caused by coronaviruses, which are a …
Principal Component Analysis for ATM Facial Recognition Security
Abstract The Automated Teller Machine, also known as an ATM, has become the most
common method by which individuals withdraw cash for their own use. The transactions that …
common method by which individuals withdraw cash for their own use. The transactions that …