-
221
Biometric cryptosystem to secure smart object communications in the internet of things
Published 2022-03-01“…Subsequently, the user message is encrypted using the AES algorithm, whereas the user template is encrypted by a proposed algorithm. …”
Get full text
Article -
222
METHOD OF SIMULTANEOUS OPTIMIZATION OF RADIO DEVICES PERFORMANCE IN FREQUENCY AND TIME DOMAINS
Published 2018-12-01“…In order to compute transient response the state space method was employed. …”
Get full text
Article -
223
Transforming Healthcare: The Role of Machine Learning in Early Disease Detection – Innovations, Hurdles, and the Road Ahead
Published 2025-01-01“…Healthcare establishments closely rely on advanced algorithms for his or her operations. The machine derives facts from difficult factors like clinical records and photographic information and genetic facts. …”
Get full text
Article -
224
Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
Published 2025-03-01“…In the particular case of a network of devices heterogeneous in terms of computing power, such as IoT, the modeling of a security system of the entire structure will have to take into account the fact that some devices have a very low computing power. …”
Get full text
Article -
225
Area Coverage Optimization using Networked Mobile Robots with State Estimation
Published 2023-05-01“…Here we emphasize that the network of autonomous robots deployed in the environment is unknown a priori. A set of computer experiments is conducted to validate the fact that the area coverage is still possible under noisy communication among robots deployed in a two-dimensional area.…”
Get full text
Article -
226
Optimization of seismic insulation parameters of frame buildings using adaptive methods
Published 2024-10-01“…Method. Development of an algorithm for calculating frame buildings of a frame structural system with seismic protection in buildings with flexible connections and with flexible and switchable connections Result. …”
Get full text
Article -
227
Stegan detection method for latent images for intellectual property protection systems
Published 2023-02-01“…The developed method is intended for stegan detection in two cases: to detect the fact of illegal use of intellectual property objects; for use in computer forensics when identifying images containing hidden and prohibited information.…”
Get full text
Article -
228
Delay-constrained data aggregation scheduling in wireless sensor networks
Published 2017-06-01Get full text
Article -
229
A New Method for Defuzzification and Ranking of Fuzzy Numbers Based on the Statistical Beta Distribution
Published 2016-01-01“…Granular computing is an emerging computing theory and paradigm that deals with the processing of information granules, which are defined as a number of information entities grouped together due to their similarity, physical adjacency, or indistinguishability. …”
Get full text
Article -
230
Evaluating the level of digitalization of the innovation process with artificial intelligence approach in the digital transformation of knowledge-based companies
Published 2025-02-01“…The scientific study of algorithms and statistical models are used by computer systems that use patterns and inference to perform tasks rather than using clear instructions. …”
Get full text
Article -
231
On the Performance of Linear Decreasing Inertia Weight Particle Swarm Optimization for Global Optimization
Published 2013-01-01“…However, linear decreasing inertia weight PSO (LDIW-PSO) algorithm is known to have the shortcoming of premature convergence in solving complex (multipeak) optimization problems due to lack of enough momentum for particles to do exploitation as the algorithm approaches its terminal point. …”
Get full text
Article -
232
-
233
AI and the News: Challenges Arisen From the Adoption of AI in News Production
Published 2025-04-01“…The deployment of AI should be assessed following its intended purpose, the nature of the data employed, and the degree of impartiality exhibited by the algorithms and intelligent computing systems. This paper presents a concise overview of the implications of integrating Artificial Intelligence-generated content in news production. …”
Get full text
Article -
234
Improving Modularity Regularization Techniques for Estimating Structures in Complex Network
Published 2025-07-01Get full text
Article -
235
EVOLUTION OF HIGH-FREQUENCY TRADE
Published 2018-03-01“…Present day exchange trade using computer algorithm (or high frequency robots) that can make independent trade decisions and function without man’s involvement is becoming quite usual. …”
Get full text
Article -
236
Improved OAM-Based Radar Targets Detection Using Uniform Concentric Circular Arrays
Published 2016-01-01Get full text
Article -
237
Reflector-aided direct locations of multiple signals in the presence of small reflector position biases
Published 2018-04-01“…Unlike most DPDs that presume noise is spatially uncorrelated, our study imposes no restriction on the correlation structure of noise, allowing this algorithm to be used in more general scenarios. In addition, we derive the Cramér–Rao bound expression and perform an analysis of the direct locations of multiple signals when the reflector positions are assumed accurate but in fact have small biases. …”
Get full text
Article -
238
Cludoop: An Efficient Distributed Density-Based Clustering for Big Data Using Hadoop
Published 2015-06-01Get full text
Article -
239
Constrained Uncertain System Stabilization with Enlargement of Invariant Sets
Published 2020-01-01“…In fact, the proposed approach is split into two parts. …”
Get full text
Article -
240