Adversarial attack is an attack tactics employed by cybercriminals to deceive modern network security systems and penetrate networks for cyber attack....
It is impossible to develop a fault free system, regardless of how perfect the design might be, as time improves the system reliability and mean time ...
Pipeline gas leakage posessafety and environmental risks in the oil and gas industry which necessitates the adoption of efficient detection methods. T...
This research presents the kinematic modeling of a four mecanum wheel robot for environment mapping and navigation. The study developed the kinematic ...
The Nigerian power sector is grappling with significant frequency instability in its 330kV transmission network, a challenge intensified by aging infr...
This study develops a mathematical model using a system of differential equations to describe the dynamics of reinforcement and punishment on behaviou...
Zero-day attacks pose one of the most formidable challenges in modern cybersecurity due to their unpredictability and the absence of prior signatures....
This paper presents the detection and isolation of black hole attack in wireless broadband ecosystem using artificial intelligence technique. Many lit...
The growing prevalence of pipeline failures has given rise to significant economic, social, and environmental consequences, necessitating urgent inter...
The growing appreciation and usage of cloud computing has heightened the need for a sound network-management practice, particularly under a dynamic an...
This study focuses on optimizing the power factor of distribution transformers through the implementation of a shunt capacitor bank. By sizing and dep...
The presence of complex and heterogeneous tumour characteristics is still a decisive problem in the diagnosis of brain tumours that makes it a signifi...
Showing 1 to 12 of 170 papers
Publish Your Research With Us
Join our community of researchers and share your groundbreaking work with the world.