The background of the study centres on the challenges faced in contract litigation due to the complexity and volume of legal documents involved. Tradi...
This paper presents the application of machine learning technique and recursive polynomial estimator for improving the reliability of critical safety ...
The changing nature of the frequency and complexity of cyber threats necessitates the need to implement network security based on intelligent and adap...
This paper presents an optimal control simulation of a diesel injection system using a Neuro model predictive-based Electronic Control Unit (ECU). The...
The underutilization of the constrained spectrum by the fixed channel allocation strategy and the increasing demand for seamless wireless services pro...
Pests are organism that causes damage to crops in a farm land. For many years, this organism has continued to evolve and some have even become resista...
The growingcomplexity of modern power systems have driven the need for efficient and effective energy distribution mechanisms. Smart grid system has s...
This paper presents the development of a cardiovascular heart disease classification model using neural network based data mining technique. The aim w...
Over the years the critical industrial infrastructure has suffered many problems of which cyber-attack is among the major concerns. This attack exploi...
In order to solve degradation-related difficulties, a thorough knowledge of lithium-ion battery (LIB) behaviour is important given the rapid expansion...
Fileless malware is a significant cybersecurity threat because of its ability to operate without traditional file-based signatures which makes it chal...
This paper presents the development of biometric exam fraud detection system using artificial intelligence technique. This aim is to employ facial rec...
Showing 133 to 144 of 170 papers
Publish Your Research With Us
Join our community of researchers and share your groundbreaking work with the world.