Gliomas are among the most aggressive brain tumors experienced and the accurate classification of such disease is critical for effective diagnosis and...
Due to the growing need for wireless broadband, there is a continued increased request for dynamic spectrum access of TV White Spaces (TVWS) by most c...
In order to solve degradation-related difficulties, a thorough knowledge of lithium-ion battery (LIB) behaviour is important given the rapid expansion...
The adoption of Internet of Things (IoT)-based monitoring and control systems in the oil and gas industry offers the promise of revolutionizing pipeli...
This study delves into the critical issue of pipeline oil theft in Nigeria, a nation heavily reliant on its oil industry. By harnessing the power of a...
The changing nature of the frequency and complexity of cyber threats necessitates the need to implement network security based on intelligent and adap...
A Wi-Fi network is a wireless local area network designed to provide internet connectivity to people within a particular area. In the context of this ...
This study presents the development and analysis of a new block hybrid method for the direct solution of second-order initial value problems (IVPs) of...
Adversarial attack is an attack tactics employed by cybercriminals to deceive modern network security systems and penetrate networks for cyber attack....
This study presents a Deep Neural Network (DNN) model for short-term load forecasting for mitigation of losses in power system. The model developed in...
Gliomas are among the most aggressive brain tumors experienced and the accurate classification of such disease is critical for effective diagnosis and...
This work is aimed at improving the bottle capping system with an adaptive model predictive controller. To achieve this, first, a robust pneumatic fri...
Showing 1 to 12 of 160 papers
Publish Your Research With Us
Join our community of researchers and share your groundbreaking work with the world.