Linked e-resources

Details

Intro
Preface
Contents
Editors and Contributors
Optimal Placement of Phasor Measurement Units Considering Channel Limits Under Various Contingencies
1 Introduction
2 Problem Formulation
2.1 Measurement Redundancy
2.2 Zero Injection Bus
2.3 Single PMU Loss or Single Line Outage
2.4 Channel Limits
3 Optimal Placement of Phasor Measurement Unit
4 Result Analysis
5 Conclusion
References
Adaptive Deep Recurrent Neural Network-Based COVID-19 Healthcare Data Prediction for Early Risk Prediction
1 Introduction
2 Related Works

2.1 Problem Identification Factors
3 Proposed Method
3.1 Preprocessing
3.2 Intrinsic Covid Defect Rate
3.3 Relative Cluster-Intensive Feature Selection
3.4 Adaptive Deep Vectorized Recursive Neural Network
4 Experimental Results and Discussion
5 Conclusion
References
Maximum Decision Support Regression-Based Advance Secure Data Encrypt Transmission for Healthcare Data Sharing in the Cloud Computing
1 Introduction
1.1 The Novelty of This Paper
2 Related Work
2.1 Problem Factors
3 Proposed Method
3.1 Node Efficiency Hit Rate (NEHR)

3.2 Efficient Spider Optimization Scheme
3.3 Maximum Decision Support Regression
3.4 Advanced Secure Data Encrypt Transmission (ASDET)
4 Result and Discussion
5 Conclusion
References
Routing Integrity Mechanism to Prevent Wormhole Attacks in Vehicular Adhoc Networks
1 Introduction
2 Literature
3 Delay-Sensitive Message Integrity Mechanism to Isolate the Wormhole Attacks
4 Result Analysis
5 Conclusions
References
A Detailed Analysis on Spam Emails and Detection Using Machine Learning Algorithms
1 Introduction
2 Types of Spam

2.1 Understanding How Spammers Gets Address
2.2 Problems with Spamming
2.3 Types of Spam Filters
2.4 Factors to Determine if Email Is Spam or Ham
2.5 Working of Gmail Spam Filter
2.6 Working of Outlook Spam Filter
2.7 Working of Yahoo Spam Filter
3 Literature Review
4 Analysis of Machine Learning Algorithms
5 Conclusion
References
Advanced Encryption Standard-Based Encryption for Secured Transmission of Data in Cognitive Radio with Multi-channels
1 Introduction
2 Literature Survey
2.1 Related Works
3 Proposed MPC Protocol for Channel Allocation

3.1 Optimized LSTM Classifier
3.2 SU-SMO Algorithm
4 Suggested Secure Data Transmission Using AES Protocol
4.1 Channel Sensing Phase
4.2 Contention Phase
4.3 Data Transmission Phase
4.4 AES
4.5 Encryption
4.6 Decryption
5 Results and Discussion
5.1 Simulation Procedure
5.2 Performance Evaluation with Regard to Average Backoff
5.3 Performance Evaluation with Regard to Sensing Delay
5.4 Performance Evaluation with Regard to Throughput
5.5 Performance Evaluation with Regard to Channel Utilization
5.6 Convergence Analysis
6 Conclusion
References
Multi Energy-Harvesting Smart Water Meter Design for Underground Water Pipeline Leakage Detection

Browse Subjects

Show more subjects...

Statistics

from
to
Export