Linked e-resources

Details

Intro; Preface; Contents; About the Editors; 1 Impact of Various Networks Security Attacks on Wireless Sensor Localization Algorithms Based upon WSN Node's Residual Energy; Abstract; 1 Introduction; 2 Previous Work; 3 WSN Localization Algorithms; 4 Network Security Attacks; 5 Simulation Setup and Result; 6 Conclusion and Future Scope; References; 2 Fitting a Neural Network Classification Model in MATLAB and R for Tweeter Data set; Abstract; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Identifying a Collection of Input Parameters and Corresponding Collection of Output Parameters

3.2 Structure of ANN3.3 Training the System with the Help of MATLAB Software; 4 Results; 4.1 Sentiment Analysis with Machine Learning; 5 Conclusion; References; 3 A Novel Approach for Blast-Induced Fly Rock Prediction Based on Particle Swarm Optimization and Artificial Neural Network; Abstract; 1 Introduction; 2 Imperialist Competition Algorithms; 2.1 Initial Empires Optimization Procedure; 2.2 Assimilation, Revolution, and Uniting; 3 Artificial Neural Network; 4 Experimental Results; 5 Conclusion; References

4 Algorithms for Synchrophasor-Enabled Digital Relay in Differential Protection SchemesAbstract; 1 Introduction; 1.1 Synchrophasor; 1.2 Application of PMU in Power Systems; 1.3 Synchrophasor-Enabled Digital Relay; 2 Proposed Methodology; 2.1 Off-Nominal Frequency Operation of PMU; 2.2 Relay Algorithms; 2.2.1 Algorithm for Mann and Morrison; 2.2.2 Differential Equation Algorithm; 3 Results and Discussions; 3.1 Mann and Morrison Algorithm; 3.2 Differential Equation Algorithm; 4 Conclusion; References; 5 A Prototype for Grievance Redressal System; Abstract; 1 Introduction; 2 Related Work

3 Approach for Handling the Presented Issue4 Modeling of Grievance Redressal System; 5 Conceptual Flow of Data in GRS; 6 Pros and Cons; 7 Future Enhancements; 8 Conclusion; References; 6 Design and Development of Symmetric Cipher for Text Data; Abstract; 1 Introduction; 2 Related Work; 3 Proposed Work; 3.1 Encryption; 3.2 Decryption; 4 Results; 5 Conclusion; References; 7 Comprehensive Method of Knowledge-Based Approach for Word-Sense Disambiguation; Abstract; 1 Introduction; 2 Literature Review; 3 Word-Sense Disambiguation (WSD) Techniques; 3.1 Lesk Algorithm; 3.2 Walker Algorithm

3.3 Conceptual Density Algorithm4 Comparative Analysis; 5 Proposed Method; 6 Conclusion; References; 8 Reversible Data Hiding by Utilizing AES Encryption and LZW Compression; Abstract; 1 Introduction; 2 Related Work; 3 Proposed Methodology; 3.1 Preprocessing; 3.2 Bit Plane in Rows; 3.3 AES; 3.4 LZW Compression; 3.5 Embedding; 3.6 Extraction Steps; 3.7 Extraction of Image; 3.8 Extraction of Data; 3.9 Algorithm; 4 Experiment and Results; 4.1 Dataset; 4.2 Results; 5 Conclusion; References

Browse Subjects

Show more subjects...

Statistics

from
to
Export