Analysis of Criminal Landscape by Utilizing Statistical Analysis and Deep Learning Techniques

RK Mishra, AR Ansari, JAA Jothi… - Journal of Applied …, 2024 - Taylor & Francis
This research intends to provide law enforcement organizations with a deep learning model
that uses trends in past crimes to forecast future crimes. The study will enable them to …

[PDF][PDF] Secure Encryption of Parallel Chaotic English Education Data Based on 4-order Cellular Neural Network

M Wei - database, 2023 - ijns.jalaxy.com.tw
Abstract In English education, the security of English data is very important. It is related to the
leakage of English data in the transmission process. In order to solve the problem of …

[HTML][HTML] Глобальный мегатренд Четвертой промышленной революции в цифровой экономике: как реализовать на практике потенциал «умных» городов?

П Санчул - Вестник международных организаций: образование …, 2022 - cyberleninka.ru
Возникновение концепции «умного» города стало одним из крупнейших достижений
Четвертой промышленной революции наряду с «умными» мобильными …

Machine Learning Applications for Renewable Energy Systems

YS Afridi, L Hassan, K Ahmad - Advances in Artificial Intelligence for …, 2023 - Springer
The world is relying more and more on renewable energy sources to cater the global energy
demand. Consequently, the renewable energy systems are becoming more and more …

Stylometry Analysis of Multi-authored Documents for Authorship and Author Style Change Detection

MT Zamir, MA Ayub, A Gul, N Ahmad… - arXiv preprint arXiv …, 2024 - arxiv.org
In recent years, the increasing use of Artificial Intelligence based text generation tools has
posed new challenges in document provenance, authentication, and authorship detection …

Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system

KC Lu, IH Liu, ZC Liu, JS Li - IET Networks, 2024 - Wiley Online Library
Supervisory control and data acquisition (SCADA) systems are vital in monitoring and
controlling industrial processes through the web. However, while such systems result in …

Inkjet-Printed Reservoir Computing Network for In Situ Sensor Predictions

SD Gardner - 2023 - search.proquest.com
The technological achievements made with silicon-based transistors have led to nearly all
the computing seen today, complete with benefits such as maximized operating speeds …

Revisión de literatura sobre métodos de protección para garantizar ciberseguridad en instituciones financieras en el contexto ecuatoriano

EI Salazar Rodríguez - 2023 - dspace.ups.edu.ec
RESUMEN Últimamente, con el auge de los ataques cibernéticos, las amenazas digitales y
el fraude modernos, la seguridad cibernética en las instituciones financieras en Ecuador se …

A Study of the Active Access-Point Configuration Algorithm under Channel Bonding to Dual IEEE 802.11 n and 11ac Interfaces in an Elastic WLAN System for IoT …

SC Roy, N Funabiki, MM Rahman, B Wu… - Signals, 2023 - mdpi.com
Currently, Internet of Things (IoT) has become common in various applications, including
smart factories, smart cities, and smart homes. In them, wireless local-area networks …

Управление развитием умного города

КА Семячков - 2023 - elibrary.ru
Монография посвящена вопросам управления развитием современных городов в
условиях цифровизации социально-экономических процессов разного уровня …