In connection with the growing requirements regarding the quality and continuity of energy supply and the dynamic development of renewable energy sources, the need for a thorough …
This paper presents an efficient strategy for transformer planning to reduce the system losses by means of transformer rearrangement. The customer connected to the distribution …
Key-based security is still the most widely used form of security today with a key distribution process between senders and receivers that is commonly perform and also it is a classic …
Transmission control protocol provides reliable communication between two or more parties. Each transmitted packet is acknowledged to make sure successful deliveries. Transport …
R Rajeshwari, MP Anuradha - Journal of Electrical Systems, 2024 - search.proquest.com
The increasing interconnections and accessibility of computing devices have become essential for improving our day-to-day operations. Distributed denial of services (DDoS) …
R Rahim - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
Cryptography is one type of protection that is widely used to secure information, encryption and decryption and the use of keys is a common process used to secure information; and …
A Bajpai, S Nigam - Smart and Innovative Trends in Next Generation …, 2018 - Springer
The divergent Ad-hoc network environs are exposed to various intrusions and threats like Black hole and Gray hole. These intrusions are hard to detect as the intruders attract the …
B Niu, B Xue - Machine Learning for Cyber Security: Third …, 2020 - Springer
As a common biological heuristic algorithm, Bacterial Foraging Optimization (BFO) is often used to solve optimization problems. Aiming at increasing the solution accuracy and …