Deep learning technique based intrusion detection in cyber-security networks

C Chethana, PK Pareek… - 2022 IEEE 2nd …, 2022 - ieeexplore.ieee.org
As a result of the inherent weaknesses of the wireless medium, ad hoc networks are
susceptible to a broad variety of threats and assaults. As a direct consequence of this …

Energy optimization for optimal location in 5G networks using improved Barnacles Mating Optimizer

Z Mohammadnejad, HMR Al-Khafaji… - Physical …, 2023 - Elsevier
In recent years, wireless sensor networks have been studied in many applications. One of
the important issues studied in these networks is the optimal placement of cells in order to …

Student health detection using a machine learning approach and IoT

M Pradeepa, K Jamberi, S Sajith… - 2022 IEEE 2nd …, 2022 - ieeexplore.ieee.org
With the development of sensor technologies, Internet of Things (IoT) technologies for
creating behavioral and physiological management systems, including IoT-based pupil …

Improved Domain Generation Algorithm To Detect Cyber-Attack With Deep Learning Techniques

C Chethana, PK Pareek… - 2022 IEEE 2nd …, 2022 - ieeexplore.ieee.org
Deep learning is a subfield of machine learning (ML) that focuses on the development of
artificial intelligence. It is also often referred to by its acronym, DL (AI). This technique lays an …

A secure steganographic algorithm based on frequency domain for the transmission of hidden information

A Soria-Lorente, S Berres - Security and Communication …, 2017 - Wiley Online Library
This contribution proposes a novel steganographic method based on the compression
standard according to the Joint Photographic Expert Group and an Entropy Thresholding …

[HTML][HTML] Reconfigurable fractal microstrip antenna with varactor diode

K Madhusudhana, SP Hegde - Global Transitions Proceedings, 2022 - Elsevier
In this article, a rhombus shaped fractal microstrip frequency reconfiguration patch antenna
is presented. The proposed antenna depending upon the capacitance value of varactor …

[HTML][HTML] QCA: A survey and design of logic circuits

SC Chetti, O Yatgal - Global Transitions Proceedings, 2022 - Elsevier
Abstract Quantum Dot Cellular Automata (QCA) is one of the new technologies beyond
CMOS. Among various other technologies, this is considered to be most feasible and viable …

[PDF][PDF] An efficient method to audio steganography based on modification of least significant bit technique using random keys

AM Meligy, MM Nasef, FT Eid - International Journal of Computer …, 2015 - researchgate.net
Steganography is the art of amalgamating the secret message into another public message
which may be text, audio or video file in a way that no one can know or imperceptible the …

[HTML][HTML] Design of an efficient ALU blocks in quantum dot cellular automata (QCA)

N Ravi, MB Veena - Global Transitions Proceedings, 2022 - Elsevier
Quantum-dot cellular automata (QCA) is a raising nanotechnology with the potential for
quicker speed, smaller size and low power consumption than CMOS based technology. This …

[PDF][PDF] Teknik Steganography dengan Metode Least Significant Bit (LSB)

M Sitorus - Faklutas Teknik. Universitas Satya Negara Indonesia, 2015 - researchgate.net
Steganografi adalah metode untuk menyembunyikan informasi pada sebuah media, bisa
berupa media gambar, suara ataupun video. Aspek terpenting pada steganografi adalah …