All Stories

  1. Framework for Semantic Threat Detection in Docker Container Environments with Local MoE LLMs
  2. An Adaptive Application-Aware Dynamic Load Balancing Framework for Open-Source SD-WAN
  3. The efficiency of ICT suppliers' product security incident response teams in reducing the risk of exploitation of vulnerabilities in the wild
  4. Distributed Sensor Network Calibration Under Sensor Nonlinearities with Applications in Aerodynamic Pressure Sensing
  5. Analyzing the Efficiency of Software Distribution Systems in AIoT Environments
  6. The Cost-Effective Management of Multiple E-Coupons on Public Ethereum-Based Chains Using NFT Standard With Implicit Ownership
  7. Classification methods for handwritten digit recognition: A survey
  8. Trait analysis based on multimodal prediction and optimization of the output parameters: A survey
  9. Tuning Convolutional Neural Network Hyperparameters by Bare Bones Fireworks Algorithm
  10. Signal Processing Platform for Long-Range Multi-Spectral Electro-Optical Systems
  11. Tailoring HFSWR Transmitting Antenna Array for Environment of the Equatorial Area: Gulf of Guinea Experiences
  12. Apparent Personality Analysis Based on Aggregation Model
  13. Keeping Children Safe Online With Limited Resources: Analyzing What is Seen and Heard
  14. Complex signal constellations in cumulantsbased AMC: Statistics and performance
  15. Teaching in conditions of difficult knowledge transfer due to the state of emergency caused by the pandemic
  16. Student Motivation to Learn About Blockchain Technology
  17. A solution for the over-the-horizon-radar simulator
  18. Implementation challenge and analysis of thermal image degradation on R-CNN face detection
  19. Malware command and control over social media: Towards the server-less infrastructure
  20. Modulation Order Reduction Method for Improving the Performance of AMC Algorithm Based on Sixth–Order Cumulants
  21. Automated language‐independent authorship verification (for Indo‐European languages)
  22. An Application of Partial Homomorphic Encryption in Computer System with Limited Resources
  23. A Short Introduction Into Innovative World of Masternode Coins
  24. IP Addressing: Problem-Based Learning Approach on Computer Networks
  25. Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics
  26. Robust Digital Processing of Speech Signals
  27. Robust Non-recursive AR Analysis of Speech Signal
  28. Robust Recursive AR Analysis of Speech Signal
  29. Fundamentals of Robust Parameter Estimation
  30. Applications of Robust Estimators in Speech Signal Processing
  31. Advancement of True Random Number Generators Based on Sound Cards Through Utilization of a New Post-processing Method
  32. VirtualMeshLab: Virtual laboratory for teaching Wireless Mesh Network
  33. A new way of covert communication by steganography via JPEG images within a Microsoft Word document
  34. The importance of experience with Web 2.0 technologies for knowledge management system development
  35. Comparative analysis of unicast routing protocols in MANET networks
  36. Classification of MANET routing protocols
  37. Inverted index search in data mining
  38. Implications of information systems use on the development of Web 2.0 based knowledge management system framework
  39. Internet Robotic Software -potential and applications
  40. Mousetracking visitors to evaluate efficacy of web site design
  41. Improving protection of PHP source code using cryptology models
  42. Attacks on IEEE wireless networks
  43. Using cryptology models for protecting PHP source code
  44. Comparative analysis of UDP throughput on IPv4 and IPv6 operating systems in IEEE 802.11n wireless networks protected with WPA2 security protocol
  45. Funkcionisanje web spider-a i komparativna analiza brzine rada
  46. System of assessment security for Android operating system
  47. Comparative analysis of the Certification Authority in Serbia
  48. DMS — Improving Web performance
  49. Local echo canceler with optimal input for true full-duplex speech scrambling system
  50. Robust Time-Varying AR Parameter Estimation
  51. Robust recursive AR speech analysis
  52. Robust non-recursive AR speech analysis
  53. Robust AR analysis of nonstationary discrete-time signals
  54. Estimation of nonstationary AR model using the weighted recursive least square algorithm
  55. An adaptive FIR echo canceller in analog full-duplex speech scrambling system
  56. Robust LPC parameter estimation in standard CELP 4800 b/s speech coder
  57. Time-varying AR speech analysis using robust RLS algorithm with variable forgetting factor