All Stories

  1. CART-ANOVA-Based Transfer Learning Approach for Seven Distinct Tumor Classification Schemes with Generalization Capability
  2. Blockchain and Digital Twin for Smart Healthcare
  3. Modeling wireless sensors network using shrewd neural networks
  4. Development of Sustainable Wireless Resource model through Shrewd Neural Network
  5. Robust Output Feedback Stabilization and Tracking for an Uncertain Nonholonomic Systems with Application to a Mobile Robot
  6. Future Communication Systems Using Artificial Intelligence, Internet of Things and Data Science
  7. Time based Meticulous analysis of pandemic spreading ratio using Simpy framework
  8. Performance analysis of a hybrid optical amplifier based 480-Gbps DWDM-FSO system under the effect of different atmospheric conditions
  9. An Improved Multimodal Biometric Identification System Employing Score-Level Fuzzification of Finger Texture and Finger Vein Biometrics
  10. BROACHING UNCOUTH WATER LEVEL SNAG IN UNDERGROUND AGRICULTURE FIELD THROUGH WIRELESS SENSORS
  11. Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing
  12. Electric Vehicle Charging System in the Smart Grid Using Different Machine Learning Methods
  13. SDS: Scrumptious Dataflow Strategy for IoT Devices in Heterogeneous Network Environment
  14. Adopting proactive results by developing the Shrewd model of pandemic COVID-19
  15. CED-OR Based Opportunistic Routing Mechanism for Underwater Wireless Sensor Networks
  16. Succulent link selection strategy for underwater sensor network
  17. Avoiding Vulnerabilities and Attacks with a Proactive Strategy for Web Applications
  18. Toward developing tangling noise removal and blind inpainting mechanism based on total variation in image processing
  19. Corrigendum to “USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time”
  20. A proactive role of IoT devices in building smart cities
  21. A comprehensive review of modern trends in optimization techniques applied to hybrid microgrid systems
  22. Organic Power Generation and Utilization Using Anaerobic Digestion Process
  23. Towards Shrewd Object Visualization Mechanism
  24. Bodacious-Instance Coverage Mechanism for Wireless Sensor Network
  25. NRSM: node redeployment shrewd mechanism for wireless sensor network
  26. Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
  27. Iris and Foot based Sustainable Biometric Identification Approach
  28. Conversion of adverse data corpus to shrewd output using sampling metrics
  29. Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network
  30. Sagacious Intrusion Detection Strategy in Sensor Network
  31. DEVELOPMENT OF SHREWD COSMETOLOGY MODEL THROUGH FUZZY LOGIC
  32. Dual-nature biometric recognition epitome
  33. Diverging Mysterious in Green Supply Chain Management
  34. SLM-OJ: Surrogate Learning Mechanism during Outbreak Juncture
  35. Underwater Routing Protocols Analysis of Intrepid Link Selection Mechanism, Challenges and Strategies
  36. Synergic Development of Energy Efficacious Wireless Sensor Networks
  37. CHALLENGING STRATEGIC TRENDS IN GREEN SUPPLY CHAIN MANAGEMENT
  38. Underwater Routing Protocols: Analysis of Intrepid Link Selection Mechanism, Challenges and Strategies
  39. USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time
  40. Design of Shrewd Underwater Routing Synergy Using Porous Energy Shells
  41. Efficient & Cost Effective Maximum Power Point Tracker for PV Applications
  42. Design of Shrewd Underwater Routing Synergy using Porous Energy Shells
  43. Underwater Pragmatic Routing Approach Through Packet Reverberation Mechanism
  44. Underwater Resurrection Routing Synergy using Astucious Energy Pods
  45. Underwater routing protocols: Analysis of link selection challenges
  46. Efficient Node Monitoring Mechanism in WSN using Contikimac Protocol
  47. Study on Detection of P300 ERP Component in EEG Signals and Algorithms
  48. Monitoring of soldier's health and transmission of secret codes