Skoči na glavni sadržaj
  • Datum izdavanja: 30.06.2025.
  • Objavljen na Hrčku: 27.05.2025.

Sadržaj

Puni tekst

Comparative Analysis of SMOTE and ROSE Oversampling Techniques for kNN-Based Autonomous Vehicle Behavior Modeling (str. 132-143)

Celine Serbouh Touazi, Iness Ahriz, Ndeye Niang, Alain Piperno
Izvorni znanstveni članak


Generating an Iris-based Seed for Key-pairs in a Blockchain Platform (str. 144-155)

Marco Fiore, Federico Carrozzino, Gianvito Coppola, Gianni Guariglia, Marina Mongiello
Izvorni znanstveni članak


Enhancing Network Security: A Study on Classification Models for Intrusion Detection Systems (str. 156-165)

Abeer Abd Alhameed Mahmood, Azhar A. Hadi, Wasan Hashim Al-Masoody
Izvorni znanstveni članak


Experimental Evaluation of Open-Source-based VoNR and OTT Voice Services in 5G SA Network Deployments (str. 166-177)

Elena-Ramona Modroiu, Joyce Mwangama, Marius Corici, Thomas Magedanz
Izvorni znanstveni članak


AI-Generated Questions in Context: A Contextualized Investigation Using Platform Data, Student Feedback, and Faculty Observations (str. 178-188)

Rachel Van Campenhout, Benny G. Johnson, Michelle Clark, Melissa Deininger, Shannon Harper, Kelly Odenweller, Erin Wilgenbusch
Izvorni znanstveni članak


An Approach Based on Sum Product Networks for Code Smells Detection (str. 189-200)

Mostefai Abdelkader
Izvorni znanstveni članak


Comprehensive Modeling and Evaluation of Carrier Aggregation Effects on Network Performance Across Diverse Applications (str. 201-209)

Zuhor Maher Ismail, Saad Ahmed Ayoob
Izvorni znanstveni članak


Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network (str. 210-219)

Haneen Mohammed Hussein, Ali Qasim Hanoon, Afrah Thamer Abdullah
Izvorni znanstveni članak


Sparse-Recovery-Based Channel Estimation in Orthogonal Time-Frequency Space Modulation for High-Mobility Scenarios in 5G and Beyond (str. 220-228)

Sundaresan Sabapathy, Surendar Maruthu, Deepika Sasi
Izvorni znanstveni članak


Investigate the Use of Deep Learning in IoT Attack Detection (str. 229-239)

Mohamed Saddek Ghozlane, Adlen Kerboua, Smaine Mazouzi, Lakhdar Laimeche
Izvorni znanstveni članak


Participatory Design of Visual Analytics Tools for Different Target Groups (str. 240-249)

Milena Vuckovic, Dawid Wolosiuk, Johanna Schmidt
Izvorni znanstveni članak


Posjeta: 0 *

OSZAR »