206 results on '"Izonin, Ivan"'
Search Results
2. I-PNN: An Improved Probabilistic Neural Network for Binary Classification of Imbalanced Medical Data
3. Modification of the LSB Implementation Method of Digital Watermarks
4. Prediction of Magnetic Remanence of Sm-Co Magnets Using Machine Learning Algorithms
5. An Approach Towards Vacuum Forming Process Using PostScript for Making Braille
6. Investigation of Anomalous Situations in the Machine-Building Industry Using Phase Trajectories Method
7. An Approach Toward Numerical Data Augmentation and Regression Modeling Using Polynomial-Kernel-Based SVR
8. Neuro-Fuzzy Diagnostics Systems Based on SGTM Neural-Like Structure and T-Controller
9. RBF-Based Input Doubling Method for Small Medical Data Processing
10. GRNN Approach Towards Missing Data Recovery Between IoT Systems
11. Missing Data Imputation Through SGTM Neural-Like Structure for Environmental Monitoring Tasks
12. Committee of the SGTM Neural-Like Structures with Extended Inputs for Predictive Analytics in Insurance
13. Model and Principles for the Implementation of Neural-Like Structures Based on Geometric Data Transformations
14. Imbalance Data Classification via Neural-Like Structures of Geometric Transformations Model: Local and Global Approaches
15. Committee of the Combined RBF-SGTM Neural-Like Structures for Prediction Tasks
16. Multiple Linear Regression Based on Coefficients Identification Using Non-iterative SGTM Neural-like Structure
17. SGD-Based Wiener Polynomial Approximation for Missing Data Recovery in Air Pollution Monitoring Dataset
18. Learning-Based Image Scaling Using Neural-Like Structure of Geometric Transformation Paradigm
19. Decentralized Expert System for Donation Tracking and Transparency
20. Big Data Security: Attack’s Detection Methods Using Digital Forensics
21. Design of Wireless Cloud-Based Transmission Intelligent Robot for Industrial Pipeline Inspection and Maintenance
22. Verify De-Duplication Using Blockchain on Data with Smart Contract Techniques for Detecting Errors on Cloud
23. Automated Helpline Service Using a Two-Tier Ensemble Framework
24. Privacy-Preserving Data Publishing Models, Challenges, Applications, and Issues
25. Recent Web Application Attacks’ Impacts, and Detection Techniques–A Detailed Survey
26. Systematic Literature Review on Object Detection Methods at Construction Sites
27. Security Concerns in Intelligent Transport Systems
28. Additive Congruential Kupyna Koorde Cryptographic Hashfor Secured Data Storage in Cloud
29. Automated Activity Scheduling Using Heuristic Approach
30. Smart Vehicle Tracking in Harsh Condition
31. Performance Analysis of Various Machine Learning-Based Algorithms on Cybersecurity Approaches
32. Storage Automation Using the Interplanetary File System and RFID for Authentication
33. Loyalty Points Exchange System Using Blockchain
34. AMQP Protocol-Based Multilevel Security for M-commerce Transactions
35. Digital Twins—A Futuristic Trend in Data Science, Its Scope, Importance, and Applications
36. Decentralised Blockchain-Based Framework for Securing eVoting System
37. Storing and Accessing Medical Information Using Blockchain for Improved Security
38. Unique Web-Based Assessment with a Secure Environment
39. Pattern Recognition of Durian Foliar Diseases Using Fractal Dimension and Chaos Game
40. A Draft Architecture for the Development of a Blockchain-Based Survey System
41. An Intelligence Security Architecture for Mitigating DDOS Attack in CloudIoT Environment
42. Review of Model-Based Techniques in Augmented Reality Occlusion Handling
43. Segmentation and Area Calculation of Brain Tumor Images Using K-Means Clustering and Fuzzy C-Means Clustering
44. Recreation of a Sub-pod for a Killed Pod with Optimized Containers in Kubernetes
45. Smart Agricultural Field Monitoring System
46. Pressure Ulcer Detection and Prevention Using Neural Networks
47. Literature Survey on Empirical Analysis on Efficient Secured Data Communication in Cloudcomputing Environment
48. Intelligent Fault Diagnosis in PV System—A Machine Learning Approach
49. Multi-scale Avatars in a Shared Extended Reality Between AR and VR Users
50. Image Processing-Based Presentation Control System Using Binary Logic Technique
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.