Search

Your search keyword '"Izonin, Ivan"' showing total 449 results

Search Constraints

Start Over You searched for: Author "Izonin, Ivan" Remove constraint Author: "Izonin, Ivan"
449 results on '"Izonin, Ivan"'

Search Results

151. Additive Congruential Kupyna Koorde Cryptographic Hashfor Secured Data Storage in Cloud

152. Automated Activity Scheduling Using Heuristic Approach

153. Smart Vehicle Tracking in Harsh Condition

154. Performance Analysis of Various Machine Learning-Based Algorithms on Cybersecurity Approaches

155. Storage Automation Using the Interplanetary File System and RFID for Authentication

156. Loyalty Points Exchange System Using Blockchain

157. AMQP Protocol-Based Multilevel Security for M-commerce Transactions

158. Digital Twins—A Futuristic Trend in Data Science, Its Scope, Importance, and Applications

159. Decentralised Blockchain-Based Framework for Securing eVoting System

160. Storing and Accessing Medical Information Using Blockchain for Improved Security

161. Unique Web-Based Assessment with a Secure Environment

162. Pattern Recognition of Durian Foliar Diseases Using Fractal Dimension and Chaos Game

163. A Draft Architecture for the Development of a Blockchain-Based Survey System

164. An Intelligence Security Architecture for Mitigating DDOS Attack in CloudIoT Environment

165. Review of Model-Based Techniques in Augmented Reality Occlusion Handling

166. Segmentation and Area Calculation of Brain Tumor Images Using K-Means Clustering and Fuzzy C-Means Clustering

167. Recreation of a Sub-pod for a Killed Pod with Optimized Containers in Kubernetes

168. Smart Agricultural Field Monitoring System

169. Pressure Ulcer Detection and Prevention Using Neural Networks

170. Literature Survey on Empirical Analysis on Efficient Secured Data Communication in Cloudcomputing Environment

171. Intelligent Fault Diagnosis in PV System—A Machine Learning Approach

172. Multi-scale Avatars in a Shared Extended Reality Between AR and VR Users

173. Image Processing-Based Presentation Control System Using Binary Logic Technique

174. Evaluation of Bone Age by Deep Learning Based on Hand X-Rays

175. An Alternative Approach to Smart Air Conditioner with Multiple Power Sources

176. Electronic Health Records Rundown: A Novel Survey

177. ENT Pattern Recognition Using Augmented Bounding Boxes

178. Deep Learning-Based Facial Emotion Analysis

179. An Efficient Secure Cloud Image Deduplication with Weighted Min-Hash Algorithm

180. Adoption of Network Function Virtualization Technology in Education

181. Bayesian Algorithm for Labourer Job Performance at Home in the COVID-19 Pandemic

182. Appointment Scheduler for VIP Using Python and Twilio

183. Automated ADR Analysis from Twitter Data Using N-Gram-Based Feature Extraction Methods and Supervised Learning Classification

184. Compression in Dynamic Scene Tracking and Moving Human Detection for Life-Size Telepresence

185. Artificial Intelligence Application for Healthcare Industry: Cases of Developed and Emerging Markets

186. Analysis of the Results of Evaluation in Higher Technological Institutes of Ecuador, Using Data Mining Techniques

187. Comparative Analysis of Human Hand Gesture Recognition in Real-Time Healthcare Applications

188. IOT-Based Whip-Smart Trash Bin Using LoRa WAN

189. A Brief Survey on Enhanced Quality of Service Mechanisms in Wireless Sensor Network for Secure Data Transmission

190. A Mobile Application Model for Differently Abled Using CNN, RNN and NLP

191. An Analysis on Daily and Sports Activities’ Recognition Using Data Analytics and Artificial Intelligence Model

192. Monitoring of Wireless Network System-Based Autonomous Farming Using IoT Protocols

193. Actual Problems and Analysis of Anti-avoidance Tax Measures in the EAEU and EU Countries in the Context of Digitalization of the Economy

194. A Detailed Survey on Network Intrusion Detection in Cloud Using Different Techniques

195. A Survey Paper: On Path Planning Strategies Based on Classical and Heuristic Methods

196. Trust Model for Cloud Using Weighted KNN Classification for Better User Access Control

197. Blockchain Security Through SHA-512 Algorithm Implementation Using Python with NB-IoT Deployment in Food Supply Chain

198. A Case Study of IoT-Based Biometric Cyber Security Systems Focused on the Banking Sector

199. Task Scheduling in Fog Assisted Cloud Environment Using Hybrid Metaheuristic Algorithm

200. Resource Allocation Using MISO-NOMA Scheme with Clustering Technique

Catalog

Books, media, physical & digital resources