-
41
DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET
Published 2019“…Safe routing is of great essence at the time of routing process to fit in shared trust/belief involving these nodes. …”
-
42
-
43
Phenotypes of high-risk drivers based upon driving risk preference
Published 2015“…The speeders/reckless drivers comprise a phenotype involving the most dangerous behavior and externalizing features, including competitiveness, impulsivity, reward driven decision-making, and weak inhibitory control.…”
-
44
Unlocking the potential of CO2 hydrogenation into valuable products using noble metal catalysts: A comprehensive review
Published 2023“…Furthermore, this review demonstrated the promising role of Au-based catalysts in improving the kinetics of the CO2 hydrogenation reaction with 80% methanol selectivity when nano-sized zinc oxide particles were involved. …”
Get full text
Get full text
Get full text
article -
45
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…In this paper, we propose two models for intrusion detection and classification scheme Trust-based Intrusion Detection and Classification System (TIDCS) and Trust-based Intrusion Detection and Classification System- Accelerated (TIDCS-A) for secure network. …”
-
46
Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks
Published 2022“…However, current blockchain-based supply-chain workflow(s) (BSW) are still susceptible to various cyber threats due to evolving business processes of different stakeholders involved in the process. …”
-
47
Toward automatic motivator selection for autism behavior intervention therapy
Published 2022“…To evaluate the motivator selection feature, we conduct a study involving a group of teachers and therapists and assess how the added feature aids the participants in their decision-making process of selecting a motivator. …”
Get full text
Get full text
-
48
Investigating the Effectiveness and Teachers’ Perceptions of Rigorous Curriculum Design for Project-Based Learning Implementation on Middle School Science Students’ Achievement and...
Published 2023“…They indicated how their involvement, understanding of the RCD-PBL, competencies, knowledge, and professional development were very important factors that influenced the curriculum design process and its successful implementation. …”
Get full text
-
49
An Integrated Building Information Model (iBIM) for Design of Reinforced Concrete Structures
Published 2018“…The architecture, Engineering and Construction (AEC) industry involve many disciplines during the life cycle of the building from its conception to its demolition. …”
Get full text
article -
50
Walnut shell based adsorbents: A review study on preparation, mechanism, and application
Published 2022“…Moreover, a detailed analysis of adsorption isotherms and kinetics involved in the adsorption process is also included. …”
-
51
3D Oleophilic Sorbent Films Based on Recycled Low-Density Polyethylene
Published 2023“…This study valorizes LDPE waste by transforming it into 3D oleophilic swellable thin films through a process involving dissolution, phase separation, and extraction. …”
-
52
Effect of nickle on cerium oxide support to develop cyclic catalytic methane decomposition followed by CO<sub>2</sub> gasification
Published 2024“…An innovative approach for catalyst regeneration involves utilizing CO<sub>2</sub> as a reactant to produce CO via the Reverse Boudouard Reaction, which serves as a valuable feedstock for various chemicals and fuels. …”
-
53
-
54
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…High resolution signal processing techniques involving higher-order statistics (HOS) and artificial neural networks (ANN) which re useful in ultrasonic nondestructive evaluation (NDE) of materials systems subject to additive white Gaussian noise (AWGN) and masking effects of measurement systems used and propagation paths, are investigated in this Thesis. …”
Get full text
masterThesis -
55
-
56
Using ID-Based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure
Published 2020“…But it incurs more computational delay as it involves intensive processes such as certificate management, revocation, and verification. …”
-
57
Amharic Speech Search Using Text Word Query Based on Automatic Sentence-like Segmentation
Published 2022“…A popular approach in developing systems for searching particular information in speech involves using an automatic speech recognition (ASR) module that generates the text version of the speech where the word or phrase is searched based on text query. …”
-
58
-
59
Investigation of Forming a Framework to shortlist contractors in the tendering phase
Published 2022“…This research has generated a base model that can be altered depending on the project requirements which can assist all parties involved within the tendering process to save time and money and improve the success rate of projects. …”
Get full text
-
60
Influence of Firm-Actor Integration on Value Co-creation within Base of Pyramid Market Ecosystems
Published 2023“…Academic and practitioner interest in the very low-income or Base of Pyramid (BOP) markets has been on the rise for the past two decades, resulting in considerable insights into the challenges and opportunities involved in introducing market-based solutions to alleviate poverty among the poorest of the poor in the world. …”
Get full text