-
281
-
282
-
283
Magnetic-responsive triple shape memory polymer from bio-based benzoxazine/urethane polymer alloys with iron oxide nanoparticles
Published 2025-01-01“…Moreover, the performance of the SMPs based on V-fa/PU polymer nanocomposites filled with Fe3O4 NPs showed high shape fixity of up to 98%, a shape recovery of 98%, and a recovering time of 8 s. …”
Get full text
Article -
284
Quad-Band 3D Rectenna Array for Ambient RF Energy Harvesting
Published 2020-01-01“…The RF to DC conversion efficiency is 70.28%, 41.7%, 33.37%, and 27.69% at 98 MHz, 0.9 GHz, 1.8 GHz, and 2.4 GHz, respectively, at −6 dBm. …”
Get full text
Article -
285
PoWBWM: Proof of work consensus cryptographic blockchain-based adaptive watermarking system for tamper detection applications
Published 2025-01-01“…The experimental results for CASIA images achieved the highest PSNR value of 63.84 dB, and the SSIM value of 1.000, whereas the maximum VDP value obtained for HDR images is 98.02. In comparison with the existing system, the experimental findings of the suggested model show an effective tamper detection watermarking system as well as a robust against both intentional and unintentional attacks with an average NCC value of 0.98.…”
Get full text
Article -
286
Comparative analysis of deep learning models for crack detection in buildings
Published 2025-01-01“…With the analysis of all these models, the Inception V3 provides the best of all with the accuracy value of 99.98%. The InceptionV3 tops the Precision value of 99.99% and RESNET-50 tops the Recall value of 99.98%. …”
Get full text
Article -
287
An Iteration-Time Combination Method to Reduce the Dynamic Degradation of Digital Chaotic Maps
Published 2020-01-01Get full text
Article -
288
A Variable Precision Covering-Based Rough Set Model Based on Functions
Published 2014-01-01Get full text
Article -
289
Florida Consumer Preferences for Indoor Foliage Plant Attributes
Published 2016-09-01Get full text
Article -
290
CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks
Published 2014-01-01Get full text
Article -
291
Axially Symmetric Null Dust Space-Time, Naked Singularity, and Cosmic Time Machine
Published 2017-01-01Get full text
Article -
292
Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB
Published 2024-12-01“…Setelah enkripsi, ciphertext disembunyikan dalam citra sampul menggunakan teknik steganografi Modified Least Significant Bit (MLSB), yang mengoptimalkan penyisipan bit di saluran RGB dengan pemilihan piksel acak menggunakan generator modulo. Hasil pengujian menunjukkan kualitas enkripsi yang sangat baik, dengan nilai NPCR ≥ 98%, UACI ≥ 30%, koefisien korelasi ≃ 0, entropi ≃ 8, dan histogram yang datar (flat). …”
Get full text
Article -
293
Optimalisasi Proses Klasifikasi Dengan Menambahkan Semantik Pada Kebutuhan Non-Fungsional Berbasis ISO/IEC 25010
Published 2023-10-01“…First, the system will generate training data automatically without semantic measurements. …”
Get full text
Article -
294
Numerical Analysis on Chaotic Vibration of Drive System for a Movable Tooth Piezoelectric Motor
Published 2017-01-01Get full text
Article -
295
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
Published 2019-01-01Get full text
Article -
296
Microseismic Signal Classification Based on Artificial Neural Networks
Published 2021-01-01“…Operated with two hidden layers and the Logistic activation function, the multiclass area under the receiver operating characteristic curve (AUC) reached 98.6%.…”
Get full text
Article -
297
Convergence of Some Iterative Algorithms for System of Generalized Set-Valued Variational Inequalities
Published 2021-01-01Get full text
Article -
298
-
299
A left-right mirror symmetric model: common origin of neutrino mass, baryon asymmetry and dark matter
Published 2020-01-01Get full text
Article -
300
Model of presentation of the information system curricula, using XML
Published 2002-12-01Get full text
Article