Zobrazeno 1 - 10
of 43
pro vyhledávání: '"Aravind Ashok"'
Publikováno v:
Wang, Z, Almeida Jr, J H S, Ashok, A, Wang, Z & G. P. Castro, S 2022, ' Lightweight design of variable-angle filament-wound cylinders combining Kriging-based metamodels with particle swarm optimization ', Structural and Multidisciplinary Optimization, vol. 65, no. 5, 140 . https://doi.org/10.1007/s00158-022-03227-8
Structural and Multidisciplinary Optimization, 65(5)
Structural and Multidisciplinary Optimization, 65(5)
Variable-angle filament-wound (VAFW) cylinders are herein optimized for minimum mass under manufacturing constraints, and for various design loads. A design parameterization based on a second-order polynomial variation of the tow winding angle along
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8eabce549e78a0803560383fbfde3023
https://aaltodoc.aalto.fi/handle/123456789/114106
https://aaltodoc.aalto.fi/handle/123456789/114106
Autor:
Prabaharan Poornachandran, Balagopal, N., Soumajit Pal, Aravind Ashok, Prem Sankar, Krishnan, Manu R.
Publikováno v:
Proceedings of the First International Conference on Intelligent Computing & Communication; 2017, p215-224, 10p
Publikováno v:
Journal of Intelligent & Fuzzy Systems. 32:2901-2907
Publikováno v:
International Journal of Oral Care & Research. 5:294-297
Publikováno v:
Proceedings of the First Workshop on Radical and Experiential Security.
Email services have to put through a lot of effort in fighting spam emails. Most of the efforts go in for detecting and filtering spam emails from benign emails. On the other front, people are educated by banks and other organizations on the awarenes
Autor:
Shivsubramani Krishnamoorthy, Aravind Ashok, P. Prabaharan, V. G. Sujadevi, Mani Bharataraju, D. Khyati, Sai Keerti, Prem Shankar
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319734224
Significant increase of crimes against women in recent years and the advent of smart phone and wearable technologies have accelerated the need for personal safety devices and applications. These systems can be used to summon for help during the emerg
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6c3d3f6d134e67ead28d5aa8a38c9c63
https://doi.org/10.1007/978-3-319-73423-1_1
https://doi.org/10.1007/978-3-319-73423-1_1
Autor:
Sumith Maniath, A. U. Prem Sankar, Srinath Jan, V G Sujadevi, Prabaharan Poornachandran, Aravind Ashok
Publikováno v:
2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE).
There is a growing interest in academia and industry to employ dynamic analysis for automating malwares analysis. In dynamic analysis, Application Programming Interface (API) calls made by the executable is a promising source to identify the behavior
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811031526
FICTA (1)
FICTA (1)
BGP (Border Gateway Protocol) is one of the core internet backbone protocols, which were designed to address the large-scale routing among the ASes (Autonomous System) in order to ensure the reachability among them. However, an attacker can inject up
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::52deb1bbc381ccb6bdd25a7e89793534
https://doi.org/10.1007/978-981-10-3153-3_76
https://doi.org/10.1007/978-981-10-3153-3_76
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811031557
FICTA (2)
FICTA (2)
Drive-by-Download is an unintentional download of a malware on to a user system. Detection of drive-by-download based malware infection in a host is a challenging task, due to the stealthy nature of this attack. The user of the system is not aware of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b8481ac005d926586f2609f77e22d79
https://doi.org/10.1007/978-981-10-3156-4_13
https://doi.org/10.1007/978-981-10-3156-4_13
Autor:
Prem Sankar, N. Balagopal, Soumajit Pal, Aravind Ashok, Manu R. Krishnan, Prabaharan Poornachandran
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811020346
From search engines to e-commerce websites and online video channels to smartphone applications, most of the internet applications use advertising as one of their primary source of revenue generation. Malvertising is the act of distributing malicious
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3538469e851a725095fdb72f3e8759ad
https://doi.org/10.1007/978-981-10-2035-3_23
https://doi.org/10.1007/978-981-10-2035-3_23