UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 203
1.
  • Activity Recognition in Res... Activity Recognition in Residential Spaces with Internet of Things Devices and Thermal Imaging
    Naik, Kshirasagar; Pandit, Tejas; Naik, Nitin ... Sensors, 02/2021, Letnik: 21, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we design algorithms for indoor activity recognition and 3D thermal model generation using thermal images, RGB images, captured from external sensors, and the internet of things setup. ...
Celotno besedilo

PDF
2.
  • An accurate computational m... An accurate computational model for thermal analysis of laminated composite and sandwich plates
    Naik, Nitin S.; Sayyad, Atteshamuddin S. Journal of thermal stresses, 05/2019, Letnik: 42, Številka: 5
    Journal Article
    Recenzirano

    In the present study, a new computational model which incorporates the effect of transverse shear and normal deformation is presented for the thermal analysis of laminated composite and sandwich ...
Celotno besedilo
3.
  • Apigenin and its combinatio... Apigenin and its combination with Vorinostat induces apoptotic-mediated cell death in TNBC by modulating the epigenetic and apoptotic regulators and related miRNAs
    Nimal, Snehal; Kumbhar, Navanath; Saruchi ... Scientific reports, 04/2024, Letnik: 14, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Triple-negative breast cancer (TNBC) is a metastatic disease and a formidable treatment challenge as it does not respond to existing therapies. Epigenetic regulators play a crucial role in the ...
Celotno besedilo
4.
  • Structural insights into th... Structural insights into the potential binding sites of Cathepsin D using molecular modelling techniques
    Kamble, Subodh A.; Barale, Sagar S.; Mohammed, Ali Abdulmawjood ... Amino acids, 04/2024, Letnik: 56, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Alzheimer’s disease (AD) is the most prevalent type of dementia caused by the accumulation of amyloid beta (Aβ) peptides. The extracellular deposition of Aβ peptides in human AD brain causes neuronal ...
Celotno besedilo
5.
  • Effect of Thickness Stretch... Effect of Thickness Stretching on the Natural Frequencies of Layered Composite Beams
    Naik, Nitin S.; Sayyad, Atteshamuddin S. IOP conference series. Materials Science and Engineering, 04/2022, Letnik: 1236, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract In this study, a new fifth order shear deformation theory is developed considering the effect of thickness stretching for the free vibration analysis of laminated composite beam. To account ...
Celotno besedilo
6.
  • A computational intelligenc... A computational intelligence enabled honeypot for chasing ghosts in the wires
    Naik, Nitin; Jenkins, Paul; Savage, Nick ... Complex & intelligent systems, 02/2021, Letnik: 7, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    A honeypot is a concealed security system that functions as a decoy to entice cyberattackers to reveal their information. Therefore, it is essential to disguise its identity to ensure its successful ...
Celotno besedilo

PDF
7.
  • A Secure and Privacy-Preser... A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity
    Elisa, Noe; Yang, Longzhi; Chao, Fei ... IEEE access, 2023, Letnik: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Electronic Government (e-Government) systems constantly provide greater services to people, businesses, organisations, and societies by offering more information, opportunities, and platforms with ...
Celotno besedilo
8.
  • Embedded YARA rules: streng... Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis
    Naik, Nitin; Jenkins, Paul; Savage, Nick ... Complex & intelligent systems, 04/2021, Letnik: 7, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    The YARA rules technique is used in cybersecurity to scan for malware, often in its default form, where rules are created either manually or automatically. Creating YARA rules that enable analysts to ...
Celotno besedilo

PDF
9.
  • Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP
    Naik, Nitin 2017 IEEE International Systems Engineering Symposium (ISSE), 2017-Oct.
    Conference Proceeding

    The standard and real-time communication technology is an unalloyed inevitability for the development of Internet of Things (IoT) applications. However, the selection of a standard and effective ...
Celotno besedilo

PDF
10.
  • The use of GBL to teach mat... The use of GBL to teach mathematics in higher education
    Naik, Nitin Innovations in education and teaching international, 05/2017, Letnik: 54, Številka: 3
    Journal Article
    Recenzirano

    Innovation in learning and teaching is an everyday requirement in contemporary higher education (HE), especially in challenging subjects such as mathematics. Teaching mathematics to students with ...
Celotno besedilo
1 2 3 4 5
zadetkov: 203

Nalaganje filtrov