Quantum perturbation plays an important role in quantum movement. This paper proposes a three-stage perturbation (TSP) framework to enhance the performance of multi-scale quantum harmonic oscillator algorithm (MQHOA)....
详细信息
This paper shows system that uses the Internet of Things (IoT) to detect fire and motion detection system which is designed to work in real time and provide emergency alerts within the given region instantly. The syst...
详细信息
This research examines the secure and effective combination of information in Internet of Things (IoT) frameworks utilizing homomorphic encryption and machine learning strategies. The study proposes and assesses four ...
详细信息
This This project pioneers a real-time gesture recognition system for Arduino platforms using OpenCV and MediaPipe. Analyzing live video streams, the system interprets hand gestures to dynamically control LEDs and ser...
详细信息
The research on IoT-enhanced seaside monitoring for early flood warning systems using intelligent techniques has demonstrated promising results in enhancing coastal resilience against flooding events. The system exhib...
详细信息
Recognizing the emotional content of Natural Language sentences can improve the way humans communicate with a computer system by enabling them to recognize and imitate emotional expressions. In this paper, deep learni...
详细信息
As the display terminal of military electronic *** liquid crystal display is one of the most direct,main and important key equipment for military personnel to obtain information. In the face of the most complex and se...
详细信息
The advancement of automated number plate recognition (ANPR) systems has garnered noteworthy attention in recent times owing to their diverse applications across multiple domains, including traffic management, parking...
详细信息
Data security in conventional applications was only available at the application layer. Within the scope of the intended research, the safety of the merchandise is ensured. The deficiencies that are present in the sec...
详细信息
ISBN:
(纸本)9798350382723
Data security in conventional applications was only available at the application layer. Within the scope of the intended research, the safety of the merchandise is ensured. The deficiencies that are present in the security systems that are already in place have led to the realisation that a new security system is required. Considering that authentication is not present, the likelihood of decryption should be reduced. Establishing a decentralised security system is essential in order to protect against threats coming from a variety of digital networks. The new encryption standard is said to improve multilayer security, according to the claims. The material is split into two halves using this method, which also provides a reliable transmission mechanism. Because of the technology, hackers are unable to create vulnerabilities in the security system. There was a need for security in both the cloud and the edge environment in order to prevent intruders. Increasing the reliability and security of data transmission over a variety of networks was the motivation for the development of the two fish approach. Because of its security mechanism, it has been able to survive assaults from crackers and hackers. The paper that is being presented advises doing research on the safety of edge transmissions that are based on slicing. In order to prevent attackers from launching attacks from several networks, it is necessary to establish decentralised security. Layered security will help increase encryption standards, which is a significant benefit. Over the course of various investigations, computer security edge generators have been the focus of attention. Quite a few of them have already been extensively discussed. For the purpose of developing a reliable method of transmission, the proposed research splits the data into two parts, each of which is further encrypted at a different level. As a result of the development of multilayer encryption, the reliability and safety of data transm
In the world of wireless communication, the Medium Access Control (MAC) protocol sports a pivotal task in managing access to the shared communication medium. This project proposes a change to the existing ieee 802.11 ...
详细信息
暂无评论