In or daily lives, maintaining the security of sensitive information has proven to be very difficult. communications sent frequently through a communication channel like the Internet may catch the attention of cracker...
详细信息
In this paper, we analyze the current state of targeted advertising on various social media platforms using algorithmic analysis and implementing strategies. Social media plays an increasingly important role in modern...
详细信息
Classification models can be learned from complicated multivariate temporal data and this is a topic we investigate in electronic health record systems. The difficulty is to come up with a collection of attributes tha...
详细信息
Near-Field communication (NFC) payment solutions are contactless payment solutions which harness the short-range communication capabilities and existing RFID infrastructure. The increasing availability of NFC enabled ...
详细信息
In this study, we look at the present and future of embedded systems as well as VLSI (Very Large Scale Integration) technology to see how the two work together. In particular, very large scale integration (VLSI) techn...
详细信息
Software delivery is always challenging without any issues. During this process of software delivery, release management team plays a significant role in planning, communication, coordination, and implementation. This...
详细信息
The threat of credit card fraud is high and so there should be efficient ways to combat it. The research is being employed to focus on how to enhance credit card fraud detection, machine learning methodologies can be ...
详细信息
In modern world of technology, Security of data and crime-free environment improves the quality of life. The crime records stored in the database can be hacked or breached so an effective solution should be adapted th...
详细信息
The classification of rice grains is a crucial aspect of the agricultural sector, particularly in light of challenges such as grain variability, limited computing resources, and the need for real-time processing. Main...
详细信息
Protect data in transit with a proxy-based re-encryption solution designed specifically for the Internet of Things ecosystem's needs. Because of identity-based encryption and proxy re-encryption can safely outsour...
详细信息
暂无评论