Large Language Models (LLMs) have made significant advancements in Natural Language Processing (NLP) by excelling in various NLP tasks. This study specifically focuses on evaluating the performance of LLMs for Named E...
详细信息
A rapid technology change has significant opportunities for almost every industry, especially for healthcare. By using advanced network technologies and Internet of Medical Things (IoMT) devices, health professionals ...
详细信息
A Multiple moving object detection, tracking, and counting algorithm is mainly designed exclusively suitable for congested areas. The counting system can alleviate the betrayal performance in the crowded areas. Most o...
详细信息
This paper presents a cutting-edge data mining approach to investigate user trust in decentralized applications (dApps) on public blockchains. Our innovative data analysis methodology enables a comprehensive explorati...
详细信息
Charity giving is a fundamental aspect of society, but there are concerns about the accountability and transparency of the donation process. Blockchain technology has emerged as a potential solution, offering a secure...
详细信息
Morse code is one of the oldest communication techniques and used in telecommunication systems. Morse code can be transmitted as a visual signal by using reflections or with the help of flashlights, but it can also be...
详细信息
Decentralized exchanges (DEXs) have emerged as a promising solution to enhance trustlessness in blockchain ecosystems and mitigate security threats associated with centralized exchanges. While platforms like Uniswap o...
详细信息
A self-organizing, reconfigurable, and structure-less wireless network that provides intended communications without any radio infrastructure is called the mobile ad hoc network (MANETs). It is generally utilized in s...
详细信息
A self-organizing, reconfigurable, and structure-less wireless network that provides intended communications without any radio infrastructure is called the mobile ad hoc network (MANETs). It is generally utilized in special outside occasions, locations, military surgeries, and natural disasters. In MANET, providing security is the primary issue because of the adoption of network structures. Moreover, the modifications in dynamic topologies expose the strike selection, such as routing, eavesdropping, and alteration of several programs. If MANET has several privacy and security issues, then it may surpass the quality of services (QoS). Hence, the security in MANET is guaranteed by using intrusion tracking approaches. This intrusion tracking system regulates the MANET in recognizing some other violation weaknesses. High protections are provided by detecting intrusions from the entire network, which includes attacks that are beyond the network layer. The nodes are not merely altered by the power collapse in the system, but it is also capable of transferring the packets in the network, which depends on the total system life. An effective routing protocol is designed to select the optimal paths for enhancing navigation in MANETs. Moreover, the terms secure routing and energy efficiency are critical problems when changing the network topology and limiting resources with this kind of network. A hybridized optimization-aided routing strategy is offered in this research work to provide an energy-efficient routing protocol. At the initial stage, the experimentation is conducted based on the sensor nodes in MANET. Since the existing models are ineffective in achieving high energy efficiency, the new routing protocol is developed by proposing the hybrid optimization algorithm. Accordingly, the suggested work is regarded for optimizing the shortest path in the routing model by using the Hybrid Sailfish Optimizer and Whale Optimization Algorithm (HS-WOA). To validate the network e
Histopathological oral images are one of the popular methodologies to diagnose oral squamous cell carcinoma. computerized diagnostic systems need to be developed in order to process huge number of histopathological or...
详细信息
Blockchain was first only utilized to support cryptocurrencies, but as time passes, more and more industries are embracing this new technology. Several other crypto currencies started to emerge piecemeal from bitcoin....
详细信息
暂无评论