Maintaining the Maximal Independent Set (MIS) in dynamic graphs is crucial for applications like resource allocation, load balancing, and network optimization. Traditional approaches require complete re-computation, m...
详细信息
Pulses are one of the most important food crops in the world due to their higher protein content, approximately 21%-25%. Therefore, it is crucial to analyze the crop's quality and impurity levels. Stones, pebbles,...
详细信息
This research presents a novel method of automatic video summarising and note-generating using Natural Language Processing (NLP) and audio recognition techniques. The exponential rise in internet video footage has inc...
详细信息
This research provides a proposal to integrate blockchain technology with a web application to come up with a solution for the fund management issues that the temples face. The main purpose of the research is to solve...
详细信息
While machine learning (ML) models can be trained on large amounts of data, their applicability in critical domains such as cyber-attacks and clinical applications is still limited. Recent research suggests that ML mo...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
The lattice-based post-quantum cryptography scheme is widely regarded as one of the most secure solutions to address the emerging threats posed by advancements in quantum computing. Various groups have analyzed and st...
详细信息
This paper presents the outcomes of two key projects dedicated to the enhancement of modern transportation infrastructure and communication technology. The first project introduces a web-based application for toll tax...
详细信息
Sentiment analysis, a fundamental aspect of Natural Language Processing (NLP), involves the classification of emotions, opinions, and attitudes in text data. In the context of India, with its vast linguistic diversity...
详细信息
Cancer detection is critical for early diagnosis and treatment, and non-invasive imaging methods like microwave imaging have shown promise in this domain. This research presents a CNN-based machine learning model to i...
详细信息
暂无评论