The paper uses the SOAR analysis paradigm to investigate the impact of Large Language Models (LLMs) such as ChatGPT on crucial healthcare industry stakeholders. The background of the study highlights the growing appli...
详细信息
The use of blockchain technologies and Smart contracts to improve the quality of Microgrid network management is considered. The necessity of using a special mathematical apparatus for system analysis is noted, taking...
详细信息
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced env...
详细信息
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced environment of manufacturing of networks and other products which used different networks,no dependable assessment has been embraced to choose,how much these invariants are connected with a network graph or molecular *** this paper,it will talk about three distinct variations of bridge networks with great capability of expectation in the field of computer science,chemistry,physics,drug industry,informatics,and mathematics in setting with physical and synthetic constructions and networks,since K-Banhatti invariants are newly introduced and have various forecast characteristics for various variations of bridge graphs or *** review settled the topology of bridge graph/networks of three unique sorts with three types of K-Banhatti *** concluded outcomes can be utilized for the modeling of interconnection networks of Personal computers(PC),networks like Local area network(LAN),Metropolitan area network(MAN)and Wide area network(WAN),the spine of internet and different networks/designs of PCs,power generation interconnection,bio-informatics and chemical structures.
This research implements an Intelligent Information System for Text Recognition on Indonesian Identity Cards (eKTP) based on Deep Learning architecture. The aim of this research is to develop a system capable of accur...
详细信息
In the field of tissue engineering and regenerative medicine, understanding the intricate properties and behaviors of cells and tissues within their natural environment is fundamental for translating theory into pract...
详细信息
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enabl...
详细信息
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enable faster response time for latency-sensitive *** fundamental problem is where and how to offload and schedule multi-dependent tasks so as to minimize their collective execution time and to achieve high resource *** approaches randomly dispatch tasks naively to available edge nodes without considering the resource demands of tasks,inter-dependencies of tasks and edge resource *** approaches can result in the longer waiting time for tasks due to insufficient resource availability or dependency support,as well as provider ***,we present Edge Colla,which is based on the integration of edge resources running across multi-edge *** Colla leverages learning techniques to intelligently dispatch multidependent tasks,and a variant bin-packing optimization method to co-locate these tasks firmly on available nodes to optimally utilize *** experiments on real-world datasets from Alibaba on task dependencies show that our approach can achieve optimal performance than the baseline schemes.
Information and communication technologies are spreading rapidly due to their fast proliferation in many *** number of Internet users has led to a spike in cyber-attack incidents.E-commerce applications,such as online...
详细信息
Information and communication technologies are spreading rapidly due to their fast proliferation in many *** number of Internet users has led to a spike in cyber-attack incidents.E-commerce applications,such as online banking,marketing,trading,and other online businesses,play an integral role in our *** Intrusion Detection System(NIDS)is essential to protect the network from unauthorized access and against other *** existing NIDS systems are based on the Backward Oracle Matching(BOM)algorithm,which minimizes the false alarm rate and causes of high packet drop *** paper discussed the existing NIDS systems and different used pattern-matching techniques regarding their weaknesses and *** address the existing system issues,this paper proposes an enhanced version of the BOM algorithm by using multiple pattern-matching methods for the NIDS system to improve the network *** proposed solution is tested in simulation with existing solutions using the Snort and NSL-KDD *** experimental results indicated that the proposed solution performed better than the existing solutions and achieved a 5.17%detection rate and a 0.22%lower false alarm rate than the existing solution.
The research focuses on the process of creating a data warehouse to meet the decision-making needs of a Greek beverage company. The data cover the period from 2018 to 2022. The developed data warehouse schema follows ...
详细信息
ISBN:
(数字)9798350363807
ISBN:
(纸本)9798350363814
The research focuses on the process of creating a data warehouse to meet the decision-making needs of a Greek beverage company. The data cover the period from 2018 to 2022. The developed data warehouse schema follows the star schema, with one fact table and five-dimension tables. Based on this structure, a web application was developed in PHP, which displays reports, charts, and analyses on the company's performance through interactive queries. Additionally, prediction functions tailored to the company's data were developed in Python. The process followed, the queries for creating the data warehouse, as well as the commands for creating analyses and predictions, serve as a useful guide for other companies that wish to upgrade the capabilities of their ERP systems.
This work aims to create a deep learning model utilizing Long Short-Term Memory (LSTM) as a classification model to detect and diagnose potential problems in diesel engines. The default dataset comprises 3,500 data en...
详细信息
Purpose: The development of an automated premature ventricular contraction (PVC) detection system has significant implications for early intervention and treatment decisions. This study aims to develop a novel approac...
详细信息
暂无评论