Like spoken languages, different countries use different sign languages which include a variety of gestures and movements. This demands the need for a system that can translate one sign language to another. Thus, a co...
详细信息
Time series forecasting is an important field of research, especially when the series is completely random, known as a strictly non-stationary time series (NS-TS). To handle the randomness efficiently, the paper prese...
详细信息
In emergencies, Twitter has become an essential way for people to communicate. Since many people use smartphones, they can easily report events they see. Because of this, more organizations are using Twitter to monito...
详细信息
In a routine walk home from work, the urgency of personal safety was highlighted by a sudden confrontation and theft. This incident sparked the motivation for this research, with an emphasis on the imperative need for...
详细信息
The healthcare industry has benefited greatly from cloud computing (CC), but its expansion is being impeded by privacy and security concerns. In order to realize its full scope and effective utilization, such concerns...
详细信息
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th...
详细信息
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate *** most applications,a frame-work must ensure that the retrieved data reflects the transmitted *** driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be *** link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it *** other words,because of asset information must be secured from threats,information is a valu-able *** MANETs,some applications necessitate the use of a network method for detecting and blocking these *** a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in *** on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention *** bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be *** Secure Energy Routing(SER)protocol for MANETs is introduced in this *** protocol addresses the issue of network security by detecting and preventing attacks in the *** data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of *** Simulator–2 is used to simulate the network and experiments are compared with existing methods.
In 21st century, AI-based intelligent recommendation system uses rating predictions, which are frequently utilized and helps users swiftly filter down their options and make informed judgements from an abundance of ma...
详细信息
In-depth research on improving educational comprehension with the use of summarization, translation, and transcription technology is presented in this work. With an emphasis on accuracy and efficiency, a comparative a...
详细信息
Payment Channel Networks(PCNs)are a promising alternative to improve the scalability of a blockchain network.A PCN employs off-chain micropayment channels that do not need a global block confirmation procedure,thereby...
详细信息
Payment Channel Networks(PCNs)are a promising alternative to improve the scalability of a blockchain network.A PCN employs off-chain micropayment channels that do not need a global block confirmation procedure,thereby sacrificing the ability to confirm transactions *** uses a routing algorithm to identify a path between two users who do not have a direct channel between them to settle a *** performance of most of the existing centralized path-finding algorithms does not scale with network *** rapid growth of Bitcoin PCN necessitates considering distributed ***,the existing decentralized algorithms suffer from resource *** present a decentralized routing algorithm,Swift,focusing on fee *** concept of a secret path is used to reduce the path length between a sender and a receiver to optimize the ***,we reduce a network structure into combinations of cycles to theoretically study fee optimization with changes in cloud *** secret path also helps in edge load sharing,which results in an improvement of *** routing achieves up to 21%and 63%in fee and throughput optimization,*** results from the simulations follow the trends identified in the theoretical analysis.
This research investigates the use of artificial intelligence for the creation of multimedia content from textual sources, such as press articles, stories, and scripts. The system utilizes Natural Language Processing ...
详细信息
暂无评论