In recent years, traditional hospital facilities are adopting new technologies that provide novel services. Nevertheless, these services may be performed by third parties, that pose a threat to data privacy. As health...
详细信息
Modeling and replicating the channel effects between a transmitter and receiver, is crucial in any telecommunication system, in order to evaluate the impact on the transmitted data. Therefore the necessity of having a...
详细信息
Stress is a problem with various adverse effects, such as mental disorders and suicide. With these problems arising, a stress detection system is needed as an initial examination of the level of stress experienced. Ge...
详细信息
Fulfilling increasing performance demands of space and automotive applications can be problematic as high dependability is required. Memory is one of the most radiationsensitive parts, so it is often protected with in...
详细信息
In today's digital era, the internet is an indispensable platform for self-expression, facilitating communication, idea sharing, and community formation. Language, a pivotal tool in these online interactive spaces...
详细信息
Intelligent agents (IAs) are highly autonomous software applications designed for performing tasks in a broad spectrum of virtual environments by circulating freely around them, possibly in numerous copies, and taking...
详细信息
In this paper, we propose two self-adaptive extragradient-like algorithms for solving pseudomonotone variational inequalities. We consider two cases: the mapping is Lipschitz continuous (with unknown modulus) and is n...
详细信息
Exploring the potential of technology in addressing Sustainable Development Goals (SDGs) within intricate rural contexts holds paramount significance. Sustainable rural development holds profound significance for both...
详细信息
The banking sector is widely acknowledged for its intrinsic unpredictability and susceptibility to risk. Bank loans have emerged as one of the most recent services offered over the past several decades. Banks typicall...
详细信息
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and gen...
详细信息
暂无评论