The quick advancement in AI has led to the development of refined large language models (LLM). While LLM is a specific type of generative AI focused on generative text generative AI is a broader category encompassing ...
详细信息
Many leaf diseases that affect crop health cause severe mango farming concerns. This study employed deep learning techniques to analyze mango leaf disease categorization comprehensively. This study looks at the classi...
详细信息
In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these chal...
详细信息
Workflow scheduling plays a critical role in optimizing completion time and throughput in distributed cloud environments, leveraging the parallelism of heterogeneous computing resources. However, existing workflow sch...
详细信息
Delay Tolerant Networks (DTNs) are engineered to facilitate communication in environments where traditional networking methods struggle due to intermittent connectivity. Such scenarios include surveillance operations,...
详细信息
Delay Tolerant Networks (DTNs) are engineered to facilitate communication in environments where traditional networking methods struggle due to intermittent connectivity. Such scenarios include surveillance operations, wildlife tracking, and rugged terrains, where sustained connections are often unachievable. This paper delves into the limitations of conventional routing protocols in DTNs, which typically rely on end-to-end connectivity, and explores several established strategies, including spray and wait, First Contact, probabilistic routing protocol based on history of encounters and transitivity (PROPHET), probabilistic routing protocol based on history of encounters and transitivity version 2 (PROPHETV2), and epidemic routing. A primary challenge identified with the PROPHET protocol is its reliance on transitive increments, which can distort the delivery predictability (DP) vector. This distortion leads to the propagation of outdated or stale information throughout the network, resulting in suboptimal decisions for packet forwarding. To address this critical issue, we propose a modified version of the PROPHET routing protocol that enhances the representation of both direct and transitive links between nodes. Our approach emphasizes a more precise calculation of DP values, ensuring that the routing decisions are based on the most current and relevant information available. We conducted extensive simulations to evaluate the performance of our modified protocol against several benchmarks, including epidemic routing, First Contact, PROPHET, and PROPHETV2. The results demonstrate that our proposed model significantly improves both average hop count and packet delivery rates. Specifically, our modified protocol achieves the highest delivery ratio while maintaining the lowest average hop count among the evaluated models. These findings indicate that our approach not only enhances the efficiency of data transmission in DTNs but also optimizes resource utilization in cha
In recent years, IoT has transformed personal environments by integrating diverse smart devices. This paper presents an advanced IoT architecture that optimizes network infrastructure, focusing on the adoption of MQTT...
详细信息
This paper presents BC-SBOM, a novel blockchainbased system designed to enhance the management of Software Bills of Materials (SBOMs). By leveraging blockchain technology, BC-SBOM ensures secure storage and sharing of...
详细信息
ISBN:
(纸本)9791188428137
This paper presents BC-SBOM, a novel blockchainbased system designed to enhance the management of Software Bills of Materials (SBOMs). By leveraging blockchain technology, BC-SBOM ensures secure storage and sharing of SBOMs, while providing a comprehensive global view of dependencies among software components. The system also supports rapid propagation of alerts for newly discovered vulnerabilities, thereby increasing responsiveness to potential threats. Offering superior reliability, transparency, and availability compared to traditional SBOM tools, BC-SBOM aims to significantly improve the management of complex software systems and contribute to the advancement of software security practices. Copyright 2025 Global IT Research Institute (GIRI). All rights reserved.
This research aims to develop a CNN-based computational framework for diagnosing bone fractures from X-rays, improving osteoporosis knowledge. Current osteoporosis management focuses on elderly fracture prevention, bu...
详细信息
In this modern era, cloud computing is not enough to meet today’s intelligent society’s data processing needs, so edge computing has emerged. In contrast to computation in the cloud, it elaborates user proximity and...
详细信息
The paper presents a novel idea of proposing the application of Variational Autoencoders (VAEs) in crime detection for predicting face aging and deaging, which is one of the potential challenge of forensic science. VA...
详细信息
暂无评论