Cloud Computing (CC) enables organizations and individuals to alter and revolutionize the procedure by which people obtain and utilize resources. Due to the growth of the CC, the complexity increases and the cloud sys...
详细信息
Chronic kidney disease (CKD), due to rising patients, the high probability of deterioration towards end-stage renal disease and inaccurate estimates of morbidity and mortality, constitutes a heavy burden on the sanita...
详细信息
Artificial intelligence traffic controllers are being designed with the primary goal of enabling them to adapt to the most recent sensor data in order to perform ongoing optimizations on the signal timing plan for int...
详细信息
With integration of IoT technologies, the power grid is getting more connected with external networks. This exposes its supervisory control and data acquisition (SCADA) system, the enabler component of smart grids, to...
详细信息
In current scenario, children are addicted towards mobile communication devices such as mobile phone, tablet and various wireless devices. Exploring more radio frequencies with these devices causes brain damage in chi...
详细信息
The widespread presence of a wide variety of diseases during paddy farming is one of the most significant elements that annually contributes to enormous economic losses. These losses occur as a direct result of the wi...
详细信息
作者:
Awasthi, NaimishaGautam, Prateek RajSharma, Anuj KumarAktu
Centre for Advanced Studies Department of Computer Science and Engineering Lucknow India Upes
School of Computer Science Dehradun India Aktu
Centre For Advanced Studies Department of Mechatronics Lucknow India
The internet is extremely valuable, but it is also vulnerable to assault. Malware is a persistent and dynamic danger. Malware assaults entail introducing malicious code into software. The task was handled using a vari...
详细信息
The increasing complexity and adversity of cyber-attacks have prompted discussions in the cyber scenario for a prognosticate approach, rather than a reactionary one. In this paper, a signature-based intrusion detectio...
详细信息
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bi...
详细信息
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bitcoin,Ethereum,Filecoin,Hyperledger Fabric,BCOS,and BCS,current blockchain applications are still quite *** struggles with scenarios requiring high-speed transactions(e.g.,online markets)or large data storage(e.g.,video services)due to consensus efficiency *** restrictions pose risks to investors in blockchain-based economic systems(e.g.,DeFi),deterring current and potential *** protection challenges make it difficult to involve sensitive data in blockchain applications.
Accurate and timely classification of fresh and decaying fruits is crucial for upholding quality standards in the food industry. This study introduces a deep learning approach that utilizes images to distinguish betwe...
详细信息
暂无评论