Reviews and ratings significantly impact businesses, either boosting their reputation or harming competitors. To manipulate these outcomes, some businesses falsify product reviews. This paper introduces a transformer-...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs ...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs is to extendflexibility into the self-directed,mobile,and wireless domain,in which a cluster of autonomous nodes forms a MANET routing *** Intrusion Detection System(IDS)is a tool that examines a network for mal-icious behavior/policy violations.A network monitoring system is often used to report/gather any suspicious attacks/*** IDS is a software program or hardware system that monitors network/security traffic for malicious attacks,sending out alerts whenever it detects malicious *** impact of Dynamic Source Routing(DSR)in MANETs challenging blackhole attack is investigated in this research *** Cluster Trust Adaptive Acknowledgement(CTAA)method is used to identify unauthorised and malfunctioning nodes in a MANET *** system is active and provides successful delivery of a data packet,which implements Kalman Filters(KF)to anticipate node ***,KF is used to eliminate synchronisation errors that arise during the sending and receiving *** order to provide an energy-efficient solution and to minimize network traffic,route optimization in MANET by using Multi-Objective Particle Swarm Optimization(MOPSO)technique to determine the optimal num-ber of clustered MANET along with energy dissipation in *** to the researchfindings,the proposed CTAA-MPSO achieves a Packet Delivery Ratio(PDR)of 3.3%.In MANET,the PDR of CTAA-MPSO improves CTAA-PSO by 3.5%at 30%malware.
Iris recognition is one of the most widely used human authentication mechanism that has gained huge popularity due to its security and efficiency. However, recently attackers have breached the security of these system...
详细信息
Elephant emotion detection has marked a crucial component owing to the increased casualties due to human-elephant conflicts. The difficulty has increased due to the lack of algorithms that quickly identify emotions wi...
详细信息
Fruits and vegetables contain rich nutrients and vitamins. So that they are part of our daily diet. For proper cell growth and health, we need these nutrients. Today in most crops during their growth and post-harvesti...
详细信息
Leukemia, a malignant disease characterized by the rapid proliferation of specific types of white blood cells (WBC), has prompted increased interest in leveraging automatic WBC classification system. This study presen...
详细信息
The growth of crime in society produces insecurity among people and severely impacts the country’s economic development. Understanding crime patterns is necessary to provide a proactive response to curb criminal acti...
详细信息
Lung cancer, causing a significant number of fatalities annually, is a prominent contributor to global mortality rates among individuals of both genders, with an estimated five million cases resulting in death each ye...
详细信息
Digital commerce is the process of exchanging money or assets using electronic or digital channels such as the internet or mobile devices. Instead of physical cash or checks, individuals or businesses can use digital ...
详细信息
Sleep quality prediction in Internet of Things (IoT) involves leveraging a system of interrelated devices to gather as well as analyse related data. Smart devices like wearable devices or smart mattresses endlessly mo...
详细信息
暂无评论