Cloud computing (CC) is a massive breakthrough in Information Technology (IT) that provides end users to access flexible andvirtualizedsources at affordable infrastructure cost and management. One of the most signific...
详细信息
The Internet of Things (IoT) is a contemporary technology that enhances user experience and adds intelligence to objects. Numerous applications have already embraced the Internet of Things. The Internet of Things (IoT...
详细信息
Data quality analysis is a crucial step in ensuring the reliability and accuracy of data used in machine learning models. The proposed approach utilized with machine learning algorithms to identify outliers in the dat...
详细信息
Background: Sugarcane, an essential commodity for the global sugar industry, is very vulnerable to several illnesses that significantly impact its output and quality. Methods: The study uses Spatial Relation Assisted ...
详细信息
Children's nutrition is an essential determinant of their development, so there is a need to forecast their food consumption adequately. This work presents a model for assessing children's nutritional intake l...
详细信息
Task management and energy efficiency have grown increasingly crucial in cloud computing environments. Effective job scheduling is essential to maximizing resource usage and overall efficiency in cloud computing. Howe...
详细信息
The Internet of Things (IoT) transforms connectivity, enabling devices to share data seamlessly via the cloud or wireless networks. However, IoT systems remain vulnerable to sophisticated cyberattacks, and traditional...
详细信息
This research introduces an advanced model architecture for chronic disease detection, leveraging highly developed artificial intelligence algorithms. The prototype combines the Convolutional Neural Network (CNN) and ...
详细信息
Cloud computing provides on-demand delivery of various services over the Internet and used by many users now days. Numerous IT organization have engaged themselves in providing Cloud service and choosing the best CSP ...
详细信息
Intrusion Detection Systems (IDS) have grown to be essential to network and computer security. However, it complicates the training phase and makes it time-consuming to detect vulnerabilities in data sharing on the ne...
详细信息
暂无评论