Flood prediction plays a vital role in reducing the influence of natural disasters among the communities and the infrastructure. This paper presents a machine learning approach for flood prediction using a voting clas...
详细信息
This study provides a detailed examination of network routing algorithms by comparing the effectiveness of the Time to Live (TTL) algorithm against both Single-objective and Multi-objective Dijkstra algorithms under v...
详细信息
This systematic literature review examines the efficacy of gamification in neurofeedback (NF) therapy approaches for the treatment of Attention-Deficit/Hyperactivity Disorder (ADHD). In recent research, gamification o...
详细信息
K-Nearest Neighbors (KNN), a simple and widely used algorithm, is extremely valuable in the field of machine learning models. Finding an optimal value of the nearest neighbor parameter in the KNN algorithm has been a ...
详细信息
Digital game-based learning (DGBL) has been viewed as an effective teaching strategy that encourages students to pick up and learn a subject. This paper explores its viability to help increase the reach and efficiency...
详细信息
In an era marked by remarkable technological advancements, the way we create and share information has undergone a profound transformation. This paradigm shift is epitomized by the NextGen Dynamic Video Generator usin...
详细信息
A 4×4 CPW MIMO Antenna array with an artificial magnetic conductor (AMC) reflector is presented for Wi-Fi7 access point on a metal wall application in the study. The 10-dB impedance of the integrated MIMO antenna...
详细信息
Quantum Key Distribution or QKD revolutionizes secure communication using quantum mechanics. Unlike traditional cryptographic methods vulnerable to advances in computing power, QKD guarantees unconditional security by...
详细信息
This study presents the development and implementation of a sophisticated Web Application Firewall (WAF) empowered by machine learning techniques to bolster cybersecurity measures. Traditional WAFs primarily rely on r...
详细信息
A critical challenge in implementing Zero trust (ZT) in Internet of Things (IoT) environments is ensuring secure authentication and authorization mechanisms. The work in this article delves into the intricate realm of...
详细信息
暂无评论