Wireless sensor network (WSN), is a collection of sensors that is used for monitoring the activities in a given environment. They are used in the forests for fire detection wherea large number of sensor nodes are plac...
详细信息
Scheduling is vital in operating systems, controlling process resource access. Round Robin stands out among traditional algorithms due to its improved performance, unlike First Come First Serve (FCFS) or Shortest Job ...
详细信息
Machine learning method is efficient and effective in detecting DDoS attacks, but it all begins from identifying and selecting their important features. This paper presents an implementation of feature selection for D...
详细信息
Asthma is a common lung illness that causes breathing difficulties. It affects people of all ages and generally begins in childhood;however, it can also appear in adults for the first time. There is presently no cure,...
详细信息
As humans recover from COVID-19, there is a new pandemic threat posed by the monkeypox virus. A daily report of new instances of monkeypox is made, but it is not as deadly or highly contagious as COVID-19. There's...
详细信息
In this age of swift technological progress, Most educational establishments seek novel approaches that may further boost productivity. One such challenge has been the manual attendance tracking system in colleges. Th...
详细信息
Modern network administration desires to have early detection of DDoS traffic before damages occur. Nevertheless, as Internet traffic grows over years, it becomes more challenging to detect DDoS traffic in an efficien...
详细信息
Diabetic retinopathy (DR) is a significant threat to the vision of human beings;it is affected by patients and needs to be detected in the early stage to reduce the severity of vision. In recent research, the DR becom...
详细信息
The rapid expansion of data centers has led to a substantial increase in energy consumption, prompting a need for more energy-efficient solutions. This paper presents a comprehensive approach to enhancing the energy e...
详细信息
As the advent of quantum computing looms, the cryptographic landscape faces unprecedented challenges that could render traditional algorithms like AES, RSA, and ECC vulnerable. This paper delves into a comparative stu...
详细信息
暂无评论