Biomedical literature lacks integration of dynamic drug interaction data for personalized prescriptions. This proposed work is a new hybrid model that enhances drug safety prescriptions by taking into account individu...
详细信息
The limitation of energy curtailment produced through Renewable Energy Sources (RES) is obstructed by technical, economic, and political factors. This reduction has negative financial consequences for renewable energy...
详细信息
This study explores methods for improving energy efficiency in wastewater treatment facilities to address the pressure of rising electricity tariffs. As the energy consumption by water treatment facilities accounting ...
详细信息
Early and automated fault detection is necessary for proper condition monitoring and operation management of electric motor and drive systems. This paper investigates fault detection of Permanent Magnet Synchronous Mo...
详细信息
Blockchain technology is critical in cyber *** most recent cryptographic strategies may be hacked as efforts are made to build massive elec-tronic *** of the ethical and legal implications of a patient’s medical data...
详细信息
Blockchain technology is critical in cyber *** most recent cryptographic strategies may be hacked as efforts are made to build massive elec-tronic *** of the ethical and legal implications of a patient’s medical data,cyber security is a critical and challenging problem in *** image secrecy is highly vulnerable to various types of *** a result,designing a cyber security model for healthcare applications necessitates extra caution in terms of data *** resolve this issue,this paper proposes a Lionized Golden Eagle based Homomorphic Elapid Security(LGE-HES)algorithm for the cybersecurity of blockchain in healthcare *** blockchain algorithm preserves the security of the medical image by performing hash *** execution of this research is carried out by MATLAB *** suggested fra-mework was tested utilizing Computed Tumor(CT)pictures and MRI image data-sets,and the simulation results revealed the proposed model’s profound *** the simulation,94.9%of malicious communications were recognized and identified effectively,according to the total outcomes *** suggested model’s performance is also compared to that of standard approaches in terms of Root Mean Square Error(RMSE),Peak Signal to Noise Ratio(PSNR),Mean Square Error(MSE),time complexity,and other factors.
In this article, a new interconnecting modular full-bridge step-up LLC resonant converter for PV energy applications is proposed. The proposed converter module is capable of regulating power flow between modules throu...
详细信息
Epidermal ridges are crucial for tactile sensing in both human fingers and synthetic sensors. These ridges are made of compliant materials and susceptible to abrasion damage after iterative use. This study focuses on ...
详细信息
Human Activity Recognition (HAR) is pivotal for automating the detection and classification of human movements. Technological advances in data collection from sensors and cameras is making automatic HAR increasingly a...
详细信息
This paper presents an exhaustive analysis of power flow optimization within an IEEE 33-bus microgrid system using Particle Swarm Optimization (PSO) and compares it with traditional Optimal Power Flow (OPF) methods. T...
详细信息
The bottleneck problem arises from the internal crossbar architecture within the HBM. Challenges related to the internal crossbar's bandwidth in HBM primarily revolve around efficiently utilizing the memory's ...
详细信息
暂无评论