In order to keep expenses in check while building projects are being carried out, accurate cash flow forecasting is crucial. The project's unique features and risk considerations make it challenging, despite exten...
详细信息
Over the past few decades, energy has been used mindlessly leading to many problems like reduction in supply, high power rates, increased carbon footprint, etc. Smart campuses, home automation, smart grid, etc. make l...
详细信息
In Rwanda, and in Cyangugu Remote community near the Kivu Lake, there is high solar sunshine energy, significant wind energy, abundant methane gas, appreciable geothermal energy, peat(biomass), hydro renewable energy ...
详细信息
This research work presents the design and development of a hybrid electric bicycle with a primary focus on energy conservation. A hybrid electric vehicle combines two or more energy conversion technologies with one o...
详细信息
This project looks into the possibility of applying machine learning to optimize wireless networks for adaptive communication. Using 5G resource data, it applies preprocessing, exploratory analysis, and visualization ...
详细信息
Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in *** reasons inc...
详细信息
Deep learning(DL)is a subdivision of machine learning(ML)that employs numerous algorithms,each of which provides various explanations of the data it consumes;mobile ad-hoc networks(MANET)are growing in *** reasons including node mobility,due to MANET’s potential to provide small-cost solutions for real-world contact challenges,decentralized management,and restricted bandwidth,MANETs are more vulnerable to security *** protecting MANETs from attack,encryption and authentication schemes have their ***,deep learning(DL)approaches in intrusion detection sys-tems(IDS)can adapt to the changing environment of MANETs and allow a sys-tem to make intrusion decisions while learning about its mobility in the *** are a secondary defiance system for mobile ad-hoc networks *** since they monitor network traffic and report anything ***,many scientists have employed deep neural networks(DNNs)to address intrusion detection *** paper used MANET to recognize com-plex patterns by focusing on security standards through efficiency determination and identifying malicious nodes,and mitigating network attacks using the three algorithms presented Cascading Back Propagation Neural Network(CBPNN),Feedforward-Neural-Network(FNN),and Cascading-Back-Propagation-Neural-Network(CBPNN)(FFNN).In addition to Convolutional-Neural-Network(CNN),these primary forms of deep neural network(DNN)building designs are widely used to improve the performance of intrusion detection systems(IDS)and the use of IDS in conjunction with machine learning(ML).Further-more,machine learning(ML)techniques than their statistical and logical methods provide MANET network learning capabilities and encourage adaptation to differ-ent *** with another current model,The proposed model has better average receiving packet(ARP)and end-to-end(E2E)*** results have been obtained from CBP,FFNN and CNN 74%,82%and 85%,respectively,by the ti
UAWSNs face challenges such as long propagation delays, limited bandwidth, and varying channel conditions. To solve these problems, we developed a new protocol called Multi- Hop Cross-Layer Optimized Hybrid Automatic ...
详细信息
Global trading is undergoing significant changes, necessitating modifications to the trading strategies. This study presents a newly developed cloud-based trading strategy that uses Amazon Web Services (AWS), machine ...
详细信息
Microgrids (MGs) serve as central interfaces for distributed generation, predominantly employing voltage source inverters (VSIs). These MGs operate in either autonomous or grid-connected modes, facilitating local powe...
详细信息
Traffic signs, and navigation provide drivers with crucial information about speed limits, hazards and are essential for maintaining road safety. Detecting these signs and classifying in real-time plays a vital for au...
详细信息
暂无评论