Unmanned aerial vehicles (UAVs), or drones, are transforming surveillance strategies in various fields, including border security and wildlife conservation. Their ability to monitor large, challenging areas in real ti...
详细信息
Electronic nose (e-nose) technology has become a powerful tool for identifying and evaluating complex scents in a variety of contexts, such as environmental monitoring, medical diagnostics, and food quality control. T...
详细信息
This paper presents an advanced system that integrates Google's Speech Recognition API with the Gemini-l.5-flash model to improve audio processing and response generation, particularly in the context of healthcare...
详细信息
This paper aims to address the complex challenge of course assignment for faculty members within a Saudi university, taking into account the socio-cultural constraints imposed by gender-based segregation between stude...
详细信息
One of the biggest challenges facing healthcare systems throughout the world is the aging population. The growing number of elderly citizens in need of specialized care is severely straining the available resources an...
详细信息
In the complex world of modern telecommunication networks, Baseband Unit (BBU) pools play a crucial role in optimizing data processing and minimizing response time. This paper presents the Adaptive Queue Dynamics (AQD...
详细信息
Effective congestion control algorithms (CCAs) are crucial for the smooth operation of Internet communication infrastructure. CCAs adjust transmission rates based on congestion signals, optimizing resource utilization...
详细信息
Mobile edge computing (MEC) promises to be a useful technology to enable applications in a smart city. However, the task offloading becomes challenging as the MEC infrastructure has limited resources. To solve the cha...
详细信息
Hoya represents a significant component of Indonesia’s biodiversity with considerable potential;however, its utilization remains suboptimal. There exists a keen interest among researchers, collectors, and horticultur...
详细信息
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins...
详细信息
暂无评论