A secure fair electronic voting system is required for the smooth working of any democratic process. This paper implements a voting-based system application that runs with the support of blockchain to create a decentr...
详细信息
In health information systems, present interoperability problems are solved by blockchain technology (BT). Moreover, blockchain technology offers the high-tech standard that assures a secure sharing of computerized he...
详细信息
Wearable sensors and social networking sites help gather participant information for healthcare monitoring. Wearable sensors generate a lot of healthcare data for continuous patient monitoring. Social networking sites...
详细信息
In Modern times, automated security for identifying a person is one of the main concerns. There is a significant need for a trustworthy and secure identity verification solution. A reliable way to identify someone can...
详细信息
Metamorphic malware remains a significant challenge in the field of information security as it constantly changes its code and structure, utilizing sophisticated methods to evade detection by antivirus software. This ...
详细信息
In this research study, we aim to create a revolutionary agricultural management portal that is capable of identifying diseases in leaves, flowers, and fruits deploying an Arduino Board, an Esp32-camera module to coll...
详细信息
The 5G and beyond network slice provides the platform to connect several devices of different use cases to the network, and we can transfer the data from one UE to another UE in very less time. 5G comes with all the f...
详细信息
With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an in...
详细信息
With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an indoor trajectory, a new definition named Indoor Uncertain Semantic Trajectory is defined in this paper. In this paper, we focus on a new primitive, yet quite essential query named Indoor Uncertain Semantic Trajectory Similarity Join (IUST-Join for short), which is to match all similar pairs of indoor uncertain semantic trajectories from two sets. IUST-Join targets a number of essential indoor applications. With these applications in mind, we provide a purposeful definition of an indoor uncertain semantic trajectory similarity metric named IUS. To process IUST-Join more efficiently, both an inverted index on indoor uncertain semantic trajectories named 3IST and the first acceleration strategy are proposed to form a filtering-and-verification framework, where most invalid pairs of indoor uncertain semantic trajectories are pruned at quite low computation cost. And based on this filtering-and-verification framework, we present a highly-efficient algorithm named Indoor Uncertain Semantic Trajectory Similarity Join Processing (USP for short). In addition, lots of novel and effective acceleration strategies are proposed and embedded in the USP algorithm. Thanks to these techniques, both the time complexity and the time overhead of the USP algorithm are further reduced. The results of extensive experiments demonstrate the superior performance of the proposed work.
PowerBI, a graphical analytics software developed by Microsoft, has incorporated various AI and ML tools to provide accurate predictions and insights for the data feeded into the software. PowerBI is equipped with the...
详细信息
Many species around the globe heavily depend on flowers, and even the use of flowers for medical purposes is enormous, which has been in practice since ancient times. In modern botany, agronomy, and species research, ...
详细信息
暂无评论