With the advent of Industry 4.0, Ambient Intelligence, and other related technologies, self-Adaptation has been seen in modern systems. In this sense, Human-computer Interaction (HCI) requires an approach focused on t...
详细信息
The advent of quantum computing has ignited unprecedented anticipation within the realm of IT. This has transcended the limitations of classical computation and revolutionized various facets of technological advanceme...
详细信息
Business Intelligence (BI) tools can provide benefits to various stakeholders in Higher Education Institutions (HEI) and support the academic process. We use BI tools to visualize data produced from learning analytics...
详细信息
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilitie...
详细信息
The extent of pollution in areas near industrial activities and Yamuna River has increased tremendously and to determine the overall water quality status in these locations is utmost important. This paper presents a c...
详细信息
By empowering early identification and provoke reaction within the occasion of health irregularities, another era digital health monitoring systems are basic to guaranteeing people's prosperity. ANNs, or artificia...
详细信息
A new parallel file system and multi-core processor-based dynamic multimedia encryption method is presented in this study. Multimedia encryption efficiency and security were the main goals, addressing massive data set...
详细信息
Cardiac-related diseases always lead to fatal consequences around the globe. This research includes vague data analysis of the data related to cardiac anomalies. This study proposes a method to develop a dimension red...
详细信息
Since its launch in 2014,Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and *** a market worth millions of dollars,Echo is used for diverse tasks such as accessing onlin...
详细信息
Since its launch in 2014,Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and *** a market worth millions of dollars,Echo is used for diverse tasks such as accessing online information,making phone calls,purchasing items,and controlling the smart *** offers user-friendly voice interaction to automate everyday tasks making it a massive *** many people view Amazon Echo as a helpful assistant at home or office,few know its underlying security and privacy *** this paper,we present the findings of our research on Amazon Echo’s security and privacy *** findings are divided into different categories by vulnerability or *** proposed mitigation(s)to the vulnerabilities are also presented in the *** conclude that though numerous privacy concerns and security vulnerabilities associated with the device are mitigated,many vulnerabilities still need to be addressed.
A graph invariant is a number that can be easily and uniquely calculated through a ***,part of mathematical graph invariants has been portrayed and utilized for relationship ***,no reliable appraisal has been embraced...
详细信息
A graph invariant is a number that can be easily and uniquely calculated through a ***,part of mathematical graph invariants has been portrayed and utilized for relationship ***,no reliable appraisal has been embraced to pick,how much these invariants are associated with a network graph in interconnection networks of various fields of computerscience,physics,and *** this paper,the study talks about sudoku networks will be networks of fractal nature having some applications in computerscience like sudoku puzzle game,intelligent systems,Local area network(LAN)development and parallel processors interconnections,music composition creation,physics like power generation interconnections,Photovoltaic(PV)cells and chemistry,synthesis of chemical *** networks are generally utilized in disorder,fractals,recursive groupings,and complex *** outcomes are the normal speculations of currently accessible outcomes for specific classes of such kinds of networks of two unmistakable sorts with two invariants K-banhatti sombor(KBSO)invariants,Irregularity sombor(ISO)index,Contraharmonic-quadratic invariants(CQIs)and dharwad invariants with their reduced *** study solved the Sudoku network used in mentioned systems to improve the performance and find irregularities present in *** calculated outcomes can be utilized for the modeling,scalability,introduction of new architectures of sudoku puzzle games,intelligent systems,PV cells,interconnection networks,chemical compounds,and extremely huge scope in very large-scale integrated circuits(VLSI)of processors.
暂无评论