An optimized link state routing protocol with a blockchain framework for efficient video-packet transmission and security over mobile ad-hoc networks
A mobile ad-hoc network (MANET) necessitates appropriate routing techniques to enable
optimal data transfer. The selection of appropriate routing protocols while utilizing the default …
optimal data transfer. The selection of appropriate routing protocols while utilizing the default …
Security Issues and Challenges for IoT-based Smart Multi Energy Carrier Systems
The Internet of Things (IoT) is revolutionizing the energy sector by providing a platform for
energy hubs to connect and manage energy resources. IoT-enabled energy hubs allow …
energy hubs to connect and manage energy resources. IoT-enabled energy hubs allow …
Wrist crack classification using deep learning and X-ray imaging
Wrist cracks are the most prevalent kind of crack and have a high incidence rate. Although
wrist cracks are often identified with X-ray medical imaging, the portrayal of cracks may …
wrist cracks are often identified with X-ray medical imaging, the portrayal of cracks may …
Al-based Traffic System: A Novel Approach
HA Sakr, A Yasser, E Elzimity, M Hazim… - … Middle East Power …, 2023 - ieeexplore.ieee.org
The notion of smart cities has recently gained popularity. We are experiencing traffic
congestion as the number of automobiles in metropolitan areas grows. The development of …
congestion as the number of automobiles in metropolitan areas grows. The development of …
Evaluating the effectiveness of flipped classrooms using linear regression
E-learning expands the potential of traditional education both in terms of technical, software
and information tools, as well as in terms of the use of different ways, methods and …
and information tools, as well as in terms of the use of different ways, methods and …
Machine Learning Model for Improving the Overall Equipment Effectiveness in Industrial Manufacturing Sites
Manufacturers have always pursued greater speed, scale, qualitative products and services,
and simplicity across operations to optimize production while enhancing efficiency and …
and simplicity across operations to optimize production while enhancing efficiency and …
A Framework for Confidential Document Leakage Detection and Prevention
Nowadays, With the spread of information crimes, the protection of confidential and sensitive
data and documents from leakage and publication has become a major concern for …
data and documents from leakage and publication has become a major concern for …
Mechanisms of system penetration
Given the escalating frequency of cyber-attacks worldwide, network security has become a
pressing concern. Consequently, a substantial amount of" ethical hackers" have offered their …
pressing concern. Consequently, a substantial amount of" ethical hackers" have offered their …
Region Segmentation and Support Vector Machine for Brain Tumour Stage Analysis, Detection, and Automatic Classification
Many recent clinical studies have made use of computer science-based applications in
magnetic resonance imaging (MRI). It is important to tune the collected brain images for the …
magnetic resonance imaging (MRI). It is important to tune the collected brain images for the …
Data Acquisition and Robot Control via Zigbee-based Wireless Sensor Network for SSAFR Applications
Communication is the key in multi-robot systems that handle the real-time applications.
WLAN has become an efficient method for wireless communication amongst several robots …
WLAN has become an efficient method for wireless communication amongst several robots …