Search
Search Results
-
Different Algorithm of Quality of Service for Lifetime Maximization in MANET
The design of routing protocols for mobile ad hoc networks (MANETs) faces several challenges because MANETs are resource-constrained. In order to... -
Voltage Control and Power Quality Optimization Using Distribution Static Synchronous Compensator in Distribution Systems
Power quality has recently attracted a lot of interest from both power utilities as well as consumers of electrical power. The performance of the... -
Software Effort Estimation Using Deep Learning: A Gentle Review
Accurately estimating the effort required for software development projects is critical to effective resource allocation and project planning. Recent... -
Performance Analysis and Comparison of Linear Precoding Techniques in Massive MIMO Under Different Fading Channels
Applications in academia and industry are increasingly interested in massive multiple-input–multiple-output (MIMO) technology. When there are many... -
Conversational Swarm Intelligence (CSI) Enhances Groupwise Deliberation
Real-time conversational deliberation is a critical groupwise method for reaching decisions, solving problems, evaluating priorities, generating... -
Emotion Recognition in Speech Using Convolutional Neural Networks (CNNs)
Speech Emotion Recognition (SER) represents a burgeoning technology with the potential to revolutionize human–computer interaction (HCI). In this... -
Enhancing Biometrics with Auto Encoder: Accurate Finger Detection from Fingerprint Images
The manuscript introduced a novel method for the precise identification of individual fingers from fingerprint images. Our approach leverages a... -
Exploiting Deep Learning Techniques for Autistic Face Recognition
Autism face detection is a crucial problem in today’s era. With the advancement in computer vision and pre-trained models it is now easy to utilize... -
Securing the Cloud: An In-Depth Analysis of IoT Integration
This paper provides the current scenario about the security and privacy concerns related to integration of cloud and Internet of Things (IoT). As the... -
Assessing Student Engagement Levels Using Speech Emotion Recognition
Almost all instructors face the challenge of understanding how engaged the participants or students are with the class sessions. Understanding the... -
Toward Early Detection of Neonatal Birth Asphyxia Utilizing Ensemble Machine Learning Approach
Perinatal asphyxia is one of the top three causes of neonatal death in develo** countries, killing over 1.2 million newborns yearly. Asphyxia... -
Optimizing Cloud Computing Load Balancing Through Extended Ant Colony Optimization
Due to the rapid advancement of IT and the widespread adoption of Internet applications, there is a significant and increasing interest among... -
An Energy-Efficient Routing Protocol of Black Widow Optimization Protocol in Mobile Sensor Nodes
Wireless sensor network (WSN) has involved in the development of the technology in today’s world. But the energy restrictions of the nodes have the... -
Accounting for Bias in Human Swarm to Beat Professional NBA Handicappers
The principle known as swarm intelligence (SI) has been founded in biology and allows group decisions to be made through a system of real-time... -
Impact of Online Customer Review (OCR) on Customer Trust Toward Websites and Online Shop** Using Source Credibility Theory (SCT) and Technology Acceptance Model (TAM)
The emergence of the Internet has created a compelling platform for doing business-to-customer transactions, which is online shop**. Customers do... -
Data Hiding System Based on Variations in Image Interpolation Algorithms
The new data hiding method that is suggested in this study is based on the variations in picture interpolation methods. To conceal data in a cover... -
Video Analysis Using Deep Learning in Smart Gadget for Women Saftey
Though there are strong laws to protect women, violence against women is increasing across the world. In this work deep learning is used for... -
Enhancing Information Security for Text-Based Data Hiding Using Midpoint Folding Approach: A Comparative Analysis
The activity of concealing information or data within a carrier entity in a way that is difficult for unauthorized users to notice is known as... -
Comprehensive Analysis of Enterprise Blockchain: Hyperledger Fabric/Corda/Quorom: Three Different Distributed Leger Technologies for Business
Enterprise Benefits are provided by blockchains like Hyperledger Fabric, Corda, and Quorum. For instance, Hyperledger Fabric adapts to your... -
Design and Parametric Variation Assessment of Extended Source Double Gate Tunnel Field-Effect Transistor (ESDGTFET) for Enhanced Performance
The Tunnel field-effect transistors (TFETs) leverage quantum tunneling for efficient power consumption and improved switching capabilities. In this...