Stability Analysis and Navigational Techniques of Wheeled Mobile Robot: A Review
Wheeled mobile robots (WMRs) have been a focus of research for several decades,
particularly concerning navigation strategies in static and dynamic environments. This …
particularly concerning navigation strategies in static and dynamic environments. This …
MTD-DHJS: makespan-optimized task scheduling algorithm for cloud computing with dynamic computational time prediction
Cloud computing has revolutionized the management and analysis of data for organizations,
offering scalability, flexibility, and cost-effectiveness. Effective task scheduling in cloud …
offering scalability, flexibility, and cost-effectiveness. Effective task scheduling in cloud …
Enhancing industrial cyber security, focusing on formulating a practical strategy for making predictions through machine learning tools in cloud computing environment
Cloud computing has revolutionized how industries store, process, and access data.
However, the increasing adoption of cloud technology has also raised concerns regarding …
However, the increasing adoption of cloud technology has also raised concerns regarding …
Semi-supervised clustering-based dana algorithm for data gathering and disease detection in healthcare wireless sensor networks (wsn)
Wireless sensor networks (WSNs) have emerged as a promising technology in healthcare,
enabling continuous patient monitoring and early disease detection. This study introduces …
enabling continuous patient monitoring and early disease detection. This study introduces …
Kali Linux based Empirical Investigation on Vulnerability Evaluation using Pen-Testing tools
B Kumar, SP Bejo, R Kedia, P Banerjee… - … on Communication & …, 2023 - ieeexplore.ieee.org
Currently, because almost all interactions occur online, internet security is a critical concern.
Penetration testing evaluates network and system security while also revealing security …
Penetration testing evaluates network and system security while also revealing security …
Deep Shield: A Federated Learning Approach to Combat Online Pirated Content Using Deep Fakes
Online piracy and the spread of deep false content have become major issues in the digital
age. In order to combat the widespread distribution of unlicensed information, notably …
age. In order to combat the widespread distribution of unlicensed information, notably …
Automated speed breaker system using IoVT generated data for Electric Vehicle using Machine Learning
The identification of speed breakers on roads is crucial for ensuring a safe and comfortable
driving experience for motorists. In this paper, we present an approach to identify speed …
driving experience for motorists. In this paper, we present an approach to identify speed …
The Usability Evaluation Attributes for Halal Traceability System
A Susanty, AA Ramadhani - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Usability plays an essential role in user-centric design, ensuring that systems, products, and
interfaces meet the needs and expectations of the intended users. The concept of usability …
interfaces meet the needs and expectations of the intended users. The concept of usability …
Machine Learning-Powered Fraud Detection & Prevention: A Comprehensive Implementation
Fraud detection as well as prevention represent paramount challenges in today's digital
scenario, where the threat landscape continually evolves. This research study focuses on …
scenario, where the threat landscape continually evolves. This research study focuses on …
Revolutionizing House Price Prediction: Harnessing the Power of Data Science and Augmented Reality
Data science and augmented reality (AR) technology convergence in recent years has
cleared the door for creative applications in many different fields. To revolutionize the …
cleared the door for creative applications in many different fields. To revolutionize the …