An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions–A review
V Chithanuru, M Ramaiah - Concurrency and Computation …, 2023 - Wiley Online Library
Recently, Blockchain cryptographic distributed transaction ledger technology finds its usage
in many applications. The application's ledgers implemented through Blockchain, ensures …
in many applications. The application's ledgers implemented through Blockchain, ensures …
A Security Framework for Increasing Data and Device Integrity in Internet of Things Systems
The trustworthiness of a system is not just about proving the identity or integrity of the
hardware but also extends to the data, control, and management planes of communication …
hardware but also extends to the data, control, and management planes of communication …
Enhancing efficiency and empowering institutions: leveraging wireless sensor devices, IoT edge computing, and fog computing in educational systems
Wireless sensor devices, edge computing, and fog computing can transform education by
improving efficiency and empowering institutions. This research paper explores the …
improving efficiency and empowering institutions. This research paper explores the …
Forecasting COVID-19 confirmed cases in China using an optimization method
Abstract COVID-19, a brand-new coronavirus, was found in Wuhan, China, in December
2019 and has since spread to 24 additional nations as well as numerous locations in China …
2019 and has since spread to 24 additional nations as well as numerous locations in China …
COVID-19 disease classification model using deep dense convolutional neural networks
Preventing the transmission of COVID-19 necessitates diagnosis and identification.
Researchers have developed algorithms to detect the presence of COVID-19 in X-ray and …
Researchers have developed algorithms to detect the presence of COVID-19 in X-ray and …
Cohesion measurements between variables and methods using component-based software systems
Shipra - International Journal of System Assurance Engineering …, 2024 - Springer
The practice of leveraging previously created software components to progress new
software is identified as component-based software engineering (CBSE). Good software …
software is identified as component-based software engineering (CBSE). Good software …
[HTML][HTML] Blockchain-Based Educational Certificates: A Proposal
CM Vipie, AD Afumatu, M Caramihai - Information Systems …, 2023 - intechopen.com
The development of science and technology is very fast and even increases year by year,
especially in the education system. However, in practice, a lot of learning systems continue …
especially in the education system. However, in practice, a lot of learning systems continue …
[PDF][PDF] Study the Dust Accumulation on the Performance of Solar PV Panels
SAK Berwal - NeuroQuantology, 2022 - researchgate.net
Energy production is one sort of clean and sustainable energy resource that the world's
future depends on solar PV modules are subjected to dust in outside situations. A major …
future depends on solar PV modules are subjected to dust in outside situations. A major …
Analysis of Employment-Related Sentiment in Social Media in India
JK Meenakshi - Mathematical Statistician and Engineering Applications, 2022 - philstat.org
The purpose of this article is to examine the unemployment rate in India and the employment
sentiment index. The employment sentiment score, which is gathered from a lexicon-based …
sentiment index. The employment sentiment score, which is gathered from a lexicon-based …
Deep Neural Networks Performance Comparison for Handwritten Text Recognition
Abstract Optical Character Recognition (OCR) systems are computer programmers that read
text from scanned documents and images. Character recognition and text detection are two …
text from scanned documents and images. Character recognition and text detection are two …