G Kaur, D Kakkar - Ad Hoc Networks, 2022 - Elsevier
Vehicular ad-hoc network (VANET) model is easy to arrange and inexpensive answer for clever traffic control and traffic failure protective measures. Generally, the nodes present in …
L Datta - arXiv preprint arXiv:2004.06632, 2020 - arxiv.org
In artificial neural network, the activation function and the weight initialization method play important roles in training and performance of a neural network. The question arises is what …
S Balasubramaniam, C Vijesh Joe… - International Journal of …, 2023 - hindawi.com
Cloud computing is a vast revolution in information technology (IT) that inhibits scalable and virtualized sources to end users with low infrastructure cost and maintenance. They also …
S Balasubramaniam, CV Joe… - … Signal Processing and …, 2024 - Elsevier
Detecting heart disease is challenging in clinical settings, leading to an increase in mortality rates. Current detection processes often rely on Electrocardiography (ECG) signal analysis …
M Hashemi - Multimedia Tools and Applications, 2020 - Springer
The explosive growth of the amount of information on Internet has made Web page classification essential for Web information management, retrieval, and integration, Web …
The energy demand is still increasing across the globe, while environmental concerns about global warming effect and greenhouse gases have augmented recently. CO 2 injection into …
D O'Shaughnessy - Computer Speech & Language, 2023 - Elsevier
This paper discusses how automatic speech recognition systems are and could be designed, in order to best exploit the discriminative information encoded in human speech …
SV Pingale, SR Sutar - Expert Systems with Applications, 2022 - Elsevier
Security remains as a key role in this internet world owing to the fast expansion of users on the internet. Numerous existing intrusion detection approaches were introduced by …
The evolution of the Internet produced a large quantity of information. This makes the internet world more complex and affected by powerful attacks. In modern networks, the …