[HTML][HTML] Classification and comparison of ad hoc networks: A review

R Agrawal, N Faujdar, CAT Romero, O Sharma… - Egyptian Informatics …, 2023 - Elsevier
The study of ad hoc networks and their different varieties, including wireless sensor
networks, wireless mesh networks, and mobile ad hoc networks, is discussed in this paper …

[Retracted] Clinical Value of Abdominal Ultrasonography in the Diagnosis of Acute Abdomen in Children

X Xu, J Ye - Contrast Media & Molecular Imaging, 2022 - Wiley Online Library
In order to study the practical application value of abdominal ultrasonography in the
diagnosis and treatment of acute abdomen in children, this study uses the method of …

[Retracted] Image Effect Observation of Acanthopanax senticosus on Antifatigue Activity after Exercise

X Zhang, W Zhu - Scanning, 2022 - Wiley Online Library
In order to explore the effect of Acanthopanax senticosus on antifatigue activity after
exercise, this paper proposes an image effect observation based on the effect of …

[Retracted] Application of Data Encryption Technology in Computer Network Information Security

L Li - Security and Communication Networks, 2022 - Wiley Online Library
In order to solve the partial optimization problems of the RSA algorithm in computer network
security, a method of RSA algorithm optimization based on data encryption was proposed. In …

[Retracted] Research Progress of Polycyclic Aromatic Hydrocarbons Pretreatment Methods and Application of Computer Simulation Technology for Prediction and …

H Chang, Y Lu - Journal of Chemistry, 2022 - Wiley Online Library
Polycyclic aromatic hydrocarbons (PAHs) are a class of organic compounds that are
composed of aromatic rings containing only carbon and hydrogen atoms. They are one of …

Intrusion Detection in VANETs and ACVs using Deep Learning

AA Aboelfottoh, MA Azer - 2022 2nd International Mobile …, 2022 - ieeexplore.ieee.org
There are many novel techniques for intrusion detection in vehicular ad hoc networks and
autonomous and connected vehicles. Detecting and reporting an attack is the main …

Construction of Ecological Landscape Environment in Guanzhong Traditional Villages from the Perspective of Rural Revitalization

J Cao - Health & Social Care in the Community, 2023 - Wiley Online Library
In order to supplement and improve the landscape evaluation system of traditional villages
and play a positive guiding role in the specific protection and development of village …

[Retracted] Numerical Simulation of Fine Blanking Die Wear and Die Performance Analysis

Y Li, Y Zhao, Y Hao - Journal of Chemistry, 2022 - Wiley Online Library
In order to study the die wear law of rotary fine blanking helical cylindrical gear, a three‐
dimensional rigid plastic finite element model of rotary fine blanking helical cylindrical gear …

Digital Transformation Through Blockchain Usgae Towards Data Security

MS Hernandez, I Sentosa… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Digital transformation in government-provided services emerges as a vibrant element
towards governance resilience. The integration of technological advancement in each …

Apply Deep Learning-based CNN and LSTM for Visual Image Caption Generator

N Indumathi, RJ Divyalakshmi, J Stalin… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Implemented Image captioning is becoming a need. Deep neural network models enable
integrated applications to generate and caption images. Image captioning describes an …