FNU Jimmy - DOI: https://doi. org/10.60087/jklst. vol2, 2023 - jklst.org
Ransomware attacks pose significant security risks to both personal and corporate data, leading to profound privacy breaches and financial losses. Detecting ransomware …
Intrusion poses a significant challenge in Cloud networks, necessitating the development of efficient mechanisms to mitigate intrusions and enhance system security. To address this …
AI has found widespread application across various sectors, including security, healthcare, finance, and national defense. However, alongside its transformative advancements, there …
MM Islam - Journal of Artificial Intelligence General science …, 2024 - ojs.boulibrary.com
This research delves into the intricate influence of Artificial Intelligence (AI) on community development across vital sectors such as healthcare, education, environmental …
Semiconductor manufacturing involves a complex sequence of unit processes, where even a minor error can disrupt the entire production chain. Present-day manufacturing setups rely …
SV Bayani, R Tillu, J Jeyaraman - Journal of Knowledge Learning and …, 2023 - jklst.org
Ensuring security and safeguarding data privacy within cloud workflows has garnered considerable attention in research circles. For instance, protecting the confidentiality of …
Determination of transmission reliability margin for brownout Page 1 Please do not remove this page Determination of transmission reliability margin for brownout Nadia, A.; Hossain …
ME Hossain, M Asaduzzaman - Journal of Energy & Technology (JET), 2024 - rsepress.org
In most cases, it is not possible to find the accident location very quickly result in delaying the assistance reached to the individual. The objective of this work is to locate a traffic …
A Nachshoni - Journal of Artificial Intelligence General science …, 2024 - ojs.boulibrary.com
This research investigates the influence of school principals' motivation on teachers, recognizing motivation as a complex process driving human behavior towards goals …