Access to adequate medical care can be difficult in many countries, particularly in economically developing countries. There aren't enough medical professionals, such as …
People are concerned about the security of their data over the internet. The data can be protected in many ways to keep unauthorized individuals from accessing it. To secure data …
The IEEE 802.16 specification defines WiMAX, a wireless broadband data transmission technology. It enables high-speed data transmission over a wide range and remains …
The gradual but consistent decrease in the number of customers retained over time is referred to as “customer churn,” and it is a word that is frequently used in the business and …
The main objective of this paper is the development of an Algorithm for Boolean Breast Cancer Classification based on 116 patients with results by testing blood along with physical …
Data collection from sensitive places must be done remotely due to laborious communication protocols. In this paper, the deployment of wireless sensor networks is …
S Sharma, MM Tripathi… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
Various multi-hop routing protocols like SIMPLE, ATTEMPT, LEACH has been discussed and their performance metrics in terms of network lifetime, stability period, and throughput …
SS Tiwari, G Dhasmana, HM Al-Jawahry… - 2024 International …, 2024 - ieeexplore.ieee.org
Federated learning presents a promising approach for preparing machine learning models while protecting information protection in cloud computing situations. This investigation …
T Aruna, P Naresh, A Rajeshwari… - 2022 2nd …, 2022 - ieeexplore.ieee.org
The sheer quantity of big information has created tremendous prospects for forecasts and study. Infographic is a normal sight in everyday life. Several trend lines explain the …