Computer Networks has an important role in the technological sphere. Ensuring network connection in an organization has become one of the most critical challenges lately. When we mention computer networks, the simplest thing that comes to our mind connection between computers that are increasing widely...
Being a 90s kid, I have been lucky enough to witness novel ideas manifest themselves into real life products. As cliché as it may sound, technological advancements have helped us take strides forward as a race. Computers have always fascinated me since an early age...
Mortality prediction of intensive care unit (ICU) patients facilitates hospital benchmarking and has the opportunity to provide caregivers with useful summaries of patient health at the bedside. The development of novel models for mortality prediction is a popular task in machine learning, with researchers typically...
In this new era, you can find technological evolution in almost every industry. With technological advancement and evolution happening daily, we are required to store our valuable information on storage systems. A storage system is a hardware on which we’re able to store, port and...
The internet of things (IoT) defines everyday physical objects being connected to the internet and being able to identify themselves to other devices to exchange data amongst them. This technology is useful in enhancing the performance, monitoring and maintenance of the various systems. One of...
Nowadays security is a big threat to the digital world. The use of internet, computers, mobile, tablets has become ubiquitous and the cyber-attack has grown rapidly. There are various kinds of cyber-attacks such as Spoofing, sniffing, denial-of service, phishing, evil twins, pharming, click fraud and...
What is the Internet? The internet is a globally connected system that entails many different independently managed networks. It is, however, a network of global exchanges, whether it is private, public, business, academic and government networks. Made-to-order essay as fast as you need it Each...
Video enhancement is one of the most important and difficult components in video research. The aim of video enhancement is to enhance the visual appearance of the video, or to provide a better transform representation for future automated video processing, such as analysis, detection, identification,...
Introduction According to IBM’s “2014 Cyber Security Intelligence Index,” 95 percent of all security incidents involve human error (IBM, 2014). A significant portion of these security incidents are due to social engineering. Examples of this include humans clicking on malicious links (phishing), opening unknown attachments,...
The year 2018 was really special and full of adventurous event year for me because I became an adult, graduated my high school and entered the University. Although all that events were interesting, living without my family in a new hometown was a real challenge...
Multi-threading has emerged as promising and effective avenue in tolerating memory latency. The process of implementation is majorly distinguished into two types that is used to share memory units among the processors. First approach is the hardware approach which uses the shared memory machines; other...
Introducing myself, I am Aastha Bajgain, born in 4th of June 2000, I am a permanent resident of Sundarharaincha Municipality, ward number 12, Morang, Nepal. I belong to a nuclear family with four members: Father, Mother, Elder brother and me. My brother has currently completed...
Introduction With the explosion of computers and of the internet in our everyday lives, the need for trustworthy computer security gradually increases. Biometric technologies provide user friendly and trustworthy control methodology for access to computer systems, networks and workplaces. The majority of research is expected...
As the digital economy becomes all-pervasive, there is a demand for everything to be adaptive, autonomous, and self-learning. In a truly digital world, there is no place for human errors, and no place either for people in repetitive and mundane tasks. The future is autonomous...
Introduction When getting past a crowd to go wherever they want to, people normally navigate the distance safely without giving a thought to what they are doing. They learn from the actions of other people and take note of any obstacles to avoid. On the...
In distributed systems, data sharing is supported by the Distributed Shared Memory (DSM) systems for multiple process networks. This paper mainly concentrates on the Multi-Threaded DSM systems that support data communication and computational synchronization in multi-threaded systems. Also, the distributed shared memory system reconsiders the...
Abstract Conventional systems are inundated by the unconventional characteristics of Big Data and provide several opportunities for researchers to explore avenues coupled with Big Data research. Semantic Web provides constructs for associating semantics or meaning to data and can be employed to express and query...
Abstract 3D concrete printing is the most revolutionary idea in the field of concrete technology to get a breakthrough instead of diversified constraints. it promises to be highly advantageous in terms of time and economical effeciency, accuracy, less manual labour etc. it mainly works on...
Introduction Used in business, autonomous artificial intelligence and alternative fields, 3D imaging provides terribly elaborated and valuable data regarding the setting or examined objects. Particularly in mobile artificial intelligence, 3D vision has become the world of interest of the many researchers and diverse imaging and...