Go
Oct 30, 2023Open AccessArticle
A reservation system that is computerized has been used for retrieving and storing useful information that is related to travel. These reservation systems have been classified as the PSS or Passenger Service Systems for the purpose of handling critical functions in an airline. This helps in providing the latest art technology into a robust platform, that is flexible in the styling of an airline. Stable and secure systems in the airline industry depend on several architectures that primarily requ...
Computer Vision
Computer graphics and visualization
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Oct 30, 2023Open AccessArticle
The safety, authenticity, and integrity of different electronic mechanisms, including e-government, online education, e-commerce, and electronic voting, are essential to their success. The transmitting of information within people and end viewers are very much essential now a days. To meet all these requirements, sensitive data should be digitally signed by the individual who sent it and absolutely confirmed by the person who is to receive it, as digital signature methods are essentially difficu...
Computer graphics and visualization
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Oct 30, 2023Open AccessArticle
In this research paper the impact of the multimedia technologies like the social media, entertainment platforms on society has been discussed. This has been given six sections they are as introduction, material methodology, results, discussion and conclusion. The introductory section has provided the brief introduction about the technologies regarding the multimedia, their latest version and the latest trends for using such technologies. OTT platforms, social media, Ed-tech platforms and other s...
Cooperative Communications
Computer Vision
Computer graphics and visualization
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Cloud Computing
Oct 30, 2023Open AccessArticle
Technology plays an essential role in the upgradation of productivity of a business and this in turn allows firms to gain comparative advantages. In this 21st century mobile computing helps the companies to transform their business into smart business. This helps firms to make greater revenue and boost their market reputation. Despite the advantages there are several challenges and issues with mobile computing that impacts the overall efficacy of the business. Lack of security and proven policy ...
Cooperative Communications
Computer Vision
Computer graphics and visualization
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Oct 30, 2023Open AccessArticle
Autonomous vehicles are increasingly being seen as a possible solution to the mobility issues of the future. The UK has recently joined a global race to develop and deploy automated vehicles. However, the deployment of autonomous vehicles brings with it a number of cybersecurity issues that must be addressed in order to ensure the safety and security of the users and the systems. This paper identifies the key cybersecurity issues associated with the deployment of automated vehicles in the UK, su...
Cooperative Communications
Computer Vision
Computer graphics and visualization
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Oct 30, 2023Open AccessArticle
Abstract :This paper discusses the use of an autonomous mobile robot to simulate an environment virtually. The autonomous mobile robot is capable of sensing its environment and making decisions based on the data it collects. The robot can be programmed to follow predetermined paths, detect obstacles, and interact with its environment in a virtual setting. The advantages of using this type of system are discussed, as well as the challenges associated with implementation. The implications for rese...
Cooperative Communications
Computer Vision
Computer graphics and visualization
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Oct 30, 2023Open AccessArticle
This study examines the use of machine learning and complex hierarchical structures to visualize text categorization. It considers the challenges of text categorization and the potential for machine learning algorithms to address these challenges. The study also examines the application of complex hierarchical structures to visualize text categorization and their potential to help improve accuracy and efficiency. Additionally, the study considers the potential of machine learning and complex hie...
Computer Vision
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Cloud Computing
Oct 30, 2023Open AccessArticle
The rise of artificial intelligence (AI) has had a significant impact on many aspects of life, including education, health care, finance, transportation, and the workplace. AI has enabled the automation of mundane tasks, improved decision-making capabilities, increased efficiency, and enabled the development of new products and services. In education, AI has enabled personalized learning experiences, improved assessment and feedback, and enabled the development of new educational technologies. I...
Cooperative Communications
Computer Vision
Computer graphics and visualization
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Cloud Computing
Oct 30, 2023Open AccessArticle
The research article has shown the multimodal transport solutions for smart cities in India. The researcher has discussed the concept of multimodal transport solution, problems and also characteristics for the solution of multimodal transport systems in the smart cities. The main findings are to show that the multimodal system has the capacity to overcome the issues of smart cities. It also has power to mitigate traffic issues which take place that take place in different cities. The system deve...
Computer Vision
Computer graphics and visualization
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Cloud Computing
Oct 30, 2023Open AccessArticle
In this research article the researcher has assessed the significance of code refactoring in optimizing the software security. It is essential for the developers to ensure that the security attributes have been addressed while developing software. It can assist the developers to detect the problems within the software that may impose several burdens in future. Apart from that, it also assists in sabotaging the risk factors through providing excellent design which can prevent the threat of any su...
Applications of Communication Systems
Computer Vision
Computer graphics and visualization
Computer and Network Security
Computational Robotics
Complex network models
Communication Protocols
Cloud Computing
Go
|