1 Department of Information Technology and Computer Science, School of Computing and Mathematics, The Cooperative University of Kenya, Nairobi, Kenya. 2 Department of Computing and Informatics, School ...
Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
Abstract: Electricity security is vital for national stability, with power grids underpinning essential services such as finance, telecommunications, and transportation. As these systems increasingly ...
Introduction: The unmanned aerial vehicle -based light detection and ranging (UAV-LiDAR) can quickly acquire the three-dimensional information of large areas of vegetation, and has been widely used in ...
The ability to anticipate what comes next has long been a competitive advantage -- one that's increasingly within reach for developers and organizations alike, thanks to modern cloud-based machine ...
1 San Juan Bautista School of Medicine, Caguas, Puerto Rico, United States 2 Independent Researcher, Monmouth County, NJ, United States Background: In many countries, patients with headache disorders ...
Arid and semiarid regions face challenges such as bushland encroachment and agricultural expansion, especially in Tiaty, Baringo, Kenya. These issues create mixed opportunities for pastoral and ...
Abstract: This paper discusses the significance of identifying encryption algorithms in today's digital era to ensure data security. The study uses machine learning (ML) techniques, including Support ...