The challenging problems addressed by vision-based human motion recognition and its wide range of potential applications have captured the interest of numerous researchers. These applications encompass simple gesture ...
详细信息
Medical fields frequently use machine learning (ML) algorithms for disease classification and diagnosis. These algorithms base their judgments on features that have been retrieved from images. To achieve high classifi...
详细信息
False Data Injection Attacks (FDIA) are among the most significant security threats to critical systems. In this paper, we present a comprehensive benchmarking study to evaluate the performance of four deep learning m...
详细信息
A reinforcement learning agent for optimal green-house management through Proximal Policy Optimisation is developed and evaluated in this work. With variable elements like lighting, irrigation, humidity, and temperatu...
详细信息
The most common way of communication for a speech-impaired person is Sign Language. Generally, people do not learn Sign Language for communication with deaf and dumb people which causes their isolation. Sign language ...
详细信息
Leaf detection is a critical task in various fields, including agriculture, ecology, and botany, with applications ranging from plant species identification to disease diagnosis. This research paper explores the techn...
详细信息
Remote Sensing Image (RSI) classification had a crucial role in different applications, like environmental monitoring, land cover mapping, and disaster management. Conventional classification methods frequently depend...
详细信息
An persistent eye infection called glaucoma causes irreversible vision loss. A crucial problem in the clinical field is glaucoma identification. There have been very few studies designed to detect glaucoma in its earl...
详细信息
The expression relates to the national electric arrangement, used to deliver electricity via the electrical plants to the customers. It is made up of converters, distributors, monitoring stops and lines of communicati...
详细信息
One of the successful biometric technologies has been face recognition. Despite its enormous success, face recognition has drawbacks, much like any biometric technology. Face spoofing attacks, which are still possible...
详细信息
暂无评论