Numerous advances and changes have been brought about by digitalization in both our daily lives and the business world. RPA is an all-purpose technology for developing specialized agents, or “bots,” that communicate...
详细信息
Numerous advances and changes have been brought about by digitalization in both our daily lives and the business world. RPA is an all-purpose technology for developing specialized agents, or “bots,” that communicate with GUI components to carry out routine, rule-based operations. Anyone can utilize the RPA to automate digital operations. RPA deployment in business processes can help to provide better service and guarantee that processes adhere to more efficiency and accuracy. the objective of this study is to enable human workers to assign their regular generic repetitive tasks to a software bot, freeing them up to concentrate on more challenging and difficult activities. this study presents a methodology for implementing RPA to extract employee information from the XML pages.
We have proposed a single system for analyzing text from an image and converting it into an audio track in the desired language. the visually handicapped can utilize this approach to sense the attitude and demeanor of...
详细信息
Recent AI advances have revolutionized automation in diverse fields. However, despite object detection research progress, underwater fish species identification remains underexplored. Underwater fish recognition is ch...
ISBN:
(纸本)9798400708305
Recent AI advances have revolutionized automation in diverse fields. However, despite object detection research progress, underwater fish species identification remains underexplored. Underwater fish recognition is challenged by the unique underwater environment, fish diversity, and limited labeled data. this study introduces a semi-supervised self-training method, using YOLOv5 as the foundation. Our approach iteratively refines the model with labeled and unlabeled data, enhancing accuracy in data-scarce scenarios. Random data augmentation is also adopted to bolsters model robustness, addressing the complexities of underwater environments.
In today's age, where data security's a growing concern it is crucial to develop strong encoding and decoding models. In our research paper we introduce a model that combines concepts, from compiler design wit...
In today's age, where data security's a growing concern it is crucial to develop strong encoding and decoding models. In our research paper we introduce a model that combines concepts, from compiler design with diverse hashing algorithms. this model aims to offer an efficient solution for transforming and retrieving data. As technologyadvances rapidly and the need for data security becomes more prominent in real world scenarios our model tackles the challenges of safeguarding information while ensuring integrity and confidentiality. By utilizing hashing algorithms like SHA, BLAKE2 and MD5 we achieve data encryption. Our experiments demonstrate that our model outperforms approaches showcasing its effectiveness across industries where protecting data privacy is of utmost importance. With its user interface our model provides a solution for secure data transmission and storage contributing significantly to advancements in data security and encryption techniques.
this article presents a unique method for detecting localized islanding in distributed generation (DG) system which connected to the main power grid, using a passive approach. the proposed methodology involves calcula...
this article presents a unique method for detecting localized islanding in distributed generation (DG) system which connected to the main power grid, using a passive approach. the proposed methodology involves calculating the cumulative sum of rate of change of ratio of negative and positive sequence superimposed voltage components (RCR21) at the distributed generation (DG) side, which is then employed to detect the occurrence of islanding. the current active methodologies deliberately introduce disruptions to the power system, posing potential issues concerning stability, power quality, and overall reliability of the prevailing grid. Passive methods, on the other hand, has a considerable non-detection zone (NDZ). the technique recommended in this article successfully addresses the NDZ issue without introducing any disturbances. To evaluate its effectiveness, PSCAD/EMTDC is employed for simulating a system. the proposed method undergoes several tests on the said system to assess its performance. the results demonstrate that the suggested approach exhibits the minimum NDZ and can distinguish islanding within a remarkably short period of time, significantly faster than a recloser which typically requires 150 ms for detection.
Deep learning (DL) is a prominent tool utilized today in many applications across many industries, including the healthcare realm. DL methods can manage several problems that traditional artificial intelligence (AI) m...
Deep learning (DL) is a prominent tool utilized today in many applications across many industries, including the healthcare realm. DL methods can manage several problems that traditional artificial intelligence (AI) methods find challenging. In this paper, we analyzed the performance of nine prevalent DL models i.e. VGG-16, DenseNet-121, ResNet50, VGG-19, DenseNet-169, Xception, EfficientNetB0, InceptionV3, and ResNet-152 pre-trained on ImageNet dataset for cervical cancer screening. these previously trained models are fine-tuned by utilizing transfer learning (TL) for 5-class and 2-class classification of whole slide pap-smear images (WSI). Two-step data augmentation is being used for the preprocessing of data to enhance the efficacy and robustness of classifiers by increasing the amount of the training data and reducing overfitting. Among the aforementioned DL methods, VGG-16 performs best among all with an accuracy of 94.89% for 5-class and 97.16% for 2-class classification.
advances in information technology and computerscience have brought significant changes to various sectors of human life. In education, computers have helped ease a variety of human tasks, especially for large-scale ...
详细信息
Face recognition, being one of the most effective applications of image analysis, has recently received a lot of attention due to the huge implication in human–computer interaction (HCI). As the availability and elig...
详细信息
the influence of scrap plastic drinking bottles on the strength and swelling qualities of lean clay is investigated in this paper. Before use, waste plastic bottles (WPB) were cut into 4 mm strips and mixed with soil ...
详细信息
Any abnormal growth in brain cells refers to brain tumor. With large variety of tumors reported, accurate diagnosis is very essential for appropriate intervention. Traditionally, biopsies are preferred diagnostic tool...
详细信息
暂无评论