this research showcases significant advancements in the timely identification and monitoring of retinopathy among preterm infants through the integration of Multilayer Perceptron (MLP) and Convolutional Neural Network...
详细信息
In this study, the use of electroencephalography (EEG) as a brain-computer interface (BCI) for people with communication difficulties is being investigated. the study aims to decode EEG data into words, providing an a...
详细信息
In the modern world, due to global climatic changes, the Automobile Sector is generally shifting towards Electric Vehicles due to its benefits over Internal Combustion Engines (ICE). this rapid increase in the Electri...
详细信息
A breadth-first-search (BFS) based novel quality-guided phase unwrapping (PU) algorithm is proposed. the BFS algorithm is assisted withthe non-uniformly segmented intervals over the range of phase quality values. On ...
详细信息
Disk Drive failure tolerance and optimum utilization of disks for storage are two of the most important challenges in the Cloud based data center. Addressing boththese problems simultaneously can be tricky. To make t...
详细信息
"Sentiment Analysis for Stock Prediction Using Mass Media Sources" introduces a groundbreaking approach to forecasting stock movements by harnessing sentiment analysis applied to economic news gathered from ...
详细信息
Vienna rectifiers are widely used because of their advantages towards the input side harmonic reduction, stable output voltage with low stress on power switches, and high-power density. However, Vienna rectifiers also...
详细信息
the expansion of the 4th Industrial Revolution is making it easier to collect and analyze big data through cloud technology. In addition, advances in semiconductor design and manufacturing technology are accelerating ...
详细信息
Secure data sharing while preserving user privacy is a critical challenge in Biomedical applications. this paper presents the Secure Health Data Handling Framework (SHDHF), a comprehensive and multi-layered solution d...
详细信息
the collective frequency and intricacy of attacks on computer networks remain a threat to information security within computer schemes. In order to solve this, researchers exploited network intrusion detection systems...
详细信息
暂无评论