the traditional manufacturing industry uses decades-old technology and manual processes that are expensive, laborious, redundant, and a slight human error can cost millions of dollars. Withthe industrial revolution 4...
详细信息
Within the theoretical framework of Naive Bayes(NB), Iterative Bayes(IB), as an important variant, was proposed to alleviate the attribute interdependence problem based on output adjustment technique and shows certain...
详细信息
As the growth of online social networks increases, everyone is associated and linked with social media. A massive amount of personal data is being attacked and stolen by cyber attackers. these fraudulent profiles also...
详细信息
As technology advances at an ever-increasing rate, the difficulty of protecting data from hackers rises in the advanced world. By using cutting-edge methods, hackers are attempting to get past security measures. Citiz...
详细信息
the goal of the research on fetal health categorization using machine learning is to create a model that can precisely predict the condition of a fetus during pregnancy. this is crucial because prompt action following...
详细信息
In the traditional method of using the steady-state quantity for fault line selection takes a long time, while the method using the transient quantity is easy to be disturbed or misjudged although the judgment is quic...
详细信息
the Internet of things (IoT) is a rising technology where real-world physical objects are connected to the network and trying to make the smart environment solve some real-life problems automatically in an efficient w...
详细信息
In the traditional Magnetic Resonance Imaging(MRI)-guided breast puncture surgery, doctors perform puncture surgery manually based on the MRI images and experience. the puncture needle may not be able to reach the loc...
详细信息
the Automated Attendance System Using Face Recognition presents a resolution for attendance supervision, by utilizing the power of facial recognition technology to automate the tracking process. this innovative system...
详细信息
Better detection and avoidance of intrusions solutions are in high demand because of the worldwide upsurge in hacking on computer networks. New technologies like fog computing, cloud computing, and the Internet of thi...
详细信息
暂无评论