The popularity of computer networks in our daily life has grown recently as a result of the extensive use of the Internet. Due to server flaws, hackers can access computers using not only well-known attack types but a...
详细信息
Inefficiencies, cumbersome processes, and a significant risk of errors, delays, and misuse often plague conventional methods for tracking student attendance. To address these challenges, this paper introduces a smart ...
详细信息
Drones, otherwise called Unmanned Aerial Vehicles (UAVs), are as of now normal in a wide range of enterprises and have changed jobs like bundle package delivery and surveillance. In any case, given the immense number ...
详细信息
Ensuring robust and efficient quality control in industrial environments is critical as automation and artificial intelligence continue to advance. Human action recognition (HAR) plays a vital role in monitoring and m...
详细信息
Gradient-based neural networks weight optimizers such as stochastic gradient descent, adam, adagrad or adadelta provides robust and reliable results, and they are very slow to train as they slowly and steadily iterate...
详细信息
Women lacking appropriate nutrients in their meals are having the most rising non-communicable illness called Polycystic Ovary Syndrome (PCOS). The major reason behind this disease is unhealthy diet. At their reproduc...
详细信息
This study aimed to develop a predictive model for early detection of acute kidney injury (AKI) in a multicenter environment, while ensuring data safety and privacy. The dataset consisted of clinical information from ...
详细信息
Deep neural networks have made significant improvements in pixel -level semantic segmentation. However, the existing semantic segmentation algorithm still faces the problem of weighing between the accuracy and calcula...
详细信息
The integration of artificial intelligence in mechanical fault detection and diagnosis (FDD) helps to increase reliability, reduce costs, and improve the overall performance of mechanical systems in Industry 4.0 appli...
详细信息
Recommender systems based on collaborative filtering are vulnerable to shilling assaults owing to its openness. Shiller’s introduce fictitious profiles into the database of the system with the goal of modifying the r...
详细信息
暂无评论