The idea and features of the proposed You Tube video summarizer tool created especially for regional languages is presented in this research study. Generally, it is a challenging task for viewers, who prefer regional ...
详细信息
Monkeypox is a contagious viral infection caused by the monkeypox virus (Mpoxvirus). Characterized by skin lesions, fever, respiratory difficulties, swollen lymph nodes, and neurological complications, MPX can be fata...
详细信息
Stock market trend prediction is a classical re-gression problem with effects on stock exchange. This research is presenting a detailed exploration of how Long Short Term Memory (LSTM) networks may be used for predict...
详细信息
In order to effectively manage and monitor traffic on the roads, intelligent technologies must be able to detect and tally the number of cars on the road. The technology may be used for controlling and monitoring traf...
详细信息
In current scenario, many music applications are competing with each other to increase their customer base. The user chooses the app based on criteria like less latency, UI friendly, and so on. Existing song recommend...
详细信息
This study presents a comprehensive approach to dog breed classification, leveraging transfer learning algorithms and Convolutional Neural Networks (CNNs). The dataset utilized for training and evaluation is sourced f...
详细信息
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...
详细信息
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security *** issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
There are many practical uses for facial verification and recognition jobs. In this study, we look into the developments and difficulties faced in facial recognition technologies, especially in the application of Siam...
详细信息
The mislabeling of mangoes in local Pakistani markets unfairly impacts buyers, who frequently end up paying a premium for a cheaper type of mango fruit. To address this issue, our study employs advanced deep learning ...
详细信息
Community detection in social relationship networks is a significant research domain within the field of social network analysis. However, Twitter sets itself apart from conventional friends' and followers' ne...
详细信息
暂无评论