In recent era, the unmanned aerial vehicles (UAVs) commonly known as drones has emerged as a one of the most significant and promising tools which has demonstrated its wide range of implementations variating from comm...
详细信息
To assist blind people in travelling and solve the problems of high hardware costs, insufficient portability of blind assistance devices, and vulnerability to environmental impacts, a modified YOLOv5 algorithm (YOLOv5...
详细信息
Advanced hooligans are grabbing the opportunity to mull over related contraptions with their IoT adware. The majority of digital attacks target these devices due to the rapid evolution of IoT advancements. With the di...
详细信息
An improved algorithm based on Quick Sort algorithm research method is proposed to deal with prevailing duplicate values in the sorting of data. The duplicate values are specially processed, which effectively reduces ...
详细信息
A large number of space debris with rotational motion occupy scarce orbital resources, thus, a de-tumbling phase may be necessary prior to the capturing phase to reduce the risk of collision. A new contactless AC curr...
详细信息
Cloud computing provides scalable and adaptable infrastructure however is significantly susceptible to cyber-attacks. This work presents a hybrid methodology that integrates the GOA and GA for feature selection, along...
详细信息
Time series data forecasting is a crucial topic in economics, business, and finance. New methods are being created to evaluate and predict time series data as a result of recent improvements in computing power and mor...
详细信息
For many scenarios, the world around us is a never-ending cacophony of signals from various sources, where distinct stimuli do not really mix properly. Separating blind sources is a method of extracting sources from s...
详细信息
Traffic sign recognition is crucial in enabling intelligent driving. This paper proposes a robust hierarchical traffic sign image recognition algorithm that maintains local topology. The algorithm is divided into two ...
详细信息
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha...
详细信息
暂无评论