Fetal brain anomaly prediction is important for fetal medicine, as well as for prenatal health care. Fetal anomalies are classified into two types, anomalies in the fetus' body parts including heart, lung, and kid...
详细信息
In order to identify the latency-critical applications, this research develops an intelligent task placement and resource allocation framework (ITPRAF) that makes use of supervised feed forward neural networks. This a...
详细信息
Polycystic ovary syndrome (PCOS), a common endocrine-metabolic disorder affecting about 10-13% of women during reproductive age worldwide, often leads to irregular menstruation, infertility, obesity, and long-term hea...
详细信息
This paper designs an epidemic prevention and control mask wearing detection system based on STM32, which is used to monitor the situation of people wearing masks. Tiny-YOLO detection algorithm is adopted in the syste...
详细信息
In 21st decade, healthcare is one of the biggest challenges, and the current scenario very flexible to adapt the effective execution technology solutions like internet of things (IoT). Through this a patient may acces...
详细信息
Blind image quality assessment (BIQA) remains challenging due to the diverse types of distortion and variable image content, which complicates the distortion patterns crossing different scales and aggravates the diffi...
详细信息
Cloud computing provides scalable and adaptable infrastructure however is significantly susceptible to cyber-attacks. This work presents a hybrid methodology that integrates the GOA and GA for feature selection, along...
详细信息
An improved algorithm based on Quick Sort algorithm research method is proposed to deal with prevailing duplicate values in the sorting of data. The duplicate values are specially processed, which effectively reduces ...
详细信息
Emotion recognition through facial expressions and gesture analysis has emerged as a key area of research in computer vision and human-computer interaction. The ability to automatically detect and classify human emoti...
详细信息
Threat intelligence provides a platform for cybersecurity engineers for attack traceability, which provides substantial knowledge database logs to defend against future security threats. Threat intelligence relationsh...
详细信息
暂无评论