Demand side management (DSM) applications rely on the exchange of load profiles to effectively manage the operation of energy systems. However, sharing detailed energy profile data raises substantial privacy concerns,...
详细信息
Any parallel program is judged based on its efficiency in doing multiple tasks at the same time without getting stuck due to an underlying problem. The main purpose of a parallel program is to effectively and quickly ...
详细信息
Diabetes is a chronic disease posing a significant global health challenge, with the number of affected individuals projected to nearly double by 2045. This disease, which is characterized by high blood sugar, can cau...
详细信息
The abstract delves into the groundbreaking realm of DeepFakes, a revolutionary synthesis of deep learning and synthetic media. Central to DeepFake generation is the utilization of Generative Adversarial Networks (GAN...
详细信息
Image feature extraction and matching constitute fundamental steps in computer vision and image analysis, enabling various applications ranging from object recognition to scene reconstruction. Object recognition is on...
详细信息
Blockchain has shown tremendous growth in the past few years because of its decentralized and immutable architecture, which makes transactions transparent, making it a feasible choice for authentication and security p...
详细信息
Low cost wearable and implantable cardiac monitoring devices (WCM & ICM), combined with increasingly accurate disease and arrhythmia detection algorithms have proven effective to help slow the impact of cardiovasc...
详细信息
Human Resource (HR) management is one important section that increases the success of an organization to handle some important functions like employee data manipulation, attendance tracking, payroll processing, and pe...
详细信息
Limitless amount of data is loaded in every moment in social media platforms in the forms of audio, videos, texts, and photos. They are rich sources of information, which has immense value. Hence extraction of informa...
详细信息
When integrated, blockchain technology and cloud computing (EC) may improve security and protect data. However, when data is sent to EC, the Internet of Things (IoT) device layer cannot guarantee data security. As a r...
详细信息
暂无评论