Information and Communication technology (ICT) is used in recent industries to advance into a decision-making environment in manufacturing. The objectives of this are efficiency, flexibility, innovation, quality, and ...
详细信息
Edge computing, a distributed computing concept, brings data processing and storage closer to endpoints or edge devices. Caching methods are crucial in edge computing environments for optimizing performance and minimi...
详细信息
Breast cancer's global prevalence highlights the need for the development of precise and reliable diagnostic tools. The objective of this study is to contribute to the growing body of knowledge in breast cancer di...
详细信息
Federated Learning (FL), a distributed machine learning approach, aims to protect user privacy by performing model training without centralized data collection. However, FL systems are susceptible to malicious partici...
详细信息
Guava, a valuable tropical fruit crop, faces significant defect challenges due to diseases. Manual disease checks are time- consuming and error prone, leading to delayed action. Our research focuses on image processin...
详细信息
In this study, we investigate a traffic monitoring method to detect passing cars, bikes, and humans from roadsides using millimeter-wave radar during road work. Because a road worker is one of the most dangerous occup...
详细信息
Given the global rise in antibiotic resistance, antimicrobial peptides (AMPs) provide a viable substitute for traditional antibiotics. Through a comparison of transformer-based, deep learning (DL), and machine learnin...
详细信息
Educational Documents and Certificates are a proof of professional achievements for anyone. Without these documents, it is not possible to start your career and hence play a very important role in everyone's profe...
详细信息
Compared with the normal scenes, the positions of obstacles, delivery boxes and sorting stations in the logistics sorting scene are relatively fixed, what’s more, the number of static obstacles in the logistics sorti...
详细信息
Within the domain of image encryption, an intrinsic trade-off emerges between computational complexity and the integrity of data transmission security. Protecting digital images often requires extensive mathematical o...
详细信息
暂无评论