Information extraction in disaster domain is a critical task for effective disaster management. A high quality event detection system is the very first step towards this. Since disaster annotated data-sets are not ava...
详细信息
Client prediction of churn is a difficult field of study that adds to client retention strategies. In a saturated and competitive market, telecommunications companies must rely on a viable churn customers prediction m...
详细信息
In this work, an approach to tackle the problem of image segmentation on MRI scans of cancer patients using deep learning techniques has been proposed. Radio oncologists are challenged with a tedious task of segmentin...
详细信息
In this paper, we propose an improved convolutional neural network for the automatic classification of breast cancer pathological images, with the goal of achieving more accurate results. It is also proposed to use tw...
详细信息
A computer vision system called Automatic Number Plate Recognition (ANPR) automates the process of reading licence plates from moving objects. Because to its capacity for precise and effective object recognition, deep...
详细信息
The underwater object detection is a difficult task due to the unclear visibility and lack of objects underwater in kovalam, it was expected to have visibility up to three to five meters but it is very complicated to ...
详细信息
The Internet of Things (IoT) paradigm has gradually become prevalent in all facets of life. Due to advancements in academia, business and industry, it may be possible to apply IoT to underwater surroundings, which hav...
详细信息
Smartphones play an extensive position withinside most company investigations into cyber intrusions. Investigations from the Law Enforcement additionally contain cellular gadgets sporting crucial proof that could assi...
详细信息
Smartphones play an extensive position withinside most company investigations into cyber intrusions. Investigations from the Law Enforcement additionally contain cellular gadgets sporting crucial proof that could assist carry the case to its logical conclusion. Smartphones are utilized in several crook justice contexts. The company presents mobile telephones to lots of its personnel as a part of their task duties, and the BOYD (carry your very own tool) idea is broadly adopted, permitting customers to get admission to workplace applications (like Outlook, Skype, etc.) the usage of their very own transportable gadgets. Based on forensic proof from research starting from conventional crimes (homicide, robbery, kidnapping, etc.) to technological crimes like cybersecurity incidents on company-huge cellular facilities, unlawful get admission to or exchanges, or facts theft, the cybercrime inquiry unit can be required to capture the cellular gadgets and ship them to FLS for added analysis. The chain of custody high-quality practices for securing mobile telephones, iPads, company cellular telephones, and BYOD gadgets in a manner that protects the integrity of the proof and is consequently suited in courtroom docket are in short defined on this paper. This paper's chain of custody technique was created especially for cellular platforms which require specific application of mind and use of tools in the reconstruction of the scene of crime as well as management of the evidence due to the variety of operating systems and nature of dynamic evidence which mobile devices have. The necessities of the commercial enterprise and regulation enforcement agencies that might use the record for normal cellular tool investigations in India have been taken into consideration while it was being developed. This paper has been written retaining in view the necessities of each enterprise in addition to the Law Enforcement Agencies to apply it for his or her everyday cybersecurity investigations
This classroom management system is designed to simplify attendance tracking and data access. It replaces the traditional pen-and-paper method with a location-based tracking and QR code system, providing administrator...
详细信息
Most common machine learning algorithms were designed to tackle particular problems in seclusion. Based on the business requirements, a machine learning algorithm was employed for a particular task and these algorithm...
详细信息
暂无评论