Currently, cloud services have become a novel business model for information services owing to the rapid development of Cloud Computing (CC) technology. Hence, an efficient Smart Contract (SC) creation for cloud data ...
详细信息
Eye gestures are widely used in many applications, including device control, biometrics, visual analytics, and health-care, like Alzheimer's, accessibility, etc. The conventional method for eye gesture detection n...
详细信息
In the realm of education, the pursuit of effective learning outcomes often faces the challenge of limited resources. This paper explores the intersection of maximizing learning outcomes and minimizing costs through a...
详细信息
The quality of healthcare is predicted to rise dramatically with the advent of smart health. The key role in making smart health a success is played by the rise of cloud computing and the Internet of Things (IoT). How...
详细信息
Ensuring strong security procedures is crucial in the rapidly advancing realm of wireless sensor networks (WSNs) in order to protect sensitive data and preserve network integrity. The resource limitations and unpredic...
详细信息
This systematic review gave special attention to diabetes and the advancements in food and nutrition needed to prevent or manage diabetes in all its forms. There are two main forms of diabetes mellitus: Type 1 (T1D) a...
详细信息
The rapid expansion of autonomous technologies, the rise of computer vision, and edge computing present exciting opportunities in healthcare monitoring systems. Fall prevention is especially important for the elderly ...
详细信息
This paper presents a novel medical imaging framework, Efficient Parallel Deep Transfer SubNet+-based Explainable Model (EPDTNet + -EM), designed to improve the detection and classification of abnormalities in medical...
详细信息
When processing large amounts of data, proteins play a key role in biological processes. Protein structure prediction relies on a procedure called relevant feature selection. To accomplish classification, a feature se...
详细信息
Web-services have become most common IT enablers today. Cyber attacks such as the distributed denial of service (DDoS) attacks pose availability concerns which may result into service outages and consequently financia...
详细信息
暂无评论