Autism spectrum disorder (ASD) is a collection of a way of continuing neurodevelopment illnesses identified by limited and repetitive behavioral patterns, as well as social and communication impairments. Despite the f...
详细信息
Performing an object detection task after the restoration of a hazy image, or rather detecting with the network backbone directly, will result in the inclusion of information mixed with dehazing, which tends to interf...
详细信息
Cloud computing offers immediate access to shared resources, transforming business operations. To enhance cloud-based applications' efficiency and scalability, various technologies have been developed. Docker simp...
详细信息
Federated Learning with Cloud-Edge Collaboration (FL-CEC) has emerged as a cutting-edge paradigm in distributed learning. Efficient resource investment incentive mechanisms are crucial to encouraging clients in FL-CEC...
详细信息
The process and implementation of drug development is a complex structure which is a time-consuming process with higher accuracy. A transformative approach to optimize drug discovery is achieved through the integratio...
详细信息
This paper presents a random forest-feature sensitivity and feature correlation (RF-FSFC) technique for enhanced heart disease prediction. The proposed methodology is implemented using the Cleveland heart disease data...
详细信息
Clever fitness management software using the Internet of Factors (IoT) and smart sensors are a modern answer for powerful and personalized health care. This technology integrates innovative sensors with IoT, creating ...
详细信息
Controlled drugs are drugs that when used ethically may prove life-saving for patients but these drugs also have the potential for abuse, misuse, and addiction. Controlled drugs are under strict government regulations...
详细信息
Publish/subscribe(pub/sub) communication in IoT healthcare systems enables efficient and real-time dissemination of patient data, facilitating timely medical interventions and remote monitoring. Moreover, the pub/sub ...
详细信息
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha...
详细信息
暂无评论