Facial recognition technology has emerged as a pivotal tool in both security and technical domains. Its adoption has accelerated in several developed nations, where it finds applications across various sectors. For in...
详细信息
The medicinal plant market faces challenges due to inefficiencies and a lack of transparency. In this paper, a total of 10GB dataset with 10,000 entries, including 15 attributes such as plant name, region, price, and ...
详细信息
Monkeypox detection is essential for effective public health management and controlling its spread. Timely detection enables early intervention in outbreaks, reducing transmission risk. This project presents an innova...
详细信息
The primary goal of the process is to securely transfer medical images. This involves utilizing MRI datasets for processing and applying resizing and filtering techniques such as Conv2D and Gaussian blur to standardiz...
详细信息
Explainable AI in Large Language Models (LLMs) represents an exciting frontier in Artificial Intelligence. In recent times, LLMs provides various AI applications ranging from chatbots to content generation. While thes...
详细信息
In Blind Image Quality Assessment (BIQA), due to the problem of laborious labeling, it is perceived as the intractability of collecting a new large-scale dataset that has plentiful images with a large diversity in dis...
详细信息
Rapidly rising the quantity of Big Data is an opportunity to flout the privacy of people. Whenhigh processing capacity and massive storage are required for Big Data, distributed networkshave been used. There are sever...
详细信息
Rapidly rising the quantity of Big Data is an opportunity to flout the privacy of people. Whenhigh processing capacity and massive storage are required for Big Data, distributed networkshave been used. There are several people involved in these activities, the system may contributeto privacy infringements frameworks have been developed for the preservation of privacy atvarious levels (e.g. information age, information the executives and information preparing) asfor the existing pattern of huge information. We plan to frame this paper as a literature surveyof these classifications, including the Privacy Processes in Big Data and the presentation of theAssociate Challenges. Homomorphic encryption is particularised aimed at solitary single actionon the ciphered information. Homomorphic enciphering is restrained to an honest operation onthe encoded data. The reference to encryption project fulfils many accurate trading operationson coded numerical data;therefore, it protects the written in code-sensible information evenmore.
University 5.0 thrives on the transformative power of ICT. Digital learning platforms, virtual labs, and collaborative software elevate the educational experience by fostering creativity and inclusivity. These tools r...
详细信息
A novel method for detecting deepfakes by presenting an AI architecture that is dynamic and adaptable and is designed and exclusively for picture authentication. Conventional deepfake detection models frequently find ...
详细信息
Network function virtualisation (NFV) offers several benefits to both network operators and end users. It is a more programmable and low-cost solution as compared to a traditional network. Since the network functions ...
详细信息
暂无评论