Land-cover mapping is essential for applications such as urban planning, natural resource management, and environmental monitoring. However, tropical equatorial regions pose unique challenges to land-cover classificat...
详细信息
Identifying AI-generated text (AIGT) has become crucial in addressing the potential misuse of generative AI tools and their impact on trust, fairness, and authenticity of content. This study investigates the detection...
详细信息
Stock market is pivotal to economical systems. It is a platform where listed stocks of companies can be bought/sold by market participants to gain profit. In 2020, the total capitalization of all markets reached $95 t...
详细信息
Aspect-based sentiment analysis (ABSA) in massive open online courses (MOOCs) offers a powerful tool to understand student experiences and improve the quality of online education. As MOOCs grow in popularity, there is...
详细信息
The rapid growth of Internet of Things (IoT) devices has resulted in numerous security challenges. Anomaly detection has become a crucial aspect of IoT security, as it helps identify unusual behaviors and potential th...
详细信息
Human-centered design, a theoretical ideal, is sometimes compromised in industry practice. Technology firms juggle competing priorities, such as adopting new technologies and generating shareholder returns, which may ...
详细信息
Phishing is a cyberattack that exploits human psychology and technical vulnerabilities. Previous research has revealed inconsistency of relation between age and phishing susceptibility. Hence, this project aims to ide...
详细信息
Stunting is a condition where a child's height significantly falls below the average for their age, primarily due to prolonged malnutrition and inadequate nutrient intake. This condition poses long-term challenges...
详细信息
Efficient management of resources such as CPU, RAM, and disk storage is a critical challenge for object detection systems that rely on multi-camera video streaming, especially for resource-constrained devices. These c...
详细信息
Phishing websites have often been used for online and email fraud, spreading unwanted content. It has been important to find them before any user data was entered. In recent years, numerous attempts have been made to ...
详细信息
暂无评论