Falling events occur every day, especially among elderly patients or patients in need of special care. To some extent, falling can cause serious injuries, both open and internal wounds. Therefore, fast and accurate te...
详细信息
In the digital era, data communication security is one of the main challenges. This research proposes a new method for secure image communication, which is a mixed triple logistic map and BB84 quantum key distribution...
详细信息
Despite the existence of high-level guidelines and frameworks in Human-Computer Interaction (HCI), there is a lack of specific user experience principles for designing augmented reality (AR). This paper proposed the c...
详细信息
Question Classification is one of the important applications of information retrieval, as it plays a crucial role in improving the performance of question-answering systems. Differentiating between factoid and non-fac...
详细信息
Over the past few years, blockchain technology has gained significant attention. This surge in popularity can be attributed to the emergence of cryptocurrencies and the development of smart contracts. Cryptocurrency i...
详细信息
Visual impairment is characterized by the loss of vision, encompassing both complete blindness and partial vision loss. Studies reveal a notable prevalence of visual impairment among school-aged children. The signific...
详细信息
Concept maps are graphic representations of unique ideas widely used in learning. Concept mapping activities are often stored in an activity log which contains a record of data based on a particular time. The high act...
详细信息
We describe an approach to part-of-speech tagging from audio with very little human-annotated data, for Highland Puebla Nahuatl, a low-resource language of Mexico.1 While automatic morphosyntactic analysis is typicall...
详细信息
The rapid growth of Internet of Things (IoT) devices has resulted in numerous security challenges. Anomaly detection has become a crucial aspect of IoT security, as it helps identify unusual behaviors and potential th...
详细信息
Existing studies solve software engineering tasks using code infilling through LLMC. They utilize context information, which refers to data near the target code of infilling, as input prompts. Although prompts are ess...
详细信息
暂无评论