The electric impulses of the heart are measured using a device called electrocardiogram (ECG), which is a graphical representation of heart signals for abnormality detection. The Electrocardiogram (ECG), which is noni...
详细信息
The pervasive proliferation of digital technologies and interconnected systems has heightened the necessity for comprehensive cybersecurity measures in computer technological know-how. While deep gaining knowledge of ...
详细信息
It is a difficult task to extend the lifetime of sensors and the stability of wireless sensor networks (WSNs) by reducing energy consumption. Though WSN is divided into different clusters for efficient data gathering ...
详细信息
In this paper we introduced an advance portable device using reliable wireless technology to trigger the communication between people and its nearby equipment's. Due to modernization now a days these electronic de...
详细信息
This research endeavor is centered on enhancing the predictability of stock prices through the application of Recurrent Neural Networks (RNN) in conjunction with technical indicators such as Exponential Moving Average...
详细信息
To avoid a falling-off in the volume and production of agrarian products, it is crucial to determine Rice plant illnesses. The application of various ML and image-processing techniques lessens the issues in the agricu...
详细信息
In the current scenario, the possibility of getting affected by disease is high so it is important to predict in advance. Due to technological advancement, it is for early prediction. Hence, this paper is focused on a...
详细信息
Vituperation refers to abuse or something bitter that is against the ethics. Vituperation is disturbing to victims and might lead to consequences like depression, anxiety, fear etc. Due to the COVID-19 outbreak many b...
详细信息
It's no secret that security systems rely heavily on image processing because of its versatility. Two-dimensional visuals, intricate algorithms, and instantaneous decision-making are all challenges that must be me...
详细信息
ISBN:
(纸本)9798350336009
It's no secret that security systems rely heavily on image processing because of its versatility. Two-dimensional visuals, intricate algorithms, and instantaneous decision-making are all challenges that must be met by the system. It is possible to optimize the system at one of four stages: preprocessing, feature extraction, Lip detection, and Recognition. Using modern computing hardware and software, we can create a system that is both easy to use and exactly what we need. Unfortunately, as more characteristics are added, the complexity of implementing these algorithms grows. The process is improved through the development of novel approaches, tools, and strategies. Machine learning and AI techniques have recently been applied to image processing applications. Standard methods of authentication, such as passwords and PINs, are becoming increasingly insecure. Physical and biological characteristics that are unique to each individual provide the best level of security. It is vulnerable to guessing and theft in business and public computer networks. Plastic cards, smart cards, and computer token cards all have non-security flaws in the form of forgery, loss, corruption, and inaccessibility. Identifying techniques based on biometrics have several applications in forensics, finance, and other fields. Voluntary action from the past has the drawbacks of being difficult to implement and not adaptable for covert uses, such as in surveillance applications. Lip image audit and verification during biometrics record keeping is prone to human error. Image quality of the lips is more easily obtained than fingerprint images. Only about five percent of the population has imperfect fingerprints and cannot be verified. Reasons include but are not limited to dry skin, diseased skin, elderly skin, wounded skin, calloused finger, oriental skin, bandaged finger, narrow finger, smeared sensor on reader, etc. Varying lighting conditions are widely recognized as one of the most crucial aspec
This work investigates the security problems associated with LTE networks that use automation. Mobile networks expansion creates substantial security risks because integrating automated systems for operational efficie...
详细信息
暂无评论