Wheat is one of the crucial cereal crops globally, and its productivity is affected by various diseases. Therefore, the timely and precise detection and classification of these diseases are important. The advancements...
详细信息
Deep hashing retrieval has gained widespread use in big data retrieval due to its robust feature extraction and efficient hashing process. However, training advanced deep hashing models has become more expensive due t...
详细信息
Digital Twins (DTs), serving personalized cloud-based digital assistants, hold great promise for supporting infotainment applications of the Internet of Vehicles (IoVs), in which personalized content such as high-defi...
详细信息
this paper investigates the ability for using diverse self-sufficient vehicle technology for computerized steering. The studies specializes in two precise technology, Optical waft Estimation (OFE) and Inertial size de...
详细信息
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end *** numerous security tech-niques,face recognition is considered a high-security *** fuse and carry out face ...
详细信息
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end *** numerous security tech-niques,face recognition is considered a high-security *** fuse and carry out face identification as an access authority into these ***,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized *** the existing spoofing detection algorithm,there was some loss in the recreation of *** research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said *** research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused ***,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)*** database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video *** images are taken with three different quality cameras:low,average,and high-quality real and spoofed *** extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms.
he successful demonstration of their location tracking alert system for fishermen, Satellites will employ Amazon Web Services (AWS). Using cloud-based computing technology, the activities and whereabouts of fishermen ...
详细信息
In the era of large volumes of data (big data), suggestions on various methods are crucial, as they utilize vast amounts of data and consumer behavior information to suggest menus based on eating preferences. A novel ...
详细信息
Retinal images are broadly used to expose several retinopathies like glaucoma, optic neuritis, macular degeneration related to age, and diabetic retinopathy. computer-aided retinal image diagnoses efficiently facilita...
详细信息
Under this work, we propose a novel method for analyzing heart sounds to find cardiovascular illnesses. The phonocardiography (PCG) signal is divided into four pieces by the heart sound segmentation process: S1, systo...
详细信息
This study presents a novel system that utilizes computer vision and machine learning approaches to address the problem of traffic congestion in urban areas. The proposed system leverages the advanced object detection...
详细信息
暂无评论