Conventional cradles lack the ability to monitor and support infants continuously or adapt to varying needs. This study proposes a novel smart cradle equipped with advanced sensors and actuators, enabling parents to c...
详细信息
Healthcare monitoring systems have improved with the Internet of Things and machine learning prediction models. Traditional batch machine-learning approaches cannot generate an effective model since most data will be ...
详细信息
This study provides a novel method to generate a compiler, which translates a program using TINY language. TINY language is a simple programming language which is designed to understand the basic concepts of compiler....
详细信息
In the era of digitization, accurately delineating the boundaries of camera-captured documents stands as a crucial yet challenging task, impacting various processes such as Optical Character Recognition (OCR) and docu...
详细信息
In the fast-growing phase of social media, detecting the offensive language has become more crucial, since people are using different languages and cultural expressions. This paper represents a new way to handle the p...
详细信息
The detection of vehicles by unmanned aerial vehicles (UAVs) is gaining substantial attention in the field of traffic control. In aerial images, vehicles have a unique perspective and take up less pixels than other ob...
详细信息
A recommendation system is important in today’s world because it suggests many options to the user that may be useful or appealing. These kinds of recommending systems are used in many applications and devices to foc...
详细信息
In the rapidly evolving field of information security, video steganography offers a promising solution for concealing sensitive data within multimedia content. The proposed approach introduces a novel approach that in...
详细信息
The increasing complexity of malware requires a more thorough comprehension of how they operate. Using the MITRE ATT&CK framework, this project delves into the TrickBot and AsyncRAT malwares, offering a thorough e...
详细信息
As the cyber threats areevolving, intrusions exploit vulnerabilities in software or systems and can occur 24/7, targeting individuals and *** Intrusion detection system (IDS) is designed to help in the detection of cy...
详细信息
暂无评论