Considering quick growth of technical knowledge, it is pertinent for the metropolitan stake-holders to improve the urban living standards by implementing effective policies assistance from data analysis using the Inte...
详细信息
Intelligent Transportation System (ITS) is one of the promising applications of the Internet of Things (IoT) as the IoT system provides an easy way to collect and monitor the system. One of the critical components to ...
详细信息
With the recent global spread of the COVID-19 (also known as the corona virus) pandemic, several governments have attempted to control its transmission through preventive and precautionary measures. Education is one o...
详细信息
Recently monkeypox outbreak has raised concerns due to its increasing number of cases and diverse dermatological symptoms in 2024, which can complicate early diagnosis due to similarities with other viral infections s...
详细信息
From credit scoring algorithms to face recognition systems, data-driven technologies are already impacting our lives and choices. To guarantee that new technologies function for the advantage of everyone, rather than ...
详细信息
ISBN:
(纸本)9798350383881
From credit scoring algorithms to face recognition systems, data-driven technologies are already impacting our lives and choices. To guarantee that new technologies function for the advantage of everyone, rather than perpetuating prejudices and discrimination, we have to address the ability, fairness, and trustworthiness of data systems and analysis. In literature, ability of data systems and analysis is defines as the capability of data systems to capture, store, retrieve, and manipulate data in large databases. Fairness of data systems means making sure that the usage of data and analytics does not result in biased or discriminating results for individuals or organizations. Trust is an essential factor in the effectiveness and acceptability of data systems and analysis. Without trust, people may be unwilling to utilize or disclose their data with such systems, hampering their ability to give useful insights and take advantages of data systems. To analyze, the ability, fairness, and trust in data systems and analysis, researchers have used secondary, qualitative data. Researchers have used scholarly publications, research papers, and reports taken from credible and peer-reviewed research journals. Using the data, researchers came to the result that data systems analysis have enhanced decision making process and helped us to improve our productivity in daily-life activities, through its capabilities of capturing, stories, retrieving and manipulating data. Yet, there are issues regarding the fairness of data systems. While progress achieved in tackling fairness issues, trust issues concerning data systems and analysis exist owing to data breaches suffered by huge databases globally. To conclude, in order to create trust in data systems and analysis, firms need to concentrate on security, data quality, transparency and accountability of data. This requires implementing strong access limits, leveraging high-quality data sources, being transparent and honest about data
In the realm of surveillance and anomaly detection, the proposed Adaptive Multimodal Anomaly Detection (AMAD) method stands as an innovative and potent approach. The objective of this method is to detect anomalies swi...
详细信息
Road Extraction from High-Resolution Satellite Images (HRSI) plays a significant role in the analysis of the remote sensor image field. The extraction of road automatically labels a road's pixels in a satellite im...
详细信息
作者:
Elamrani, LobnaMoughit, MohamedResearch Team
LASTI: Laboratory Science and Technology for Engineering Transmission and Communication of Information Department Sultan Moulay Slimane University Beni Mellal Khouribga Morocco
Virtual Reality and Augmented Reality offering new avenues for enhancing learning experiences. This research investigates the potential of VR and AR to enrich education, catering to a wide spectrum of learners from el...
详细信息
The lungs CT scan is used to visualize the spread of the disease across the lungs to obtain better knowledge of the state of the COVID-19 *** diagnosing of COVID-19 disease is a complex challenge that medical system f...
详细信息
The lungs CT scan is used to visualize the spread of the disease across the lungs to obtain better knowledge of the state of the COVID-19 *** diagnosing of COVID-19 disease is a complex challenge that medical system face during the pandemic *** address this problem,this paper proposes a COVID-19 image enhancement based on Mittag-Leffler-Chebyshev polynomial as pre-processing step for COVID-19 detection and *** proposed approach comprises the MittagLeffler sum convoluted with Chebyshev *** idea for using the proposed image enhancement model is that it improves images with low graylevel changes by estimating the probability of each *** proposed image enhancement technique is tested on a variety of lungs computed tomography(CT)scan dataset of varying quality to demonstrate that it is robust and can resist significant quality *** blind/referenceless image spatial quality evaluator(BRISQUE),and the natural image quality evaluator(NIQE)measures for CT scans were 38.78,and 7.43 *** to the findings,the proposed image enhancement model produces the best image quality ***,this model considerably enhances the details of the given datasets,and it may be able to assist medical professionals in the diagnosing process.
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
暂无评论