Artificial intelligence (AI) has revolutionized healthcare by enhancing diagnostic precision, personalizing treatments, and optimizing clinical workflows. However, algorithmic biases arising from imbalanced training d...
详细信息
The uncontrolled growth of skin cells in the epidermis producing the creation of a mass termed a tumor is a dangerous condition known as skin cancer. Current developments in deep learning artificial intelligence have ...
详细信息
The exponential rise of digital material calls for the development of more sophisticated approaches to the formation of topics that guarantee semantic richness, diversity, and scalability within the content. This rese...
详细信息
Automatic speech recognition is one of the technologies that change the game regarding the transcription of spoken language to text. A new methodology combining both feature extraction methods, including the Mel-Frequ...
详细信息
The Mobile-Based Audiometry Test Assessment with Machine Learning Integration is a user-friendly application for convenient and accurate hearing health assessment. This innovative app incorporates advanced machine lea...
详细信息
This study provides an innovative architectural model for e-Health systems that aims to improve cyber resilience while maintaining high availability under fluctuating traffic loads. We examined typical cybersecurity i...
详细信息
As sports grow in popularity need for effective online turf booking applications has also increased. Although some existing applications are faced with numerous challenges such as;restrictions on access, ineffectivene...
详细信息
At present, the marine security issue includes the protection of fishers and address the rescue in case of illegal border infiltration. To detect the border for fisherman, this study conducted a method of enhancement ...
详细信息
ISBN:
(纸本)9798331508845
At present, the marine security issue includes the protection of fishers and address the rescue in case of illegal border infiltration. To detect the border for fisherman, this study conducted a method of enhancement in border detection essentially utilising the Automatic Identification System (AIS) with the assistance of the Internet of Things (IoT). In the middle sea, to provide boat detection with high precision, the proposed model incorporates Very High Frequency (VHF) communication inspired by X-band radar. The system is able to detect and monitor the boats at sea. To provide the middle sea with a high level of detection and monitoring of boats, system architecture included VHF (Very High Frequency) communication, which was inspired by the X band radar system. The range of AIS was increased using VHF communication. The coastal monitoring stations receive the position and status data from fishing boats with the help of IoT devices. The new AIS technology includes IoT-enabled devices installed on fishing boats. The IoT devices situated on boats send information to coastal monitoring station after sending data. The advanced technology increases the software capabilities of AIS, which will be helpful in the situation where the only AIS information was not enough. The advanced software capabilities improved the range of AIS and the definition capability of the vessels which were identified in the ocean near borders. The Automatic Identification System (AIS) that is being used in the present day has been upgraded and the Internet of Things (IoT) has been introduced. As a result, the system is now capable of much more comprehensive and real-time tracking and monitoring, as well as communication for marine vessels. This combination of technologies strengthens the safety, efficiency, and management of maritime operations by giving ships the Opportunity to connect and exchange data with different sensors, devices, and networks, and thus offering a more detailed and dynam
Agriculture has long been the backbone of the Indian economy, defining the country's social and cultural milieu. Some of the most common difficulties that farmers face includes selecting suitable crops for their a...
详细信息
In the developed financial services industry, identity is defined using government-issued identification cards. Nevertheless, the primary obstacles in the consolidation and authentication of these data in connection w...
详细信息
ISBN:
(数字)9798350378177
ISBN:
(纸本)9798350378177
In the developed financial services industry, identity is defined using government-issued identification cards. Nevertheless, the primary obstacles in the consolidation and authentication of these data in connection with large-scale anti-money laundering (AML) requirements have significantly increased the challenges for individuals seeking to enter the financial system. This renders it exceedingly unprofitable and a greater risk for banking systems to engage with developing economies that might lack even the most primitive forms of identification. Furthermore, the process of establishing a banking account is packed with difficulty as a result of protracted processing times, substantial report obligations, and ambiguity surrounding the utilization of confidential customer data. The objective of cash laundering is to return illegal funds to their source;therefore, money launderers typically employ robust financial structures to transport funds. Additionally, the level of money laundering activity may become more geographically concentrated as the amount of money laundered increases. For many years, the financial quarter has been working to reevaluate the concept of identity. Blockchain is an emerging computing structure that enables the integration of disparate data points from authoritative source vendors into a unified digital ledger of validated, unalterable, transparent, and cryptographically protected data. Furthermore, secrecy can be ensured by letting the appropriate person or group control how their identity is shared. A blockchain is a distributed, virtual ledger that is unchangeable and keeps track of transactions in chronological order and close to real time. In order for later transactions to be added to the ledger the community members also known also nodes, must agree on them. This establishes an ongoing management mechanism that oversees issues related to manipulation, errors, and statistics. After dispatch Information contained within a block cannot be
暂无评论