In this paper, we have utilized deep learning approaches to detect cloud intrusion for the Internet of Things (IoT). The emerging growth of IoT and cloud environments has revolutionized many industries by allowing rea...
详细信息
In contemporary society, Suicide has become a notable concern within the realm of public health. Suicidal ideation (SI) encompasses thoughts about ending one's life. Factors contributing to suicidal thoughts and a...
详细信息
As language models are often deployed as chatbot assistants, it becomes a virtue for models to engage in conversations in a user's first language. While these models are trained on a wide range of languages, a com...
详细信息
An evaluation method of seaquake response of pontoon-type offshore wind turbines using stationary random vibration theory is presented. Seabed motion in the vertical direction due to an earthquake is modeled as a stat...
详细信息
With the growing use of digital devices and technologies, the volume of digital forensic evidence in need of analysis also increases. This results in a need for more effective methods to conduct analysis of this evide...
详细信息
Breast cancer is a prevalent and potentially fatal malignancy in women, requiring continual improvements in diagnostic techniques. In order to help medical personnel accurately detect dangerous tumors, automated medic...
详细信息
Dehazing underwater images is crucial for several underwater applications, including marine biology, exploration, and monitoring. Because of colour distortion, light attenuation, and scattering, underwater imaging pre...
详细信息
Autism Spectrum Disorder is a neuro-development behavioural disorder that is classified as a chronic disability leaving individuals unable to accurately grasp their environment and can lead to limited development of c...
详细信息
Voice Cloning employs technology and algorithms to create an artificial or synthetic reproduction of a person's voice. To understand and mimic the distinct vocal qualities of the target speaker, including tone, pi...
详细信息
There are many deepfake detection models available, each with their own limitations. This research concentrates on one such limitation and addresses it. That research gap would be the inefficient behavior of the deepf...
详细信息
暂无评论