Recurrent febrile seizures are a common concern in children, often triggered by rapid changes in body temperature during fever episodes. For rapid action and care, early and accurate seizure recurrence prediction is c...
详细信息
Virtual Reality (VR) has transformed data visualization by enabling immersive and interactive experiences. CAVE (Cave Automatic Virtual Environment) systems provide a unique platform for exploring complex datasets in ...
详细信息
Electric vehicles (EVs) are surging in popularity globally, offering a greener and more energy-efficient alternative to traditional cars. Our research aims to develop an RFID based system designed to automate EV charg...
详细信息
Segmentation of anatomical structures leverages medical imaging technology for accurate diagnosis and treatment planning. Recent advances in active learning offer the opportunity for the interactive creation of artifi...
详细信息
Chest X-ray images are widely used in diagnosing medical conditions, however, due to radiologist fatigue and shortage of resources the possibility of spotting peculiarities increases. This work proposes an explainable...
详细信息
The advancement in distributed Federated Learning (FL) techniques is transforming next-generation edge computing, especially in e-Helathcare systems where data integrity and security are critical concerns. Collecting,...
详细信息
Based on image slabs and sheets, a novel kind of image steganography method for digital images has been proposed in this research work. Using the binary representation of the pixel, this approach splits the cover imag...
详细信息
ISBN:
(数字)9798331512088
ISBN:
(纸本)9798331512095
Based on image slabs and sheets, a novel kind of image steganography method for digital images has been proposed in this research work. Using the binary representation of the pixel, this approach splits the cover image into 24 fixed-size sheets. The secret message's binary counterpart is then incorporated into the cover image. It looks through each sheet's rows and columns to locate the one that most closely matches the secret message's binary counterpart. The row or column's position and how it differs from the message it stores in the LSB slab. Compared to previous ways, the proposed technique somewhat modifies the cover image.
As the technology advances, an increase in the attacks to manipulate or extract data illegally has also risen. This also includes one such attack known as Address Resolution protocol cache spoofing attack. The Address...
详细信息
The revolutionary impact of drones on delivery services encounters major challenges, such as collision with other obstacles and other drones when operating inside crowded areas. This research introduces a Collision De...
详细信息
In the rapidly evolving cryptocurrency markets, accurate price prediction is crucial for investors and traders. This task investigates the efficacy of advanced machine learning and deep learning for forecasting crypto...
详细信息
暂无评论