Worldwide, breast cancer is becoming the most serious illness that affects women. It is believed that early diagnosis and treatment of breast cancer can increase survival rates and decrease the need for surgery. Machi...
详细信息
Ridesharing systems have become an important part of urban transportation. At the same time, electric vehicle (EV) adoption is also growing at a fast pace as an eco-friendly and sustainable transportation option. To o...
详细信息
Music surrounds us, and there is no denying that music in visual media can shape and evoke emotions. Yet, understanding how musical preference influences emotions through audio and visual stimuli remains an important ...
详细信息
This study addresses the critical issue of child abuse in digital communications by developing advanced machine learning and deep learning models for detecting child abusive texts in the Bengali language on online pla...
详细信息
Deepfake technology, known for its ability to produce convincingly face-swapped videos, presents significant risks to privacy, security, and public trust. Misuse of this technology for spreading misinformation, defama...
详细信息
A CAPTCHA is used to reduce the misuse in the case of rising automated bots or software systems and also to avoid any corruption of the web services. The Captcha is used as solving a turing test problem by the users, ...
详细信息
With the growing adoption of electric vehicles (EVs) as an eco-friendly and sustainable means of transportation, availability of adequate EV charging infrastructure has become very important. While fixed charging stat...
详细信息
Credentials are one of the most important things to prove oneself in modern society. As the world goes digital, credentials change its form from paper to digital. However, digital data are easy to be forged and to be ...
详细信息
This article explores how the Alpha-x framework can improve network robustness under Nakagami-m fading and co-channel interference (CI), The study evaluates network performance using key metrics such as outage probabi...
详细信息
Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection ba...
详细信息
暂无评论