Blockchain has become the most revolutionary and trending technology since 2008 with the development of Bitcoin. Besides bitcoin, blockchain can be applied in different sectors, such as finance, healthcare, IoT, secur...
详细信息
To detect Parkinson's disease, we compare the effectiveness of K-Nearest Neighbors (KNN), Logistic Regression (LR), Support Vector Machines (SVM), and Random Forest (RF) algorithms. Utilizing a dataset with clinic...
详细信息
Chronic diseases present a significant challenge in healthcare, often requiring ongoing medical attention and posing limitations on patients' daily activities. Diagnosis of such diseases is hindered by the absence...
详细信息
Telexistence refers to various technologies that enable a high sense of embodiment and interaction capabilities with remote environments. Although numerous telexistence systems have been explored in previous works of ...
详细信息
Many species around the globe heavily depend on flowers, and even the use of flowers for medical purposes is enormous, which has been in practice since ancient times. In modern botany, agronomy, and species research, ...
详细信息
In this work, we classified the wireless internet of things (IoT) traffic of the IoT Health intensive care unit (IHI) dataset which belongs to three general classes: patient monitoring, environment monitoring, and net...
详细信息
Effective monitoring of the environment over a large area will require mobilization of a considerable amount of information. Otherwise, the use of traditional methods will prove to be costly and would take up so much ...
详细信息
Modifying an algorithm that has been established over many years and making it even faster has always been a fascinating and challenging area in the field of algorithms, which motivated us to take the challenge of imp...
详细信息
Object detection in surveillance systems leverages advanced deep learning techniques to enhance security measures through real-time analysis of dynamic video feeds. This project integrates the YOLOv5 model for detecti...
详细信息
In this paper, we study the multi-layered security approaches for cooperative relay networks against passive eavesdropping adversaries. Specifically, we investigated physical layer approaches (i.e., beamformed and art...
详细信息
暂无评论