Floods remain a persistent threat to human lives and infrastructure. Identifying flood-impacted houses in drone imageries will support the rescue teams to prioritize rescue operations in highly affected areas. This st...
详细信息
Dealing with missing data is necessary to develop a solid predictive medical research model. This work presents a hybrid dynamic imputation method devoted to addressing the challenge of missing data, specifically focu...
详细信息
The Cloud-based Water Parameter Monitoring System leverages cloud and IoT technologies for the precise monitoring of water quality across various water bodies. In Bangladesh, fish is a vital dietary component, consume...
详细信息
Real-time object identification applications are using methods for image processing more and more as a result of advancements in computer technology. Results for pedestrian identification were improved by the use of d...
详细信息
The widespread increase of photovoltaic panels in the distribution grid often leads to overvoltage. Traditional voltage regulation techniques are unfair for prosumers at the sensitive part of the grid due to larger po...
详细信息
Improving PICU patient outcomes after a cardiac arrest (CA) requires an accurate and timely prognosis. The purpose of this study is to concentrate on the use of machine learning (ML) approaches for the prediction of c...
详细信息
Weeds are problems for crop yields because they exert harmful effects on the yields by competing with cultivated crops for necessary resources like nutrients, sunlight, and soil. As a result, continual attempts are be...
详细信息
Data mining technology plays a crucial role in the area of data analysis. Mining frequent episodes stands out as a pivotal task within this domain, enabling users to forecast future events based on present occurrences...
详细信息
Garbage collection is a fundamental aspect of Java Virtual Machine (JVM) memory management, and choosing the optimal garbage collector is essential for attaining optimal application performance. In this work, we condu...
详细信息
The detection of reconnaissance attacks is crucial for safeguarding Internet of Things (IoT) environments, which are inherently more vulnerable and resource-constrained compared to traditional computing systems. Tradi...
详细信息
暂无评论