The context of recognizing handwritten city names,this research addresses the challenges posed by the manual inscription of Bangladeshi city names in the Bangla *** today’s technology-driven era,where precise tools f...
详细信息
The context of recognizing handwritten city names,this research addresses the challenges posed by the manual inscription of Bangladeshi city names in the Bangla *** today’s technology-driven era,where precise tools for reading handwritten text are essential,this study focuses on leveraging deep learning to understand the intricacies of Bangla *** existing dearth of dedicated datasets has impeded the progress of Bangla handwritten city name recognition systems,particularly in critical areas such as postal automation and document ***,no prior research has specifically targeted the unique needs of Bangla handwritten city name *** bridge this gap,the study collects real-world images from diverse sources to construct a comprehensive dataset for Bangla Hand Written City name *** emphasis on practical data for system training enhances *** research further conducts a comparative analysis,pitting state-of-the-art(SOTA)deep learning models,including EfficientNetB0,VGG16,ResNet50,DenseNet201,InceptionV3,and Xception,against a custom Convolutional Neural Networks(CNN)model named“Our CNN.”The results showcase the superior performance of“Our CNN,”with a test accuracy of 99.97% and an outstanding F1 score of 99.95%.These metrics underscore its potential for automating city name recognition,particularly in postal *** study concludes by highlighting the significance of meticulous dataset curation and the promising outlook for custom CNN *** encourages future research avenues,including dataset expansion,algorithm refinement,exploration of recurrent neural networks and attention mechanisms,real-world deployment of models,and extension to other regional languages and *** recommendations offer exciting possibilities for advancing the field of handwritten recognition technology and hold practical implications for enhancing global postal services.
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a...
详细信息
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such as ensuring security,compatibility,standardization,performance,privacy,and increasing user *** significantly impacts network security,including better end-user privacy and security,challenges for network security professionals,increasing usage of encrypted malware communication,and difficulty adapting DNS-based security ***,it is important to understand the impact of DoH on network security and develop newprivacy-preserving techniques to allowthe analysis of DoH traffic without compromising user *** paper provides an in-depth analysis of the effects of DoH on *** discuss various techniques for detecting DoH tunneling and identify essential research challenges that need to be addressed in future security ***,this paper highlights the need for continued research and development to ensure the effectiveness of DoH as a tool for improving privacy and security.
In recent decades ballistocardiography (BCG) has regained popularity as a way to measure the mechanical activ- ity of the heart. In this paper we present and evaluate a new iteration of our mobile BCG measurement syst...
详细信息
WSN security is a current area of research for many scientists. One of the best security tools for defending the network from malicious assaults or the unauthenticated access is IDS. In this article, we suggest an opt...
详细信息
Wearable devices for arrhythmia diagnosis are battery-powered and require improved power efficiency. In our previous study, we applied approximate computing, which is effective for power reduction, to QRS identificati...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
The Indonesian republic police have provided services to the community by facilitating reporting via WhatsApp. However, messages sent through WhatsApp require manual identification to determine the type of offense rep...
详细信息
In the context of online news outlets like Twitter, our work gives a summary of the situation as of rumor identification utilizing visual content. The majority of studies in the literature use visual content to illust...
详细信息
To address the need for summarizing and extracting information efficiently, this paper highlights the growing challenge posed by the increasing number of PDF files. Reading lengthy documents is a tedious and time-cons...
详细信息
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut...
详细信息
暂无评论