The practice of cutting and pasting portions of one image into another, known as “image splicing,” is commonplace in the field of image manipulation. Image splicing detection using deep learning has been a hot resea...
详细信息
The self-attention architecture is also considered to be a significant contribution in sequence processing tasks. It has the ability to highlight the distinctive features of a sequence, has been very successful in nat...
详细信息
This paper uses semantic web and ontology techniques to predict the risk analysis of patients with diabetes mellitus. The data is collected from patients through personal interaction and by accessing their previous me...
详细信息
During the last hit of Coronavirus disease (COVID-19), all the countries were troubled by as they were not ready for, thus many serious consequences had popped up to the social, economic, and health aspects of our liv...
详细信息
With the rapid development of deep learning in the field of computer vision, the performance of core vision tasks such as image recognition has achieved significant improvement. In nighttime environment, due to the lo...
详细信息
A novel “Hybrid Parallel Architecture Integrating FFN, 1D CNN, and LSTM” is presented to enhance wildfire prediction capabilities in Morocco. Utilizing the “Morocco Wildfire Predictions: 2010–2022 ML Dataset...
详细信息
Natural language processing is a rapidly evolving technology in an era of quick technological growth. Conventional rule-based methods are insufficient to meet the demands of today's complex challenges. One of the ...
详细信息
Segmentation of brain tumors aids in diagnosing the disease early, planning treatment, and monitoring its progression in medical image analysis. Automation is necessary to eliminate the time and variability associated...
详细信息
It has been observed that individuals prefer to favour information that strengthens their beliefs or values, while information that contradicts them causes unpleasant feelings and is more likely to be ignored. This is...
详细信息
This paper investigates covert communications in a multi-relay Internet of Things (IoT) system with multiple energy harvesting jammers, where a transmitter (Alice) attempts to covertly transmit confidential messages t...
详细信息
暂无评论