Many application from the bee colony health state monitoring could be efficiently solved using a computer vision techniques. One of such challenges is an efficient way for counting the number of incoming and outcoming...
详细信息
Many application from the bee colony health state monitoring could be efficiently solved using a computer vision techniques. One of such challenges is an efficient way for counting the number of incoming and outcoming bees, which could be used to further analyse many trends, such as the bee colony health state, blooming periods, or for investigating the effects of agricultural spraying. In this paper, we compare three methods for the automated bee counting over two own datasets. The best performing method is based on the ResNet-50 convolutional neural network classifier, which achieved accuracy of 87% over the BUT1 dataset and the accuracy of 93% over the BUT2 dataset.
—This paper introduces MAVEN (Multi-modal Attention for Valence-Arousal Emotion Network), a novel architecture for dynamic emotion recognition through dimensional modeling of affect. The model uniquely integrates vis...
详细信息
In modern era where software development is of vital importance, software developers are challenged with conditions like Repetitive Strain Injury (RSI) which hinders their ability to work effectively. Furthermore, peo...
详细信息
Applying Machine Learning (ML) models for Arabic text classification is a growing research field that has recently raised a large number of research. Generally, classifying text involves selecting a category based on ...
详细信息
With the advent of state-of-art technologies,the Telecare Medicine Information System(TMIS)now offers fast and convenient healthcare services to patients at their ***,this architecture engenders new risks and challeng...
详细信息
With the advent of state-of-art technologies,the Telecare Medicine Information System(TMIS)now offers fast and convenient healthcare services to patients at their ***,this architecture engenders new risks and challenges to patients'and the server's confidentiality,integrity and *** order to avoid any resource abuse and malicious attack,employing an authentication scheme is widely considered as the most effective approach for the TMIS to verify the legitimacy of patients and the ***,several authentication protocols have been proposed to this *** recently,Chaudhry et *** that there are vulnerabilities of impersonation attacks in Islam et al.'s ***,they introduced an improved protocol to mitigate those security ***,Qiu et *** that these schemes are vulnerable to the man-in-the-middle,impersonation and offline password guessing ***,they introduced an improved scheme based on the fuzzy verifier techniques,which overcome all the security flaws of Chaudhry et al.'s ***,there are still some security flaws in Qiu et al.'s *** this article,we prove that Qiu et al.'s protocol has an incorrect notion of perfect user anonymity and is vulnerable to user impersonation ***,we introduce an improved protocol for authentication,which reduces all the security flaws of Qiu et al.'s *** also make a comparison of our protocol with related protocols,which shows that our introduced protocol is more secure and efficient than previous protocols.
This article aims to detect Mars craters for the geological research and planetary research. The main method is to use deep learning method to identify craters on Mars using Mars TIR images. YOLOv5 is chosen as the ba...
详细信息
Despite software startups often not handlingsensitive data, the implementation of robust security measures is crucial to mitigate significant financial and reputational risks. This study investigates the cost-benefit ...
详细信息
ISBN:
(数字)9798350378511
ISBN:
(纸本)9798350378528
Despite software startups often not handlingsensitive data, the implementation of robust security measures is crucial to mitigate significant financial and reputational risks. This study investigates the cost-benefit analysis of implementing best practices in penetration testing (Pentest) versus notimplementing them, using Roboost as a case study. It emphasizes that proactive security investments not only protect current assets but also prepare organizations for future growthThe research employs a mixed-methods approach, combining quantitative analysis of financial data with qualitative insights from stakeholder interviews. The findings indicate that while the initial costs of hiring penetration testers and implementing security protocols are substantial, the benefits far outweigh these expenses. Securing new clients and retaining existing ones, which constitute a significant portion of Roboost’ s revenue, underscores the financial prudence of these investments. Our analysis demonstrates that the costs of not implementing security practices, such as potential losses from security breaches, are substantially higher than the investments in proactive measures. This underscores the critical importance of embedding security best practices within organizational frameworks to ensure long-term sustainability and success.
The retinal nerve fiber layer (RNFL) is the white scratch part in the fundus image. It could be an indicator of several diseases characterized by depletion of RNFL. This study intends to construct an RNFL method using...
详细信息
Advanced technology such as microrobots and nanorobots have the potential to completely transform the healthcare industry. These tiny robotic devices provide fine control for a range of biological applications since t...
详细信息
ISBN:
(数字)9798350369748
ISBN:
(纸本)9798350369755
Advanced technology such as microrobots and nanorobots have the potential to completely transform the healthcare industry. These tiny robotic devices provide fine control for a range of biological applications since they operate at the micro and nanoscales. This review explores the various healthcare uses, fabrication ideas, and design concepts of microrobots and nanorobots. It specifically looks at their works in tissue engineering, minimally invasive surgery, and targeted drug administration. Aiming to harness the transformative impact of these emerging technologies in healthcare, research and practitioners can recive significant insights from the discussion of challenges and future directions in the sector. Design-wise, microrobots and nanorobots display a range of configurations suited to particular uses, such as payload delivery systems, sensing capabilities, and propulsion mechanisms.
The rapid expansion of electric vehicle (EV) charging infrastructure has introduced significant vulnerabilities to cyber-physical threats, raising concerns about the resilience of both charging and smart power grid sy...
详细信息
暂无评论