To assess the wind power potential of a specific wind site, a suitable distribution function that best suits the wind data needs to be known. In this study, we employ four probability density functions (PDFs), namely ...
详细信息
This Paper discusses the growing popularity of online medical diagnosis as an alternative to traditional doctor visits. It highlights the limitations of existing tools and emphasizes the advantages of using ChatGPT, w...
详细信息
This study focuses on the challenge of developing abstract models to differentiate various cloud resources. It explores the advancements in cloud products that offer specialized services to meet specific external need...
详细信息
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword...
详细信息
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,swords ***,automatic weapons detection is a vital requirement now a *** current research is concerned about the real-time detection of weapons for the surveillance cameras with an implementation of weapon detection using Efficient–*** time datasets,from local surveillance department’s test sessions are used for model training and *** consist of local environment images and videos from different type and resolution cameras that minimize the *** research also contributes in the making of Efficient-Net that is experimented and results in a positive *** results are also been represented in graphs and in calculations for the representation of results during training and results after training are also shown to represent our research ***-Net algorithm gives better results than existing *** using Efficient-Net algorithms the accuracy achieved 98.12%when epochs increase as compared to other algorithms.
Enterprise Resource Planning (ERP) is a business system that supports most of the critical processes of a company. It helps maintain a unified and reliable repository of information for decision-making. Implementing a...
详细信息
Enterprise Resource Planning (ERP) is a business system that supports most of the critical processes of a company. It helps maintain a unified and reliable repository of information for decision-making. Implementing an ERP is a complex project, which implies a high level of effort and investment. Although the methodologies provided by the leading ERP providers are beneficial, there is still a high failure rate in the implementation. Many authors have analyzed the factors and causes of these implementation failures. There is also research to propose new implementation models that replace the existing ones. However, there is little research on existing methodologies incorporating new concepts from other disciplines to improve them. In this research, we propose a model that complements the current methodologies and uses the best practices in project management and software engineering directly related to the issues found in the literature. We submitted it to a group of experts on the subject to validate the model based on the Delphi method.
Cloud systems are tools and software for cloud computing that are deployed on the Internet or a cloud computing network,and users can use them at any *** assessing and choosing cloud providers,however,customers confro...
详细信息
Cloud systems are tools and software for cloud computing that are deployed on the Internet or a cloud computing network,and users can use them at any *** assessing and choosing cloud providers,however,customers confront the variety and difficulty of quality of service(QoS).To increase customer retention and engagement success rates,it is critical to research and develops an accurate and objective evaluation *** is the emerging environment for distributed services at various *** to the benefits of this environment,globally cloud is being taken as a standard environment for individuals as well as for the corporate sector as it reduces capital expenditure and provides secure,accessible,and manageable services to all stakeholders but Cloud computing has security challenges,including vulnerability for clients and association acknowledgment,that delay the rapid adoption of computing *** of resources in the Cloud is difficult because resources provide numerous measures of quality of *** this paper,the proposed resource allocation approach is based on attribute QoS Scoring that takes into account parameters the reputation of the asset,task completion time,task completion ratio,and resource *** article is focused on the cloud service’s security,cloud reliability,and could *** this paper,the machine learning algorithm neuro-fuzzy has been used to address the cloud security issues to measure the parameter security and privacy,trust *** findings reveal that the ANFIS-dependent parameters are primarily designed to discern anomalies in cloud security and features output normally yields better results and guarantees data consistency and computational power.
In the era of informatics, the effectiveness of machine learning models is compromised due to the challenge of dimensionality in the data. The presence of redundant and irrelevant features significantly increases comp...
详细信息
Ethics incorporate the sources of human standards and values. However, there is a consistent struggle to locate both concepts of social condition and human values;and the question of what comprises counseling ethics e...
详细信息
As nations attempt to recover from the coronavirus disease (COVID-19) epidemic, digital solutions facilitate economic change and put economies on the path to green growth. Therefore, identifying an individual based on...
As nations attempt to recover from the coronavirus disease (COVID-19) epidemic, digital solutions facilitate economic change and put economies on the path to green growth. Therefore, identifying an individual based on biometric characteristics has rapidly become an urgent and essential subject. Banks, intelligence agencies, and high-profile institutions are frequently use handwritten signature verification to authenticate the identification of an individual. This paper introduces an innovative model (HSCM) for the authentication of online handwritten signatures based on the ConvMixer Network. The main idea of the proposed model is to divide the signature into several patches known as strokes, which are then processed using ConvMixer to generate signature features. These features are processed using Feed-Forward network. Experimental results on the real-world dataset show that the proposed model achieved 11.6% equal error rate (EER) compared with other competitors. This vindicates the efficacy and reliability of the proposed model in signature verification).
In this interactive and thought-provoking session, we will embark on a captivating exploration of the remarkable world of systems that have some extreme characteristics. These systems hold immense potential to benefit...
ISBN:
(数字)9783903176638
ISBN:
(纸本)9798350390605
In this interactive and thought-provoking session, we will embark on a captivating exploration of the remarkable world of systems that have some extreme characteristics. These systems hold immense potential to benefit us even in applications that confront extreme limits. While the Internet of Things (IoT) has already revolutionized our interaction with technology by connecting everyday objects to the digital world, this lecture takes us beyond conventional boundaries. We will dive deeper into the realm of extreme IoT, where we push the limits and discover how IoT can thrive and excel in environments with traditional constraints. We will explore various aspects, including crucial factors such as battery life, longevity, delay, and the challenging environmental conditions in which these systems must operate. By challenging the status quo, we uncover novel solutions that overcome these hurdles and unleash the true potential of sensors and radios. Prepare to be inspired as we present real-world examples and showcase research that demonstrates the transformative power of this field. Through this interactive session, we will, together, engage, ponder, and envision the future possibilities that lie within the realm of extreme IoT.
暂无评论