Emotion recognition is an emerging field of research and modalities like images, videos, speech, text, physiological signals, and EEG are used for the same. In this work, EEG based emotion recognition has been propose...
详细信息
Active Speaker Detection is pivotal in a multitude of applications, particularly in processing live Audio-Video (AV) streams. Current implementations predominantly focus on processing saved video files, limiting their...
详细信息
Dynamic Source Routing (DSR) protocol is mostly used in the wireless mesh network, where all the nodes are in a mesh topology, it is also used in Mobile ad-hoc Networks (MANETs). As it is in mesh topology that the com...
详细信息
Video synopsis is a technique that condenses surveillance videos into compact equivalent videos. The objective of this paper is to identify and group related moving objects (also referred to as tubes) in a video using...
详细信息
In the domain of mobile security, particularly in APK (Android Application Package) malware detection, ensuring robust threat identification is critical for safeguarding user devices and sensitive data. This study add...
详细信息
Crop yield prediction is a crucial and challenging task in agriculture due to the complex and non-linear parameters involved. It mainly depends on three fluctuating factors namely soil, weather and environment hence t...
详细信息
In today's changing world, the rise in car accidents and deaths on the road is an outcome of increasing traffic and population growth. The World Health Organization (WHO) states that a concerning 1.35 million live...
详细信息
In the rapidly evolving field of information security, video steganography offers a promising solution for concealing sensitive data within multimedia content. The proposed approach introduces a novel approach that in...
详细信息
The increasing complexity of malware requires a more thorough comprehension of how they operate. Using the MITRE ATT&CK framework, this project delves into the TrickBot and AsyncRAT malwares, offering a thorough e...
详细信息
As the cyber threats areevolving, intrusions exploit vulnerabilities in software or systems and can occur 24/7, targeting individuals and *** Intrusion detection system (IDS) is designed to help in the detection of cy...
详细信息
暂无评论