With the development of advanced communication ensuring the secure transmission of images has become more and more important. This research suggests a novel approach for digital image encryption and decryption that co...
详细信息
This research addresses the challenging task of vitiligo detection within facial images through the lens of Deep Reinforcement Learning (DRL). Leveraging the Skin Disease dataset from Kaggle, our study focuses on the ...
详细信息
Benefited from their flexibility and on-demand deployment capability, unmanned aerial vehicles (UAVs) have emerged as critical aerial communication platforms in future Internet of Vehicles (IoV). However, limited spec...
详细信息
Dynamic Source Routing (DSR) protocol is mostly used in the wireless mesh network, where all the nodes are in a mesh topology, it is also used in Mobile ad-hoc Networks (MANETs). As it is in mesh topology that the com...
详细信息
Video synopsis is a technique that condenses surveillance videos into compact equivalent videos. The objective of this paper is to identify and group related moving objects (also referred to as tubes) in a video using...
详细信息
In the domain of mobile security, particularly in APK (Android Application Package) malware detection, ensuring robust threat identification is critical for safeguarding user devices and sensitive data. This study add...
详细信息
Healthcare monitoring systems have improved with the Internet of Things and machine learning prediction models. Traditional batch machine-learning approaches cannot generate an effective model since most data will be ...
详细信息
This study provides a novel method to generate a compiler, which translates a program using TINY language. TINY language is a simple programming language which is designed to understand the basic concepts of compiler....
详细信息
Ocular disorders are one of the severe eye disease The proposed system is to design and develop an automated system which captures the patient's eye image and uses the benefits of Convolutional Neural Networks (CN...
详细信息
In recent years communication through image has evolved so much that we must make sure that secret message stages should not be leaked. Hence the use of compression-encryption algorithms is of utmost necessity. In thi...
详细信息
暂无评论