Images taken in low-light conditions would have insufficient light intensity and high noise. Many existing methods could not work very well in low-light environments, such as the noise and artifacts in dark conditions...
详细信息
Disaster management is the need of the hour in countries like India, where Information science in still in its developing stage. In order to address this issue, a survey on works related to disaster management in the ...
详细信息
Dear editor,Image super-resolution(SR) uses image processing methods to increase the resolution of the image without increasing any hardware cost. Remote sensing images with high spatial resolution contain rich imager...
Dear editor,Image super-resolution(SR) uses image processing methods to increase the resolution of the image without increasing any hardware cost. Remote sensing images with high spatial resolution contain rich imagery information, which can be utilized for object detection, building segmentation, building extraction, change detection, and so on.
The implementation of Smart Patrolling System using IoT is to provide a safety to the people those who are present in the area by the help of fixing a Sound Sensor, Ultrasonic sensor, Raspberry pi, Node MCU, Night vis...
详细信息
In the era of informatics, the effectiveness of machine learning models is compromised due to the challenge of dimensionality in the data. The presence of redundant and irrelevant features significantly increases comp...
详细信息
Biomedical image analysis plays a crucial role in the early and accurate diagnosis of diseases, significantly impacting patient outcomes. This study presents an innovative approach to biomedical image analysis by inte...
详细信息
Cloud environments enhance diffusion model efficiency but introduce privacy risks, including intellectual property theft and data breaches. As AI-generated images gain recognition as copyright-protected works, ensurin...
详细信息
The vulnerability of deep learning to adversarial attacks has brought many security risks to its development. However, the currently proposed adversarial attack detection methods are ineffective in defending large-siz...
详细信息
In the polygram substitution, one set of characters is replaced by another set based on algorithm. The model is proposed for calculating and estimating secure online secret shares, where dynamic modification in any of...
详细信息
Traditional information retrieval metrics such as precision, recall, and F-measure assess document relevance but fail to capture the stability of search rankings. Search engines frequently update their algorithms, lea...
详细信息
暂无评论