N Abbaspoor, H Hassanpour - Multimedia Tools and Applications, 2022 - Springer
Face recognition is one of the most common authentication methods. Although much research has been conducted in this area, there are still many challenging issues to be …
S Ranjan, S Sanket, S Singh, S Tyagi… - … on Computing for …, 2022 - ieeexplore.ieee.org
The recognition and extraction of text is a crucial aspect of the number plate detection process. This research work focuses on the automation of text detection and extraction. In …
C Xie, Z Cao, Y Long, D Yang, D Zhao, B Li - arXiv preprint arXiv …, 2022 - arxiv.org
Recent advances in machine learning have enabled its wide application in different domains, and one of the most exciting applications is autonomous vehicles (AVs), which …
(English) Traditional data centers consist of computing nodes that possess all the resources physically attached. When there was the need to deal with more significant demands, the …
Using a broad sample of UK firms that are required to disclose auditor materiality thresholds under the International Standards on Auditing (UK and Ireland) 700, we examine whether …
Typically, the research scholars with visual impairment (VIRS) is on a rise. But difficulty in assessing the quality research resource is the major challenge for the VIRS individuals. The …
KRT Jayasekara, M Gamage, G Ginigaddare… - ijisrt.com
In society there are two types of people some are introverts and extroverts. Introverts prefer not to be socialized much and could be shy to talk to people, but in the end, we are all …