Machine learning techniques enable systems to learn Important representations from input Image data. Convolutional neural networks (CNNs) are a specific implementation of …
Honey encryption is a technique to protect private data once it is put on the network. The techniques used earlier include password-based encryption techniques which seldom …
S Bhalla, A Kumar, R Kushwaha - Multimedia Tools and Applications, 2024 - Springer
Abstract Marine Object Detection, leveraging computer vision, plays a vital role in detecting objects in marine environments ranging from marine organisms to marine surveillance …
Generally, it is possible to increase agricultural output while decreasing the time required for human oversight by automating routine tasks. In this work, the Internet of things (IoT) played …
Traffic catastrophes are considered most stern public health and economic apprehension universally. The leading cause of bereavement and fatality of adolescents is road …
Emotionally Intelligent workers are capable of controlling, express their feelings, and discern individuals' attitudes. Inside companies, mangers work with their employees for the future in …
Counterfeiting is a global international phenomenon that is steadily growing because of globalization. Furthermore, exchanges between various countries and cultures are …
Data Analytics is scientificas well as statistical tool for analyzing unrefined data to refurbish information for acquiring knowledge. It is a discipline that arises to meet the needs for …
B Cheng, C Li, T Ji, Y Zhao, K Gao, J Hao, W Xu - Nano Energy, 2024 - Elsevier
To develop skin-like tactile sensor systems with both self-healing ability of repairing mechanical damage and perception ability of identifying materials and objects is …