S Guhathakurata, S Kundu, A Chakraborty… - Data Science for COVID …, 2021 - Elsevier
An unexpected outbreak of 2019 Coronavirus disease (COVID-19) in Wuhan, China, led to a massive catastrophe across the world. The majority of the COVID-19 patients are getting …
Stress may be identified by examining changes in everyone's physiological reactions. Due to its usefulness and non-intrusive appearance, wearable devices have gained popularity in …
F Yan, S Wen, S Nepal, C Paris… - International Journal of …, 2022 - Wiley Online Library
Abstract Machine learning (ML) techniques are increasingly important in cybersecurity, as they can quickly analyse and identify different types of threats from millions of events. In spite …
Edge intelligence, network autonomy, broadband satellite connectivity, and other concepts for private 6G networks are enabling new applications for public safety authorities, eg, for …
Independent interaction between social networks and the Internet of Things (IoT) is a budding, flexible sector leading to an advantageous Social Internet of Things (SIoT) …
I Pandey, HS Dutta, JS Banerjee - 2019 3rd International …, 2019 - ieeexplore.ieee.org
Wireless Body Area Network (WBAN) is one of the type of wireless communication technologies which is used as an underlying network architecture for different types of …
Business organizations may now automate high-volume processes with the help of Robotic Process Automation (RPA), a rapidly developing automation technology that bridges the gap …
Artificial Intelligence occupies a major part in the end-to-end technology we use every day. In order to ensure and enhance security, Artificial Intelligence techniques are used in cyber …
Facial expressions consisting of various emotions play a significant role in interpersonal relations. Emotion detection from various expressions of the face can be performed broadly …