The human vision system is mimicked in the format of videos and images in the area of computer vision. As humans can process their memories, likewise video and images can be processed and perceptive with the help of computer...
The human vision system is mimicked in the format of videos and images in the area of computer vision. As humans can process their memories, likewise video and images can be processed and perceptive with the help of computer...
Consumer-deviant behavior costs global utility firms USD 96 billion yearly, attributable to Non-Technical Losses (NTLs). NTLs affect the operations of power systems by overloading lines and transformers, resulting in voltage...
With the upsurge in restructuring of the power markets, wind power has become one of the key factors in power generation in the smart grids and gained momentum in the recent years. The accurate wind power forecasting is highly...
A smart healthcare sensor cloud is an amalgamation of the body sensor networks and the cloud that facilitates the early diagnosis of diseases and the real-time monitoring of patients. Sensitive data of the patients which are...
It has been seen that in the last one decade, AI/ML/DL has been considered a core research area in healthcare as we know that kidney is one among the important internal body organs helps in regulation of the fluid within the...
Dementia is a brain disorder that causes loss of memory leading to disruption in the normal course of life of an individual. It is emerging as a global health problem in adults with age 65 years or above. Early diagnosis of...
An autoencoder has the potential to overcome the limitations of current intrusion detection methods by recognizing benign user activity rather than differentiating between benign and malicious activity. However, the line...
Trust-based mechanisms are widely used in wireless networks of different kinds for providing security against attack. Trust mechanism provides security from various attacks using both detective and preventive manner. This paper...
This paper is proposing an IoT-based camera surveillance system. The objective of research is to detect suspicious activities by camera automatically and take decision by comparing current frame to previous frame. Major...
The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is explored as a theoretical background to build extended UTAUT2 model with relevant variables for examining the cloud storage services technology acceptance at...
Portable interfaced robot arms equipped with mobile user interactions are significantly being utilized in modern world. The application of teaching robotics is being used in challenging pandemic situation but it is still...
Unruptured intracranial aneurysms (UIA) are common in the adult population, but only a relatively small proportion will rupture. It is therefore essential to have accurate estimates of rupture risk to target...