Abstract: Pothole is a large fissure while the vehicles are on the roadways. The potholes usually lead to underneath caverns and pits in the road to make it difficult to ride. If the vehicles are ...
Abstract: Malware classification m ethods a re o ften costly, requiring constant retraining and large amounts of computing power in order to support large models that analyze software in numerous ways ...
Abstract: Pneumatic control valves play a crucial role in process industries by controlling the flow of fluids in pipelines based on control signals, typically between 4-20 mA. They regulate key ...
Abstract: In remote sensing (RS), convolutional neural networks (CNNs) are well-recognized for their spatial–spectral feature extraction capabilities, whereas vision transformers (ViTs), which ...
Abstract: In response to the growing demand of authenti-cating wireless devices in a large pool of internet of things (IoT) network, a convolutional neural network (CNN) has proposed to identify Wi-Fi ...
Abstract: Correct determination of blood group is necessary for emergency, legal proceedings, and discharge. Traditional methods depend on taking blood samples, which might not be suitable during ...
Abstract: The fast growth of internet and communications networks has drastically enhanced data transport, allowing tasks like Speech Emotion Recognition (SER), an essential aspect of human-computer ...
Abstract: The phenomenon of driver drowsiness constitutes a critical determinant in the incidence of road traffic accidents, resulting in numerous injuries and fatalities on a global scale. The ...
Abstract: Drowsy driving being one of the most significant risks to road safety, results in numerous fatal road mishaps across the globe. Casualties and mental trauma haunt the affected individuals ...
Editor’s Note: The Trump administration has clarified that it will use Section 32 tariff revenue, which typically supports child nutrition programs, to extend funding for WIC during the shutdown — ...
Abstract: With the proliferation of social media platforms, where users are free to express themselves and share content, the detection of fake news in text has become an important issue. The ...
Abstract: Cyberattacks have grown into enduring threats, demanding advanced measures to secure vital data and systems. Although firewalls provide basic traffic filtering, they often fall short against ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results