The field of image and 3-dimensional (3D) data segmentation is growing fast and
has many uses, like in medicine, and robotics. In this article, we explain how
computers understand and divide images and 3D data. We compare different
ways of doing…
Over time, there has been a continuous surge in the demand for electrical energy, necessitating the development of larger and more intricate electrical power networks. These extensive networks pose a significant challenge, primarily in the form of…
One of the most significant limitations in wireless body area network (WBAN) is the requirement for low energy usage. For this reason, several routing techniques and protocols have been put out to provide an efficient means of energy saving during…
Trojan Horse is a major threat that has grown with the spread of the digital world. Data gathered through the study of memory can provide valuable insights into the Trojan Horse’s behavior patterns. Because of this, memory analysis techniques are one…
This study introduces a novel e-voting system utilizing blockchain technology to address the challenges inherent to traditional voting methods. Traditional systems often suffer from inaccuracies, susceptibility to manipulation, and elevated costs.…
The successful implementation of deep learning nets opens up possibilities for various applications in viticulture, including disease detection, plant health monitoring, and grapevine variety identification. With the progressive advancements in the…
In this paper, a proposal is made for a cryptographic algorithm designed for passive ultra-high-frequency (UHF) radio frequency identification systems. The algorithm relies on the advanced encryption standard (AES) as its fundamental encryption…