Browse Items (27 total)

25740-67766-1-PB.pdf
The field of image and 3-dimensional (3D) data segmentation is growing fast and
has many uses, like in medicine, and robotics. In this article, we explain how
computers understand and divide images and 3D data. We compare different
ways of doing…

25744-67734-1-PB.pdf
Over time, there has been a continuous surge in the demand for electrical energy, necessitating the development of larger and more intricate electrical power networks. These extensive networks pose a significant challenge, primarily in the form of…

25745-67767-1-PB.pdf
One of the most significant limitations in wireless body area network (WBAN) is the requirement for low energy usage. For this reason, several routing techniques and protocols have been put out to provide an efficient means of energy saving during…

25753-67771-1-PB.pdf
Trojan Horse is a major threat that has grown with the spread of the digital world. Data gathered through the study of memory can provide valuable insights into the Trojan Horse’s behavior patterns. Because of this, memory analysis techniques are one…

25758-67779-1-PB.pdf
This study introduces a novel e-voting system utilizing blockchain technology to address the challenges inherent to traditional voting methods. Traditional systems often suffer from inaccuracies, susceptibility to manipulation, and elevated costs.…

25840-67730-1-PB.pdf
The successful implementation of deep learning nets opens up possibilities for various applications in viticulture, including disease detection, plant health monitoring, and grapevine variety identification. With the progressive advancements in the…

25520-67999-2-PB.pdf
In this paper, a proposal is made for a cryptographic algorithm designed for passive ultra-high-frequency (UHF) radio frequency identification systems. The algorithm relies on the advanced encryption standard (AES) as its fundamental encryption…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2