Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security challenges and solutions using healthcare cloud computing
Cloud computing is among the most beneficial solutions to digital problems. Security is one
of the focal issues in cloud computing technology, and this study aims at investigating …
of the focal issues in cloud computing technology, and this study aims at investigating …
Gait recognition based on deep learning: a survey
In general, biometry-based control systems may not rely on individual expected behavior or
cooperation to operate appropriately. Instead, such systems should be aware of malicious …
cooperation to operate appropriately. Instead, such systems should be aware of malicious …
Analysis of artificial intelligence-based technologies and approaches on sustainable entrepreneurship
BB Gupta, A Gaurav, PK Panigrahi, V Arya - Technological Forecasting and …, 2023 - Elsevier
Research in the field of entrepreneurship has grown dramatically in the last decade and
currently covers a wide variety of topics and concerns. Development in the field of artificial …
currently covers a wide variety of topics and concerns. Development in the field of artificial …
A detection algorithm for cherry fruits based on the improved YOLO-v4 model
R Gai, N Chen, H Yuan - Neural computing and applications, 2023 - Springer
Abstract" Digital" agriculture is rapidly affecting the value of agricultural output. Robotic
picking of the ripe agricultural product enables accurate and rapid picking, making …
picking of the ripe agricultural product enables accurate and rapid picking, making …
Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model
Cyber–physical system (CPS) is the incorporation of physical processes with processing
and data transmission. Cybersecurity is a primary and challenging issue in healthcare due …
and data transmission. Cybersecurity is a primary and challenging issue in healthcare due …
Face recognition systems under morphing attacks: A survey
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …
systems increases their vulnerability against attacks. In particular, the attacks based on …
Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission
With the development of telemedicine diagnosis technology, the collection, storage, and
transmission of medical data has become a pivotal problem. To solve these problems, in …
transmission of medical data has become a pivotal problem. To solve these problems, in …
A novel chaotic image encryption technique based on multiple discrete dynamical maps
The propagation of information over insecure communication system is one of the most
important aspect of digitally advance era. The electronic information is travels in form of …
important aspect of digitally advance era. The electronic information is travels in form of …
Convergence of blockchain and IoT for secure transportation systems in smart cities
Smart cities provide citizens with smart and advanced services to improve their quality of life.
However, it has been observed that the collection, storage, processing, and analysis of …
However, it has been observed that the collection, storage, processing, and analysis of …
[HTML][HTML] Deep face recognition using imperfect facial data
Today, computer based face recognition is a mature and reliable mechanism which is being
practically utilised for many access control scenarios. As such, face recognition or …
practically utilised for many access control scenarios. As such, face recognition or …