Found 4,132 presentations matching your search
Ponzi schemes deceive investors with promises of high returns, relying on funds from new investors t...
We present EdgeShield, a lightweight pipeline that streamlines internet of medical things (IoMT) tra...
As universities strive to improve teaching quality and enhance the overall learning experience, stud...
Abstract: There has been an increasing demand on marine transportation and traveling, since the voya...
The precision coconut harvesting system aims to develop an efficient system for accurately detecting...
Robotic harvesting in agriculture is an effective method for producing healthy fruit, reducing costs...
Machine Learning: An In-Depth Exploration Introduction Machine learning (ML) is a subfield of artifi...
Apple, a nutrient-rich fruit belonging to the genus Malus, is recognized for its fiber, vitamins, an...
In this study, we explore the application of Generative AI (Gen AI) in enhancing interest rate model...
This paper explores the application of a semi-automatic technique using spiking neural network (SNN)...
This report presents my M.Tech Final Year Mid-Semester Project on the implementation of an EEG-based...
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2025/10/introd...
AML is one type of cancer of the blood and spinal cord. AML has a number of subtypes including M0 an...
Discover how AI-powered automation revolutionizes back-office operations in today’s fast-paced bus...
ta Analysis (EDA) EDA is a critical step in understanding the data and identifying patterns, trends...
A digital twin in Unity 3D powers this project, mirroring a three-wheeled line-follower robot to ref...
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/09/practi...
Brain tumors are a significant health challenge requiring precise diagnostic methods for optimal pat...
Achieving high predictive accuracy while utilizing a minimal yet highly relevant set of features rem...
In classification problems, mislabeled data can have a dramatic effect on the capability of a traine...
The recent development of automated code generation is an expanding area of investigation within the...
One of the first uses of ensemble methods was the bagging technique. This technique was developed to...
The incorporation of Artificial Intelligence (AI), especially deep learning models, into cybersecuri...
The wireless sensor network (WSN) has received significant recognition for its positive impact on en...