Found 2,005 presentations matching your search
Tool-Matlab Drive database is considered for extraction of features and testing images to detect the...
Face identification is amongst the most efficacious and extensive applications in biometrics involvi...
Manufacturers and suppliers of Pulp Extraction Machineries, Bottle Filling Equipments, Fruit and Veg...
A Video Measuring System (VMS) is a cutting-edge technology designed to accurately measure the dime...
This paper proposes a framework for human action recognition (HAR) by using skeletal features from d...
This session focus on Generative AI features and Active learning modern experience with Document und...
EXTRACTION The act of extracting to some degree, particularly using effort or force called extract...
Recognition of degraded printed compound Kannada characters is a challenging research problem. It ha...
In this study, we design and analysis of artificial intelligence (AI) in indoor fire prevention and ...
YOLO (You Only Look Once) has become a leading name in real-time object detection. Its latest iterat...
An Approach to Detecting Writing Styles Based on Clustering Techniques Authors: -Devkinandan Jagtap...
Remusic is a creative platform that helps you explore your musical talents with AI. With just one cl...
Imbalanced datasets frequently occur in fields like fraud detection and medical diagnosis, where the...
Deep learning is generally used to perform remote monitoring of three dimensional (3D) printing resu...
The "Text Fetcher" mobile app stands as an innovative and versatile solution, addressing t...
Web scraping APIs are designed to help developers extract data from websites in an automated way. Th...
Deep learning has gained high popularity in the field of image processing and computer vision applic...
The UberEats API offers powerful capabilities for optimizing restaurant insights through data extrac...
Certainly! Computer vision (CV) is a field of artificial intelligence (AI) and computer science that...
This report presents my M.Tech Final Year Mid-Semester Project on the implementation of an EEG-based...
This research introduces ConvReID-Net, a custom convolutional neural network (CNN) developed for per...
The distributed denial of service (DDoS) attack occurs when massive traffic from numerous computers ...
In this paper, problems and solutions for the automatic recognition of miscellaneous materials, espe...
The Burak Field is a significant petroleum reservoir located [insert location details], discovered i...