Category: 7. Maths

Continue Reading

  • Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction

    Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction

    In this section, we discuss the detailed methodologies used in the proposed hash algorithm, which is based on the combination of the CA and Sponge Functions. We divide the methodology into subsections, each covering a crucial aspect of algorithm…

    Continue Reading

  • Significance and classification of AI-driven techniques in telecommunication sectors based on interval-valued bipolar fuzzy soft aggregation operators

    Significance and classification of AI-driven techniques in telecommunication sectors based on interval-valued bipolar fuzzy soft aggregation operators

    This section introduces new aggregation operators called IVBPFSWAA aggregation operators. Moreover, we elaborate on some basic characteristics of these AOs.

    Operational Laws for interval-valued bipolar fuzzy soft numbers

    Continue Reading

  • The intelligent development and preservation of folk sports culture under artificial intelligence

    The intelligent development and preservation of folk sports culture under artificial intelligence

    Analysis of the principles of cyclegan

    With the rapid progress of AI technology, GAN has been widely applied in many fields such as image generation, style transfer, and image enhancement. Compared with traditional deep learning methods, GAN can…

    Continue Reading

  • Optimizing diabetic retinopathy detection with electric fish algorithm and bilinear convolutional networks

    Optimizing diabetic retinopathy detection with electric fish algorithm and bilinear convolutional networks

    In this section, a detailed explanation of the research work, along with its mathematical expressions, is provided. Figure 1 illustrates the workflow of the study.

    Fig. 1

    Workflow of the proposed approach.

    Dataset description

    Our study’s dataset…

    Continue Reading