Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Benedicta Nana Esi Nyarko"'
Publikováno v:
Journal of Plant Protection Research, Vol vol. 64, Iss No 3, Pp 265-274 (2024)
The cocoa tree is prone to diverse diseases such as stem borer, stem canker, swollen shot, and root rot disease which impedes high yield. Early disease detection is a critical component of diverse management processes that are implemented throughout
Externí odkaz:
https://doaj.org/article/ba135bf9304f4cf199ab53f8de89750f
Autor:
Benedicta Nana Esi Nyarko, Wu Bin, Jinzhi Zhou, Justice Odoom, Samuel Akwasi Danso, Gyarteng Emmanuel Sarpong Addai
Publikováno v:
Intelligent Systems with Applications, Vol 21, Iss , Pp 200303- (2024)
The abundance of digital images has been facilitated by smartphones and inexpensive storage. Digital forensic investigation requires the processing of tons of digital images collected on devices to either identify or validate the device's user or to
Externí odkaz:
https://doaj.org/article/e15879f08ef2404b9a80af661531a986
Publikováno v:
Journal of Plant Protection Research, Vol vol. 63, Iss No 4, Pp 405-417 (2023)
The tomato crop is more susceptible to disease than any other vegetable, and it can be infected with over 200 diseases caused by different pathogens worldwide. Tomato plant diseases have become a challenge to food security globally. Currently, diagno
Externí odkaz:
https://doaj.org/article/1d3e5e3920474ed0bfc496cda04e631d
Autor:
Samuel Akwasi Danso, Liping Shang, Deng Hu, Justice Odoom, Quancheng Liu, Benedicta Nana Esi Nyarko
Publikováno v:
Applied Sciences, Vol 12, Iss 15, p 7354 (2022)
As a harmless detection method, terahertz has become a new trend in security detection. However, there are inherent problems such as the low quality of the images collected by terahertz equipment and the insufficient detection accuracy of dangerous g
Externí odkaz:
https://doaj.org/article/51e4cda5b8f84e9c8c85918427eed310
Publikováno v:
Computer Science. 24
Recently, blockchain technology has garnered support. However, an attenuating factor to its global adoption in certain use cases is privacy-preservation owing to its inherent transparency. A widely explored cryptographic option to address this challe
Autor:
Benedicta Nana Esi Nyarko, Wu Bin, Jinzhi Zhou, George K. Agordzo, Justice Odoom, Ebenezer Koukoyi
Publikováno v:
2022 IEEE World AI IoT Congress (AIIoT).