It is an application that leverages benefits of CNNs and predicts the disease of an infected plant by examining the image of the infected leaf. It also provides the organic method to prevent the disease.
☆18May 2, 2023Updated 3 years ago
Alternatives and similar repositories for Plant-disease-prediction-using-CNNs
Users that are interested in Plant-disease-prediction-using-CNNs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Agriculture chatbot using natural language processing(NLP) and artificial neural network(ANN).☆18Nov 11, 2020Updated 5 years ago
- Agricultural Land Use Evaluation System☆15Jun 11, 2022Updated 3 years ago
- ☆13Jan 21, 2026Updated 3 months ago
- Plants Disease Detection using ML☆10Oct 21, 2022Updated 3 years ago
- Code used in the project "Leveraging data assimilation and monitoring data for improvement of crop growth estimates in protected environm…☆13Aug 11, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Jul 26, 2023Updated 2 years ago
- A set of hands-on coding exercises to solve common tasks and simple problems in agricultural sciences.☆40Feb 13, 2025Updated last year
- Research and Development of Agricultural Large Models|农业大模型研究与开发☆30Oct 4, 2023Updated 2 years ago
- Bases on Leaf images we are trying to predict plant disease using convolutional neural network. PyTorch implementation☆368Jan 12, 2025Updated last year
- Recommendation system for farmers based on soil type, location, season etc.☆48Mar 13, 2018Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- This GitHub repository contains instructions for downloading and utilizing the AI4Food-NutritionDB food image database, as well as differ…☆44Jun 19, 2025Updated 10 months ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Apr 21, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 11 months ago
- Public release of Telepathy, an OSINT toolkit for investigating Telegram chats.☆13Sep 29, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆13Updated this week
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆10Feb 28, 2022Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14Aug 18, 2023Updated 2 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A collection of architectures made by myself☆11Jun 12, 2019Updated 6 years ago
- ☆13Mar 18, 2026Updated last month
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- ☆13Apr 16, 2026Updated 3 weeks ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago
- GPT-3 attempts to predict & balance chemical reactions☆13Aug 2, 2020Updated 5 years ago
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Build URL of GCP Cloud Logging Logs Explorer☆16Jul 4, 2024Updated last year
- Frequency hopping spread spectrum analyzer and repeat attack program for use with a Nuand BladeRF☆10Apr 10, 2015Updated 11 years ago
- ☆17Mar 6, 2023Updated 3 years ago