-
Article
Open AccessA probabilistic public key encryption switching scheme for secure cloud storage
The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes with multiple security features in recent years. But, the cur...
-
Chapter and Conference Paper
Boundary-Based Fake Face Anomaly Detection in Videos Using Recurrent Neural Networks
With the surge in the videos over the internet and the spread of digital communications, the attackers are greatly benefited by creating and publishing the fake distorted videos and images known as Deepfakes. ...
-
Book
-
Chapter and Conference Paper
Context-Oriented User-Centric Search System for the IoT Based on Fuzzy Clustering
The Internet of Things (IoT) paradigm envisions to support the creation of several applications that aids in the betterment of the society from various sectors such as environment, finance, industry etc. These ap...
-
Article
Location identification for real estate investment using data analytics
The modeling and control of complex systems, such as transportation, communication, power grids or real estate, require vast amounts of data to be analyzed. The number of variables in the models of such system...
-
Chapter and Conference Paper
The Next Generation of Artificial Intelligence: Synthesizable AI
While AI is expanding to many systems and services from search engines to online retail, a revolution is needed, to produce rapid, reliable “AI everywhere” applications by “continuous, cross-domain learning”. ...
-
Chapter and Conference Paper
Query Click and Text Similarity Graph for Query Suggestions
Query suggestion is an important feature of the search engine with the explosive and diverse growth of web contents. Different kind of suggestions like query, image, movies, music and book etc. are used every ...
-
Chapter and Conference Paper
RCH-MAC Protocol for Multihop QoS in Wireless Sensor Networks
The design of hybrid MAC protocol in Wireless Sensor Networks for delay sensitive data traffic QoS is a challenging work. We present Reservation Control Hybrid MAC (RCH-MAC) protocol, which reduces end-to-end ...
-
Chapter
Integration of Fuzzy ERD Modeling to the Management of Global Contextual Data
This chapter introduces the idiosyncrasies of managing the new paradigm of global contextual data, sets of context data and super sets of context data. It introduces some of the basic idea’s behind contexts an...
-
Chapter
Critical Feature Detection in Cockpits – Application of AI in Sensor Networks
We highlight some safety issues in commercial planes particulary focussing on hazards in the cockpit area. This chapter discusses a few methodologies to detect critical features and provide unambiguous informa...
-
Article
Relative positioning for team robot navigation
The research presented in this paper approaches the issue of robot team navigation using relative positioning. With this approach each robot is equipped with sensors that allow it to independently estimate the...