We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 537 results
  1. Realization of Efficient Steganographic Scheme Using Hybrid Edge Detection and Chaos

    Information technology is playing a greater role in different spheres of life for quick operational processes. It helps in time-saving in the era of...

    Aiman Jan, Shabir A. Parah, ... Bilal A. Malik in Arabian Journal for Science and Engineering
    Article 20 July 2022
  2. Responsive Mechanism for Cloud Offloading Data Intrusion Detection Using Spark—Machine Learning Model

    Cloud Offloading is an essential method for the data decentralized distribution and management hence multiple approaches can result in intrusion....
    Hari Shankar Punna, Arif Mohammad Abdul in Mobile Radio Communications and 5G Networks
    Conference paper 2024
  3. Improving Plant Yield by Smart Irrigation System Using pH and NPK Sensors

    Agriculture could be a major supply of earning of Indians and agriculture has created a giant impact on India’s economy. the event of crops for a far...
    Rahul Y. Pawar, Pramod B. Deshmukh, ... Swapnil V. Ghogardare in Techno-Societal 2020
    Conference paper 2021
  4. IoT-Based Smart City Architecture and Its Applications

    IoT communications are at the core of smart city operations. The smart city concept, which aspires to use the most innovative technologies, is...
    Sree Charan Mamidi, Shadab Siddiqui, Sheikh Fahad Ahmad in Proceedings of International Conference on Computational Intelligence
    Conference paper 2023
  5. Fire Neutralizing ROBOT with Night Vision Camera Under IoT Framework

    Organizations and individuals are increasingly accepting and using the smart home or smart building applications features. Real-time tracking, remote...
    Neelam Yadav, Dinesh Sharma, ... Gaurav Pratap Singh in International Conference on Cyber Security, Privacy and Networking (ICSPN 2022)
    Conference paper 2023
  6. Penetration Testing for the Cloud-Based Web Application

    This paper discusses methods, tools, approaches, and techniques used for the penetration testing on the cloud-based web application on Amazon AWS...
    Rafid Al-Khannak, Sajjan Singh Nehal in ICT: Innovation and Computing
    Conference paper 2024
  7. Anti-Jamming Wireless Communication Using Chaos-Based Code Selection Spread Spectrum Technique

    Physical layer performance of wireless communication, which is subjected to reactive jamming attack, is analyzed in this paper. The main problem in...
    Balamurugan Gopalakrishnan, M. A. Bhagyaveni in Evolution in Computational Intelligence
    Conference paper 2022
  8. RETRACTED ARTICLE: Computer vision for facial analysis using human–computer interaction models

    Currently, a facial analysis system for human–computer interfaces is presented and employed extensively. The increasing computer and digital speed,...

    Zitian Liao, R. Dinesh Jackson Samuel, Sujatha Krishnamoorthy in International Journal of Speech Technology
    Article 08 February 2022
  9. Computer Vision Explainability for Object Detection in Safety Surveillance

    The need for explainability is especially critical as deep learning solutions become more prevalent. Creating interpretations and visualizations of...
    Kumar Selvakumaran, Aman Sami, ... S. Sathyalakshmi in Smart Trends in Computing and Communications
    Conference paper 2023
  10. GBI-Based Wireless Home Automation System Using IoT

    This paper proposed the design and implementation of Green Building Index (GBI)-based of home automation for monitoring and controlling with safety...
    Anas Javaid, Anis Fariza Md. Pazil, ... Nurulazlina Ramli in Recent Advances in Electrical and Electronic Engineering and Computer Science
    Conference paper 2022
  11. Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms

    The advent of federated learning has facilitated large-scale data exchange amongst machine learning models while maintaining privacy. Despite its...
    Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif in Federated and Transfer Learning
    Chapter 2023
  12. Social Bot Detection Techniques and Challenges—A Review Approach

    As web services and online social networks (OSN) such as Facebook, Twitter, and LinkedIn have grown in popularity, undesirable social bots have...
    Conference paper 2023
  13. Fractional Order Derivative Mechanism to Extract Biometric Features

    Currently growing market of mobile devices demands algorithms for biometric identification, which require low computational complexity and...
    Zbigniew Gomolka, Boguslaw Twarog, Ewa Zeslawska in Theory and Engineering of Dependable Computer Systems and Networks
    Conference paper 2021
  14. Internet of Things Security Requirements, Threats, Attacks, and Countermeasures

    This chapter elaborates on different security aspects to be taken into accounts during the development and the deployments of IoT architecture. To...
    Mohamed Abdel-Basset, Nour Moustafa, ... Wei** Ding in Deep Learning Techniques for IoT Security and Privacy
    Chapter 2022
  15. Security of Wireless IoT in Smart Manufacturing: Vulnerabilities and Countermeasures

    This chapter discusses modern smart manufacturing systems, the challenges in building such systems, and their vulnerabilities due to the lack of...
    Fatima Tu Zahra, Yavuz Selim Bostanci, Mujdat Soyturk in Intelligent Secure Trustable Things
    Chapter Open access 2024
  16. Robust Approach for Person Identification Using Three-Triangle Concept

    Managing a large volume of data in today’s fast-paced environment is a challenging feat. As with the increasing number of data breaches, there are...
    Nikita kumari, Ashish Mishra, ... Rashmi Priyadarshini in Advances and Applications of Artificial Intelligence & Machine Learning
    Conference paper 2023
  17. Face-Anti-spoofing Based on Liveness Detection

    Many applications, like crossing points, banking, and mobile banking, are now using Face Recognition (FR) systems. The widespread usage of FR systems...
    Shivani Mangal, Khushboo Agarwal in Intelligent Cyber Physical Systems and Internet of Things
    Conference paper 2023
  18. A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures

    The recent integration and collaboration of robots with networks expose new challenges and problems in terms of security. However, to the best of our...

    **ngmao Shao, Lun **e, ... Zhiliang Wang in Journal of Intelligent & Robotic Systems
    Article 03 November 2023
  19. FoG and Cloud Computing with Jetson Nano

    FoG and cloud paradigms are hel** the IoT devices to offload the computing in order to reduce power consumption and increase battery life. The...
    Chapter 2023
  20. Home Shanti (An Edge Computing-Based IoT System for Complete Home Security and Safety)

    The post-COVID-19 era redefines safety and security for all of us. With increasing population, higher rate of unemployment and faster pace of life,...
    Conference paper 2022
Did you find what you were looking for? Share feedback.