Search
Search Results
-
Realization of Efficient Steganographic Scheme Using Hybrid Edge Detection and Chaos
Information technology is playing a greater role in different spheres of life for quick operational processes. It helps in time-saving in the era of...
-
Responsive Mechanism for Cloud Offloading Data Intrusion Detection Using Spark—Machine Learning Model
Cloud Offloading is an essential method for the data decentralized distribution and management hence multiple approaches can result in intrusion.... -
Improving Plant Yield by Smart Irrigation System Using pH and NPK Sensors
Agriculture could be a major supply of earning of Indians and agriculture has created a giant impact on India’s economy. the event of crops for a far... -
IoT-Based Smart City Architecture and Its Applications
IoT communications are at the core of smart city operations. The smart city concept, which aspires to use the most innovative technologies, is... -
Fire Neutralizing ROBOT with Night Vision Camera Under IoT Framework
Organizations and individuals are increasingly accepting and using the smart home or smart building applications features. Real-time tracking, remote... -
Penetration Testing for the Cloud-Based Web Application
This paper discusses methods, tools, approaches, and techniques used for the penetration testing on the cloud-based web application on Amazon AWS... -
Anti-Jamming Wireless Communication Using Chaos-Based Code Selection Spread Spectrum Technique
Physical layer performance of wireless communication, which is subjected to reactive jamming attack, is analyzed in this paper. The main problem in... -
RETRACTED ARTICLE: Computer vision for facial analysis using human–computer interaction models
Currently, a facial analysis system for human–computer interfaces is presented and employed extensively. The increasing computer and digital speed,...
-
Computer Vision Explainability for Object Detection in Safety Surveillance
The need for explainability is especially critical as deep learning solutions become more prevalent. Creating interpretations and visualizations of... -
GBI-Based Wireless Home Automation System Using IoT
This paper proposed the design and implementation of Green Building Index (GBI)-based of home automation for monitoring and controlling with safety... -
Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms
The advent of federated learning has facilitated large-scale data exchange amongst machine learning models while maintaining privacy. Despite its... -
Social Bot Detection Techniques and Challenges—A Review Approach
As web services and online social networks (OSN) such as Facebook, Twitter, and LinkedIn have grown in popularity, undesirable social bots have... -
Fractional Order Derivative Mechanism to Extract Biometric Features
Currently growing market of mobile devices demands algorithms for biometric identification, which require low computational complexity and... -
Internet of Things Security Requirements, Threats, Attacks, and Countermeasures
This chapter elaborates on different security aspects to be taken into accounts during the development and the deployments of IoT architecture. To... -
Security of Wireless IoT in Smart Manufacturing: Vulnerabilities and Countermeasures
This chapter discusses modern smart manufacturing systems, the challenges in building such systems, and their vulnerabilities due to the lack of... -
Robust Approach for Person Identification Using Three-Triangle Concept
Managing a large volume of data in today’s fast-paced environment is a challenging feat. As with the increasing number of data breaches, there are... -
Face-Anti-spoofing Based on Liveness Detection
Many applications, like crossing points, banking, and mobile banking, are now using Face Recognition (FR) systems. The widespread usage of FR systems... -
A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures
The recent integration and collaboration of robots with networks expose new challenges and problems in terms of security. However, to the best of our...
-
FoG and Cloud Computing with Jetson Nano
FoG and cloud paradigms are hel** the IoT devices to offload the computing in order to reduce power consumption and increase battery life. The... -
Home Shanti (An Edge Computing-Based IoT System for Complete Home Security and Safety)
The post-COVID-19 era redefines safety and security for all of us. With increasing population, higher rate of unemployment and faster pace of life,...