The practice of hiding data within other data such that it is not exposed to any entity other than the intended one is known as steganography. Video steganography is a form of steganography in which private informatio...
详细信息
Electronic Health Records (EHR) are crucial for the success of digital healthcare, with a focus on putting consumers at the center of this transformation. However, the digitalization of healthcare records brings along...
详细信息
The data in the cloud is protected by various mechanisms to ensure security aspects and user’s ***,deceptive attacks like phishing might obtain the user’s data and use it for malicious *** Spite of much techno-logic...
详细信息
The data in the cloud is protected by various mechanisms to ensure security aspects and user’s ***,deceptive attacks like phishing might obtain the user’s data and use it for malicious *** Spite of much techno-logical advancement,phishing acts as thefirst step in a series of *** technological advancements,availability and access to the phishing kits has improved drastically,thus making it an ideal tool for the hackers to execute the *** phishing cases indicate use of foreign characters to disguise the ori-ginal Uniform Resource Locator(URL),typosquatting the popular domain names,using reserved characters for re directions and multi-chain *** phishing URLs can be stored as a part of the document and uploaded in the cloud,providing a nudge to hackers in cloud *** cloud servers are becoming the trusted tool for executing these *** prevailing software for blacklisting phishing URLs lacks the security for multi-level phishing and expects security from the client’s end(browser).At the same time,the avalanche effect and immut-ability of block-chain proves to be a strong source of *** these trends in technology,a block-chain basedfiltering implementation for preserving the integrity of user data stored in the cloud is *** proposed Phish Block detects the homographic phishing URLs with accuracy of 91%which assures the security in cloud storage.
Coronavirus 2019(COVID-19)is the current global buzzword,putting the world at *** pandemic’s exponential expansion of infected COVID-19 patients has challenged the medical field’s resources,which are already *** est...
详细信息
Coronavirus 2019(COVID-19)is the current global buzzword,putting the world at *** pandemic’s exponential expansion of infected COVID-19 patients has challenged the medical field’s resources,which are already *** established nations would not be in a perfect position to manage this epidemic correctly,leaving emerging countries and countries that have not yet begun to grow to address the *** problems can be solved by using machine learning models in a realistic way,such as by using computer-aided images during medical *** models help predict the effects of the disease outbreak and help detect the effects in the coming *** this paper,Multi-Features Decease Analysis(MFDA)is used with different ensemble classifiers to diagnose the disease’s impact with the help of Computed Tomography(CT)scan *** are various features associated with chest CT images,which help know the possibility of an individual being affected and how COVID-19 will affect the persons suffering from *** current study attempts to increase the precision of the diagnosis model by evaluating various feature sets and choosing the best combination for better *** model’s performance is assessed using Receiver Operating Characteristic(ROC)curve,the Root Mean Square Error(RMSE),and the Confusion *** is observed from the resultant outcome that the performance of the proposed model has exhibited better efficient.
The industrial world including the merits of Internet of Things (IoT) paradigm has wide opened the evolution of new digital technology to facilitate promising and revolutionizing dimensions in diversified industrial a...
详细信息
Iris recognition is one of the most widely used human authentication mechanism that has gained huge popularity due to its security and efficiency. However, recently attackers have breached the security of these system...
详细信息
Recent advancements in requirements engineering (RE) methods have increasingly leveraged machine learning (ML) algorithms to address challenging RE issues such as the identification and classification of software requ...
详细信息
Digital Image Processing (DIP) is the ability to manipulate digital photographs via algorithms for pattern detection, segmentation, enhancement, and noise reduction. In addition, the Internet of Things (IoT) acts as t...
详细信息
Phishing, a cybercrime orchestrated by intruders or hackers, aims at duping unsuspecting individuals into revealing sensitive information via deceptive websites. The primary objective of this nefarious activity is to ...
详细信息
Advanced Driver Assistance Systems (ADAS) enhance driver safety through various technologies. In high-end cars, ADAS typically uses computer vision-based solutions, such as eye-tracking, to monitor driver attention, m...
详细信息
ISBN:
(纸本)9798350387278
Advanced Driver Assistance Systems (ADAS) enhance driver safety through various technologies. In high-end cars, ADAS typically uses computer vision-based solutions, such as eye-tracking, to monitor driver attention, mood, and drowsiness. However, these ADAS solutions are challenging to implement for two-wheeler (2W) drivers, who constitute about 80% of drivers population in India, mainly due to helmet usage and the unique dynamics of 2W vehicles. This paper investigates improving 2W driver safety through integrating mobility and physiological sensors for ADAS. Experimental studies evaluated a novel ADAS framework combining mobility sensor data (e.g., speed, acceleration, position) with physiological parameters (e.g., heart rate, etc.). This fusion of sensors data approach enables monitoring vehicle dynamics and driver conditions for providing adaptive safety interventions by identifying aggressive/non-aggressive and stress/non-stress patterns. To facilitate the collection of mobility and physiological sensors data a mobile application was developed using Flutter. The physiological parameters were captured from the smart-watch paired with the smart-phone and the mobility parameters were captured from the mobility sensors that were in-built in the smart-phone. The data was collected in Navi-Mumbai area of India. Preliminary experiments conducted using these integrated sensors data show promising results. To incorporate supervised approach for Driver Behaviour Analysis (DBA) requires a tedious task of manual tagging and each driver reacts differently to the different situations that arise while driving. So, an un-supervised learning approach has been incorporated and clustering techniques like k-Means, Gaussian Mixture Model (GMM), Hierarchical Clustering, and k-Means with Dynamic Time Wrapping (DTW) analysed the sensor data to identify patterns indicating potential hazards or driver impairment. The findings based on the preliminary experimental studies done indicate t
暂无评论