Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 1, Issue 4Jul 2020
Reflects downloads up to 06 Oct 2024Bibliometrics
research-article
Survey on Segmentation and Recognition of Handwritten Arabic Script
Abstract

The issue of handwritten recognition in Arabic script nature has attracted many researchers from both academic and industrial fields. But their efforts have not reached satisfying outcomes till now. In this paper, a survey has been done in ...

research-article
Phishing Email Detection Based on Binary Search Feature Selection
Abstract

Phishing has appeared as a critical issue in the cybersecurity domain. Phishers adopt email as one of their major channels of communication to lure potential victims. This paper attempts to detect phishing emails by using binary search feature ...

research-article
Performance Analysis of C-RAN with Different Deployment Distributions
Abstract

In cloud radio access networks (C-RAN) for 5G and beyond, the user-centric system model has gained popularity during downlink performance analysis for various reasons like tractability of stochastic geometric approach and distributed beamforming ...

research-article
Designed Features for Improving Openness, Scalability and Programmability in the Fog Computing-Based IoT Systems
Abstract

Global-scale Internet of Things (IoT) applications commonly process a huge amount of data and quickly provide useful information (to users) and instructions to monitor or control the physical world; most of these services are required to be of low ...

research-article
Risk Management and Privacy Violation Detection in the PoSeID-on Data Privacy Platform
Abstract

As personal data establishes itself as one of the main resources of our digital society, ways of controlling, monitoring, managing and securing personally identifiable information have become crucial. PoSeID-on is an H2020 European Union project ...

research-article
Real-Time Cloud-Based Load Balance Algorithms and an Analysis
Abstract

Advancement in communication technologies has also made a positive impact by increase in the computation. Cloud computing is an internet-based computational utility which has reduced the cost of computation and cutting short of larger investments. ...

research-article
Intelligence Using Automata-Based Nature’s Digital Philosophy
Abstract

Science and technology are developing with much faster way to support the needs of the common people around the world. Safe and security is assured by science and technology today. It is to recall the scientists who has struggled and provided ...

research-article
Security Considerations for Internet of Things: A Survey
Abstract

Interconnecting “things” and devices that takes the form of wearables, sensors, actuators, mobiles, computers, meters, or even vehicles is a critical requirement for the current era. These inter-networked connections are serving the emerging ...

research-article
Monitoring Pneumatic Actuators’ Behavior Using Real-World Data Set
Abstract

Developing a big data signal processing method is to monitor the behavior of a common component: a pneumatic actuator. The method is aimed at supporting condition-based maintenance activities: monitoring signals over an extended period, and ...

review-article
Robotic Technology-Based Cloud Computing for Improved Services
Abstract

Cloud is Internet-based utility computing which offers a choice to rent and use the computational resources on subscription basis. It has the service-oriented and deployment models which would provide suitable services to the end-users. Robotics ...

research-article
Saliency from High-Level Semantic Image Features
Abstract

Top-down semantic information is known to play an important role in assigning saliency. Recently, large strides have been made in improving state-of-the-art semantic image understanding in the fields of object detection and semantic segmentation. ...

review-article
A Review on Human Healthcare Internet of Things: A Technical Perspective
Abstract

The Internet of Things (IoT) is a promising technology which interconnects the available resources to offer reliable and effective smart objects. The smart objects act as a definitive building block in the development of interdisciplinary cyber-...

research-article
Organisational Security Dependent on Individual Privacy
Abstract

The global proliferation of cloud computing, smart homes, the internet of things and machine learning requires a novel view on the flow of confidential information and its classification. The security of an organisation is affected by the privacy ...

research-article
CNN-BiLSTM Model for Violence Detection in Smart Surveillance
Abstract

In this paper, a lightweight computational model has been introduced for the better classification of violent and non-violent activities. Nowadays, the occurrences of violent activities get increased in public places. It has various social and ...

research-article
Retraining a Pruned Network: A Unified Theory of Time Complexity
Abstract

Fine-tuning of neural network parameters is an essential step that is involved in model compression via pruning, which let the network relearn using the training data. The time needed to relearn a compressed neural network model is crucial in ...

research-article
Forecasting Models for Coronavirus Disease (COVID-19): A Survey of the State-of-the-Art
Abstract

COVID-19 is a pandemic that has affected over 170 countries around the world. The number of infected and deceased patients has been increasing at an alarming rate in almost all the affected nations. Forecasting techniques can be inculcated thereby ...

research-article
Improvements in the Large p, Small n Classification Issue
Abstract

Classifying gene expression data is known to contain keys for solving the fundamental problems in cancer studies. However, this issue is a complex task because of the large p, small n issue on gene expression data analysis. In this paper, we ...

research-article
Efficacy of Imbalanced Data Handling Methods on Deep Learning for Smart Homes Environments
Abstract

Human activity recognition as an engineering tool as well as an active research field has become fundamental to many applications in various fields such as health care, smart home monitoring and surveillance. However, delivering sufficiently ...

research-article
Performance and Security Evaluation of S-Box Using Current-Pass Optimized Symmetric Pass Gate Adiabatic Logic
Abstract

Secure adiabatic logics are identified as the optimal solution for cryptographic modules. We previously proposed an adiabatic logic called Current-Pass Optimized Symmetric Pass Gate Adiabatic Logic (CPO-SPGAL). The proposed CPO-SPGAL realizes a ...

research-article
A Class-Specific Intrusion Detection Model: Hierarchical Multi-class IDS Model
Abstract

Nowadays, cyberattacks are occurring continuously. There are many kinds of attack types, which are malicious and harmful for our networks, resources and privacy. Along with this, diversity, size and density of the cyberattacks are increasing. ...

research-article
Glioma Classification Using Deep Radiomics
Abstract

Glioma constitutes 80% of malignant primary brain tumors in adults, and is usually classified as high-grade glioma (HGG) and low-grade glioma (LGG). The LGG tumors are less aggressive, with slower growth rate as compared to HGG, and are responsive ...

research-article
On Enabling GDPR Compliance in Business Processes Through Data-Driven Solutions
Abstract

The collection and long-term retention of excessive data enables organisations to process data for insights in non-primary processes. The discovery of insights is promoted to be useful both for organisations and the customers. However, long-term ...

research-article
Predictive Data Mining Models for Novel Coronavirus (COVID-19) Infected Patients’ Recovery
Abstract

Novel coronavirus (COVID-19 or 2019-nCoV) pandemic has neither clinically proven vaccine nor drugs; however, its patients are recovering with the aid of antibiotic medications, anti-viral drugs, and chloroquine as well as vitamin C ...

research-article
Training Physical and Geometrical Mid-Points for Multi-person Pose Estimation and Human Detection Under Congestion and Low Resolution
Abstract

This paper introduces the design and evaluation of NeoPose which is developed for multi-person pose estimation and human detection. The design of NeoPose is targeting the issue of human detection under congested situation and with low resolution ...

research-article
Protecting Citizens’ Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects
Abstract

Confidence in information and communication technology services and systems is crucial for the digital society which we live in, but this confidence is not possible without privacy-enhancing tools and technologies, nor without risks management ...

research-article
Extremal Problem with Network-Diameter and -Minimum-Degree for Distributed Function Computation
Abstract

Distributed function computation has a wide spectrum of major applications in distributed systems. Distributed computation over a network-system proceeds in a sequence of time-steps in which vertices update and/or exchange their values based on ...

research-article
Comprehensive Analysis on Hardware Trojans in 3D ICs: Characterization and Experimental Impact Assessment
Abstract

Three-dimensional (3D) integration facilitates to integrate an increasing number of transistors into a single package. Despite improved performance and power efficiency, the integration of multiple dies in the same package potentially leads to new ...

research-article
PudgyTurtle: Using Keystream to Encode and Encrypt
Abstract

Stream cipher encryption works by modulo-2 adding plaintext bits to keystream bits, which are in turn produced by successively updating a finite-state machine initialized to a secret starting state. PudgyTurtle is a way to encode the plaintext in ...

review-article
A Study of Deep Learning-Based Approaches for Session-Based Recommendation Systems
Abstract

Recommending relevant items of interest for a user is the main purpose of the recommendation system. In the past, those systems achieve the recommended list based on long-term user profiles. However, personal data privacy is becoming a big ...

research-article
An Efficient Human Computer Interaction through Hand Gesture Using Deep Convolutional Neural Network
Abstract

This paper focuses on the achievement of effective human–computer interaction using only webcam by continuous locating or tracking and recognizing the hand region. We detected the region of interest (ROI) in the captured image range and classify ...

Comments