Integration of Artificial Intelligence into software reuse: An overview of Software Intelligence

AK Sandhu, RS Batth - 2021 2nd International Conference on …, 2021 - ieeexplore.ieee.org
Software reuse not only reduces time-to-market but also improve productivity and reliability
of the software. Developers can take the benefits of reusable modules of the software by …

Voice activity detection using windowing and updated K-means clustering algorithm

S Sharma, A Sharma, R Malhotra… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
Voice Activity Detection (VAD) is a method of detecting speech and non-speech in noisy
environments. Vaious methods for this purpose have also been proposed. In general, the …

A comparative study of various lossless compression techniques of steganography and cryptography

V Kumar, G Singh, B Singh - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Data transaction is increasing day by day over internet which is resulting into a great
challenge of their security. Data security had been a great matter of concern for which …

Beyond 5G: Reinventing Network Architecture With 6G

ZA Bhat, H Mushtaq, JA Mantoo… - 2021 2nd …, 2021 - ieeexplore.ieee.org
The roll-out of 5G has begun in many parts of the world and ought to get completed by the
end of 2021. However, given the ever-increasing bandwidth demand and need for …

[PDF][PDF] Enhancements in the world of digital forensics

KS Vaddi, D Kamble, R Vaingankar, T Khatri… - Int J Artif Intell … - pdfs.semanticscholar.org
Currently, the rapid advancement of computer systems and mobile phones has resulted in
their utilization in unlawful acts. Ensuring adequate and effective security measures poses a …

[PDF][PDF] ERDVĖJE EKSPERTINIO TYRIMO METODAS

Š NAS - academia.edu
Kompiuteriuose saugomų duomenų kiekis kasmet sparčiai auga, dėl to nusikaltimų
elektroninėje erdvėje skaitmeninių įkalčių ekspertinis tyrimas reikalauja daug laiko, nes …

[PDF][PDF] Tempo Temporal Forgery Video Detection Using Machine Learning Approach.

G Chittapur, S Murali, B Anami - Journal of Information Assurance & …, 2020 - mirlabs.org
This research paper explore a new way of detecting video forging between frames and
intraframes by referring to the correlation coefficient using a frame continuity relationship …

[PDF][PDF] AN EVOLUTIONARY APPROACH TOWARDS VIDEO SURVEILLANCE IN SMART CITIES

H Sharma, N Kanwal - researchgate.net
2navdeepkanwal@ gmail. com ABSTRACT—The increasing importance of multimedia
technology has led to a paradigm shift that happened in favour of multimedia forensics. Over …

[PDF][PDF] Video Tampering and It's Detection Techniques

S Bhoyar, M Sabnis - alochana.org
In the era of sophisticated video and image editing tools, the landscape of digital content
authenticity is facing unprecedented challenges. The ease with which digital videos and …

Nusikaltimų elektroninėje erdvėje ekspertinio tyrimo metodas

Š Grigaliūnas - 2020 - epubl.ktu.edu
Abstract [eng] Computer crime is carried out with the help of computers, computer networks,
and modern information technologies. Searching for digital evidence of these crimes …