[PDF][PDF] Cyber security in cloud using blowfish encryption

S Hussaini - International Journal of Information Technology, 2020 - academia.edu
Due to the inexorable notoriety of ubiquitous mobile devices and cloud processing, storing
of data (for example photographs, recordings, messages, and texts) in the cloud has turned …

Dynamic strategy to use optimum memory space in real-time video surveillance

T Biswas, D Bhattacharya, G Mandal - Journal of Ambient Intelligence and …, 2023 - Springer
In present days real-time video surveillance is a very essential aspect of establishing safety,
observing traffic, and detecting violence and crimes. Intelligent video surveillance (IVS) is …

[PDF][PDF] Speech emotion recognition using enhanced cat swarm optimization algorithm

A Singh - International Journal of Information Technology (IJIT), 2020 - academia.edu
Human interactions involve emotional cues which can be used to interpret the emotion
expressed by the speaker. As the vocal emotions vary from one speaker to another, there is …

Video steganography using curvelet transform and elliptic curve cryptography

S Rout, RK Mohapatra - 2020 11th International Conference on …, 2020 - ieeexplore.ieee.org
Video steganography mainly deals with secret data transmission in a carrier video file
without being visually noticeable by intruders. Video steganography is preferred over image …

[PDF][PDF] Detection of arrhythmia disease in ecg signal using optimal features

KN Pandagre - Int J Inf Technol (IJIT), 2020 - academia.edu
In the medical field, Electrocardiogram (ECG) acts an essential role to find various
cardiovascular diseases with the help of recording signals. These days, an exact ECG signal …

[PDF][PDF] Blockchain technology In E-healthcare applications

P Elayaraja - International Journal of Information Technology (IJIT), 2020 - academia.edu
ABSTRACT E-Healthcare promises to be the next big wave in healthcare, so the security is
must in this system. The security in the sensor network communication is highly …

[PDF][PDF] Call Admission Control Decision Maker for Smart City Applications

Y Arora - International Journal of Information Technology (IJIT), 2020 - academia.edu
The development of smart city communities prompts basic moves identified with network
security and communication models. Communication between gadgets is secured, and we …

[PDF][PDF] Multi Equalizer Model for BER Performance Analysis in OFDM System

R Dhanapal - International Journal of Information Technology (IJIT), 2020 - academia.edu
Recently, a few modulation systems are connected in a signal transmission process.
Multiple Input and Multiple Outputs (MIMO) in Orthogonal Frequency Division Multiplexing …

[PDF][PDF] Simulation Analysis by optimal Wavelets with BPSK Modulator

M ÖZKAN - International Journal of Information Technology (IJIT), 2020 - academia.edu
ABSTRACT Long Term Evolution (LTE) is increasingly seen as a promising technology for
serving Internet of Things (IoT) needs along with mobile user equipments (UEs), due to high …

[PDF][PDF] A Review on Curvelets and its Applications

S Mishra, D Sharma - researchgate.net
Wavelets have a large impact on image and signal processing, but it is observed that they
fail to represent an object like linear or curvilinear structure which is highly anistropic. To …