BBIWMS: A Secure Blockchain-Based Framework for Integrated Water Management System for Smart City

BCG Kumar, KG Harsha, G Mahesh, V Shukla… - … on Cryptology & …, 2022 - Springer
In the two-thirds of the earth that is covered by water, only less than 1% of the water is fit for
human use. A natural resource and prerequisite for human survival is water. Due to the lack …

[PDF][PDF] Object detection in medical video using deep learning

Y Madhankumar - Int J Inform Technol (IJIT), 2020 - academia.edu
The development of live video surveillance is the most encouraging solution for surgery in
hospital. As of late, a few contributions for video observation have been proposed. Moving …

[PDF][PDF] Wavelet-based visual share creation for image security

A Mathew - Int. J. Eng. Trends. Appl.(IJETA), 2020 - academia.edu
The utilization of computerized images in many fields of data innovation frameworks makes
these images, for the most part, contain private data. here is a few distinctive research work …

[PDF][PDF] Kernel Classifier for Heart Disease Data Classification

SK Rath - International Journal of Information Technology (IJIT), 2020 - academia.edu
Medical data classification (MDC) entails to taking in classification designs from medical
datasets and intends to upgrade the design of human services. Predicting the presence of …

[PDF][PDF] Early Segmentation of Diabetic Retinopathy Images

K Sudharsan - International Journal of Information Technology (IJIT), 2020 - academia.edu
Retinal blood vessels segmentation and detection plays an important role for retinal image
analysis. Diabetic retinopathy (DR) is a diabetes related eye disease which occurs when …

[PDF][PDF] Enhance the Security for Internet of Things Information Using Block Chain

P Elayaraja - algorithms - academia.edu
In recent decades, the Internet of Things (IoT) is transforming into an attractive system to
drive a substantive hop on stock and enterprises through physical, computerized, and social …

[PDF][PDF] Classification of Big Data Based Social Internet of Things

DK Kumar, S Chanti, KS Murthy - academia.edu
ABSTRACT Internet of Things (IoT) is blasting and has been along with us all around and
the things do not just communicate with each other without human mediation yet additionally …

[PDF][PDF] Kernel Function for Malicious Node Detection in Social Internet of Things

Y Madhankumar - academia.edu
ABSTRACT Social Internet of Things (SIoT) is an interdisciplinary rising domain that enables
self-governing connection among long range informal communication and the Internet of …

[PDF][PDF] Malicious Attack Detection by Convolutional Deep Learning Model for Web Applications

Y Madhankumar - academia.edu
ABSTRACT Wireless Sensor Network (WSN) is profoundly imperative for securing network
protection. Profoundly basic attacks of different types have been reported in wireless sensor …

[PDF][PDF] Image Encryption and Decryption Using Signcryption

S Balsing - ijetajournal.org
The implementation of a system that combines encryption strategies to offer security to
exchanged images is the main difficulty of this paper. The device is primarily based on a …