Metaverse security and privacy: An overview

Z Chen, J Wu, W Gan, Z Qi - … Conference on Big Data (Big Data …, 2022 - ieeexplore.ieee.org
Metaverse is a living space and cyberspace that realizes the process of virtualizing and
digitizing the real world. It integrates a plethora of existing technologies with the goal of …

An empirical client cloud environment to secure data communication with alert protocol

D Soni, D Srivastava, A Bhatt… - Mathematical …, 2022 - Wiley Online Library
Cloud computing is a technology that provides resources and utility services based on user
demand. Due to this demand, efficient cloud security protocols are highly required …

Accuracy Improvement of Flooded Area Detection from Satellite Images using Novel K-Nearest Neighbors in Comparison with Support Vector Machine

C Vamsi, V Amudha - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
In this study, we examine the outcomes of employing Novel K-nearest Neighbors and
Support Vector Machines to assess the accuracy of recognizing flooded areas. The data set …

A Real TimeVehicle Detection Based on Modified Convolutional Neural Networks in Different Climate

S Johnson, BP Laxmi - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
In order to effectively manage and monitor traffic on the roads, intelligent technologies must
be able to detect and tally the number of cars on the road. The technology may be used for …

[PDF][PDF] Enhancing the Cloud Security through RC6 and 3DES Algorithms while Achieving Low-Cost Encryption

CS Tiwari, VK Jha - mecs-press.org
Cloud computing is a cutting-edge system that's widely considered the future of data
processing, making cloud computing one of the widely used platforms worldwide. Cloud …