[PDF][PDF] Box-trainer assessment system with real-time multi-class detection and tracking of laparoscopic instruments, using CNN

FR Fathabadi, JL Grantner, I Abdel-Qader… - Acta Polytechnica …, 2022 - real-j.mtak.hu
In Minimally Invasive Surgery (MIS), surgeons need to acquire a specific set of skills, before
carrying out a “real” operation. Training with the Laparoscopic Surgical Box-Trainer device …

A comparative survey on data encryption Techniques: Big data perspective

P Matta, M Arora, D Sharma - Materials today: proceedings, 2021 - Elsevier
The prime aspect in data handling is the invulnerability of Data, therefore, Encryption is the
most conventionally used technique for data security. for instance, Data Encryption Standard …

Secured remote health monitoring system

D Sathya, P Ganesh Kumar - Healthcare Technology Letters, 2017 - Wiley Online Library
Wireless medical sensor network is used in healthcare applications that have the collections
of biosensors connected to a human body or emergency care unit to monitor the patient's …

[PDF][PDF] Novel encryption algorithm for securing sensitive information based on feistel cipher

SM Abd Ali, HF Hasan - Test Engeenering Managenment, 2019 - researchgate.net
The growth of latest technology specially internet and its applications imposes a major
concern in respect to information security in terms of protecting precious content against any …

Achieving data privacy for decision support systems in times of massive data sharing

R Fazal, MA Shah, HA Khattak, HT Rauf… - Cluster Computing, 2022 - Springer
The world is suffering from a new pandemic of Covid-19 that is affecting human lives. The
collection of records for Covid-19 patients is necessary to tackle that situation. The decision …

Enhancement CAST block algorithm to encrypt big data

FA Kadhim, GH Abdul-Majeed… - 2017 Annual Conference …, 2017 - ieeexplore.ieee.org
In this research the security issues are discussed for securing big data. Encryption
algorithms play an essential part to secure information. This paper demonstrates analysis of …

Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption

M Karmakar, A Priya, K Sinha, M Verma - International Conference on …, 2022 - Springer
Cryptography is the technique of hiding and transmitting confidential information via the
internet. There are various traditional cryptographic approaches have been presented by …

Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices

KF Jasim, RJ Ismail… - Cihan University …, 2021 - journals.cihanuniversity.edu.iq
In the past years, the Internet of Things (IoT) used in different applications and very wide
range of fields (eg cloud services, smart environments, logistics, social and personal …

Multidimensional key RC6 algorithm

REJ Paje, AM Sison, RP Medina - … of the 3rd International Conference on …, 2019 - dl.acm.org
Data confidentiality grows equally important along with technological advancement.
Encryption technique is an essential aspect of information security. The security of …

A comparative analysis of symmetric cryptographic algorithm as a data security tool: A survey

C Ubochi, B Olaniyi, K Ukagwu… - NIPES-Journal of …, 2023 - journals.nipes.org
Network security is becoming a significant and difficult subject that is growing quickly.
Attacks and risks to information and internet security are becoming harder to identify. As a …