Towards secure and intelligent internet of health things: A survey of enabling technologies and applications

U Zaman, Imran, F Mehmood, N Iqbal, J Kim, M Ibrahim - Electronics, 2022 - mdpi.com
With the growth of computing and communication technologies, the information processing
paradigm of the healthcare environment is evolving. The patient information is stored …

Deep Learning based Smart American Sign Language Detection in Alphabets

C RukumaniKhandhan, P Vijayakumar… - … and Informatics (IC3I …, 2023 - ieeexplore.ieee.org
Disabled people are of different kinds like physically challenged people, mentally
challenged etc. To help the people who cannot convey their thoughts and who cannot hear …

Blockchain-based community safety security system with IoT secure devices

CL Chen, ZY Lim, HC Liao - Sustainability, 2021 - mdpi.com
Humans frequently need to construct a huge number of buildings for occupants in large
cities to work or live in a highly developed civilization; people who live in the same building …

[引用][C] Explore the relationship between security mechanisms and trust in e-banking: A systematic review

Q Hammouri, T Majali, D Almajali, A Aloqool… - Annals of the Romanian …, 2021

Smart Auto Image Captioning Using LSTM and Densenet Network

M Arumugam, P Vijayakumar… - … and Informatics (IC3I …, 2023 - ieeexplore.ieee.org
The integration of semantic attention increase photo captioning ability. The premise
underlying semantic attention-based techniques is that the model should prioritize words or …

Designing and validating an MD5 Hash Algorithm using the UVM Verification Framework and Checkers

VD Nandhini, M Kowsalya, PJ Ragu… - 2023 14th …, 2023 - ieeexplore.ieee.org
The MD5 algorithm is widely employed for generating fixed-size hash values to ensure data
integrity. By incorporating MD5 into the UVM verification framework, designers can efficiently …

A traceable and authenticated IoTs trigger event of private security record based on blockchain

CL Chen, ZY Lim, HC Liao, YY Deng - Applied Sciences, 2021 - mdpi.com
Recently, private security services have become increasingly needed by the public. The
proposed scheme involves blockchain technology with a smart contract. When a private …

Design and Analysis of Deep Learning based Water Potability Prediction

M Arumugam, P Vijayakumar… - … Conference on Self …, 2023 - ieeexplore.ieee.org
According to the United Nations, having access to clean water for consumption is a
fundamental human right. General Assembly in 2010. The importance of safe drinking water …

Wireless Communication Systems: Confidentiality: Encryption and Decryption

KS Mohamed - … Systems Architecture: Transceiver Design and DSP …, 2022 - Springer
In common communication systems confidentiality are ensured exclusively by encryption of
the messages. This chapter covers the security procedures in wireless communication …

Security Model For Data On Transit In Mobile Banking Applications

DO Orucho - 2024 - repository.kisiiuniversity.ac.ke
Mobile banking applications is an advanced technology within mobile banking that exploits
the use of wireless and cellular networks to deliver banking services to users with increased …