Efficient dynamic phishing safeguard system using neural boost phishing protection

AQ Md, D Jaiswal, J Daftari, S Haneef, C Iwendi… - Electronics, 2022 - mdpi.com
The instances of privacy and security have reached the point where they cannot be ignored.
There has been a rise in data breaches and fraud, particularly in banks, healthcare, and …

[PDF][PDF] Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map.

K Priyadarsini, AK Sivaraman, AQ Md… - Computers, Materials & …, 2023 - researchgate.net
With the rapid evolution of Internet technology, fog computing has taken a major role in
managing large amounts of data. The major concerns in this domain are security and …

Intruder detection system using IoT with adaptive face monitoring and motion sensing algorithm

A Jojo, GK Sunil, AQ Md, T Vigneswaran… - 2022 Third …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) conceptualizes the possibility of distantly interfacing and checking
things through the web. At the point when it includes our home, this thought is frequently …

Reliability of smart-wearables using PSO-GA optimized algorithm in terms of data analysis

J Sivakumar, AQ Md, T Vigneswaran… - 2022 Third …, 2022 - ieeexplore.ieee.org
Rapid advancement in the smart-wearable industry has increased the importance of
modeling the relationship between the raw data captured by the devices and the useful …

An efficient dynamic K-papa architecture for communicating with the things using collision-free algorithm

P Setia, Y Singh, AQ Md, T Vigneswaran… - 2022 Third …, 2022 - ieeexplore.ieee.org
The research is based on tracking the lost assets within a distance of 30 ft using ultra-high
frequency (UHF) RFID tags by implying a system that includes a micro USB RFID reader …

A Robust Pipeline Approach for DDoS Classification using Machine Learning

N Agarwal, AQ Md, T Vigneswaran… - 2022 Third …, 2022 - ieeexplore.ieee.org
Remote and edge devices have less security features that are easily exploited by hackers.
The security of businesses in major domains depends on the security features the …

Carbonic Acid Gas Emission Rating by Vehicles Using Datascience Techniques

C Prathiksha, CJ Joshua, M Abdul Quadir… - … on Advances in …, 2023 - Springer
One factor contributing to the warming of the upper orbit is the rollout of man-made
pollutants into the eco system (biogas, Dioxide, laughing gas, and so on). Approximately …

Lung Histopathological Detection Using Image Classification

K Ishwarya, JC Jackson, AQ Md, S Mohan… - … Conference on Advances …, 2023 - Springer
Early detection of lung histopathology has become crucial and essential for humans. Rapid
recognition gives many patients the greatest chance of recovery. Histopathological graphics …

An Efficient Algorithm to Recommend Covid-19 Related Solutions

N Das, S Chattopadhyay, KE Macaden… - 2022 Third …, 2022 - ieeexplore.ieee.org
With the rise of Covid-19, the open-source community has devoted a huge amount of time
into developing technical solutions to stop the spread of the virus. Useful solutions like …

Achieving Sustainability by Rectifying Challenges in IoT-Based Smart Cities

N Bhardwaj, C Iwendi, T Hamid, A Garg - International Conference on Big …, 2022 - Springer
It has become mandatory for traditional cities to be converted into smart cities for the benefit
of giving citizens a better lifestyle. The large amounts of people migrating toward smart cities …