S Smys, CV Joe - Journal of Information Technology, 2021 - academia.edu
IoT objects that have a resource constrained nature resulting in a number of attacks in the routing protocol for lossy networks and low-power networks. RPL is very vulnerable to …
SZ Beevi - Biomedical Signal Processing and Control, 2023 - Elsevier
The disease with the fastest global growth rate, diabetes, has numerous complications. Diabetic retinopathy (DR), which results in retinal lesions that affect vision, is one of these …
S Nagapavithra, S Umamaheswari - Artificial Intelligence Review, 2023 - Springer
Recently, the plantation of sugarcane is done in mechanized manner with billets that are short segments of sugarcane harvested. The automated harvesting procedure can destroy …
B Chaitra, PVB Reddy - Knowledge-Based Systems, 2023 - Elsevier
Owing to the rapid increase in the availability of editing tools and image capturing, the amount of fake images available online has increased tremendously. Moreover, social …
ABSTRACT A brain tumour (BT) is a growth of tissue that is organised by a gradual accumulation of anomalous cells, and it is significant to segment and classify the BT from …
X Tan, Z Zuo, S Su, X Guo, X Sun - Electronics, 2020 - mdpi.com
With the rapid development of information technology and the increasing application of UAV in various fields, the security problems of unmanned aerial vehicle (UAV) communication …
Heart diseases (HD) in humans are the most common cause of death. In the current global environment, the early detection of HD is a challenging process. The goal of this work is to …
AB Kathole, KN Vhatkar, A Goyal, S Kaushik… - IEEE …, 2024 - ieeexplore.ieee.org
The rapid growth of the Internet of Medical Things (IoMT) has introduced significant security and privacy challenges in managing and protecting medical data. This paper proposes a …
A Kumar, A Noliya, R Makani - International Journal of …, 2024 - Wiley Online Library
One of the attacks that have rapidly happen is Advanced Persistent Threat (APT). APT attacks contain different sophisticated approaches and methods of attacking targets for …