IoT enabled HELMET to safeguard the health of mine workers

N Singh, VK Gunjan, G Chaudhary, R Kaluri… - Computer …, 2022 - Elsevier
Abstract Information and communication technologies have aided advancements in
providing a healthy and safe working environment at the workplace. Using ICT-based …

Rating‐Based Recommender System Based on Textual Reviews Using IoT Smart Devices

M Ahmed, MD Ansari, N Singh… - Mobile Information …, 2022 - Wiley Online Library
Recommender system (RS) is a unique type of information clarification system that
anticipates the user's evaluation of items from a large pool based on the expectations of a …

Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system

A Alarifi, M Amoon, MH Aly, W El-Shafai - IEEE Access, 2020 - ieeexplore.ieee.org
Recently, biometric systems are extensively and commonly utilized for authentication and
verification applications. The security issue and the dependence on a specific biometric for …

CNN‐Based Brain Tumor Detection Model Using Local Binary Pattern and Multilayered SVM Classifier

M Kolla, RK Mishra, S Zahoor Ul Huq… - Computational …, 2022 - Wiley Online Library
In this paper, an autonomous brain tumor segmentation and detection model is developed
utilizing a convolutional neural network technique that included a local binary pattern and a …

Cancelable Iris template for secure authentication based on random projection and double random phase encoding

V Rajasekar, J Premalatha, K Sathya - Peer-to-Peer Networking and …, 2021 - Springer
Biometric recognition approaches have overwhelmed major issues in traditional
authentication systems. Privacy invasion and security are the needed features in the …

Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems

MM Rahman, TI Mishu, MAA Bhuiyan - Journal of Information Security and …, 2022 - Elsevier
The fingerprint templates include almost the entire information about an individual's
fingerprints, and the user validation is totally determined by the fingerprint minutiae features …

Deep learning and transfer learning for malaria detection

T Jameela, K Athota, N Singh… - Computational …, 2022 - Wiley Online Library
Infectious disease malaria is a devastating infectious disease that claims the lives of more
than 500,000 people worldwide every year. Most of these deaths occur as a result of a …

Cooperative scheme ToA‐RSSI and variable anchor positions for sensors localization in 2D environments

M Zaidi, I Bouazzi, M Usman… - …, 2022 - Wiley Online Library
To rich good accuracy in the 2D area for wireless sensor network (WSN) nodes, a
localization method has to be selected. The objective of this paper is first to select which …

A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution

A Muhammed, NC Mhala, AR Pais - Multimedia Tools and Applications, 2021 - Springer
Fingerprint is the most recommended and extensively practicing biometric trait for personal
authentication. Most of the fingerprint authentication systems trust minutiae as the …

Drowsiness detection using IoT and facial expression

RN Ashlin Deepa, DR Sai Rakesh Reddy… - Proceedings of the …, 2023 - Springer
Abstract In India, approximately 500,000 people are losing lives due to road accidents every
year. With the rapid urbanization and development of big cities and towns, the graph of …