International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(03), С. 99 - 112
Опубликована: Март 14, 2023
Recently,
with
the
requirement
for
protecting
privacy
of
images
transferred
over
internet
and
media
networks.
The
need
to
protect
these
from
hacking
by
unauthorized
persons
manipulation
has
become
very
important
in
this
research,
Block
chain
technology
was
used
its
importance
cybersecurity.
To
maintain
confidentiality
patient's
medical
data,
as
a
result,
solve
problem
requires
increasing
strength
key
encryption
process,
which
is
responsible
ensuring
security
image
.In
paper,
it
proposed
use
block
Data
Encryption
Standard
(DES)
algorithm
purpose
degree
transmitted
enhancing
during
process
encrypting
well
authentication
between
sender
receiver.
Experimental
outcomes
manifested
that
gained
via
suggested
higher,
performing
goal
information
image,
presented
results
obtained
Entropy,
MSE,
PSNR.
International Journal of Emerging Technologies in Learning (iJET),
Год журнала:
2023,
Номер
18(01), С. 176 - 200
Опубликована: Янв. 10, 2023
The
field
of
Engineering
is
that
which
needs
a
high
level
analytical
thinking,
intuitive
knowledge,
and
technical
know-how.
area
communication
engineering
deals
with
different
components
including,
wireless
mobile
services,
radio,
broadband,
web
satellites.
There
rapid
decline
in
the
quality
students
produced
by
faculties
as
result
sufficient
methods
frameworks
student
assessment.
production
high-potential
engineers
limited
utilization
old
traditional
education
methodology
frameworks.
presentation
estimation
system
institution
motionless
manual.
Usually,
assessment
student’s
performance
using
to
use
students’
scores,
while
failing
evaluate
their
based
on
activities
or
practical
applications.
In
addition,
such
systems
do
not
take
cognizance
individual
knowledge
connects
within
learning
environment.
Recently,
institutions
have
started
paying
attention
evaluation
solutions
are
networks
Internet
Things
(IoT).
Therefore,
this
study,
an
automated
has
been
proposed
for
students.
designed
IoT
aim
improving
process
virtual
education.
data
used
study
collected
through
sensors
premises
college,
pre-processed
normalization.
After
was
pre-processed,
it
stored
cloud.
order
enable
classification
activity,
Adaptive
Layered
Bayesian
Belief
Network
(AL-BBN)
classifier
work.
scores
calculated
fuzzy
logic,
Multi-Gradient
Boosting
Decision
Tree
(MGBDT)
decision
making.
python
simulation
tool
employed
implementation
system,
benchmarks
done
well.
Based
findings
conceptual
model
outperformed
existing
ones
terms
online
learning.
IEEE Transactions on Pattern Analysis and Machine Intelligence,
Год журнала:
2023,
Номер
45(10), С. 12148 - 12166
Опубликована: Июнь 7, 2023
Existing
image
fusion
methods
are
typically
limited
to
aligned
source
images
and
have
"tolerate"
parallaxes
when
unaligned.
Simultaneously,
the
large
variances
between
different
modalities
pose
a
significant
challenge
for
multi-modal
registration.
This
study
proposes
novel
method
called
MURF,
where
first
time,
registration
mutually
reinforced
rather
than
being
treated
as
separate
issues.
MURF
leverages
three
modules:
shared
information
extraction
module
(SIEM),
multi-scale
coarse
(MCRM),
fine
(F2M).
The
is
carried
out
in
coarse-to-fine
manner.
During
registration,
SIEM
transforms
into
mono-modal
eliminate
modal
variances.
Then,
MCRM
progressively
corrects
global
rigid
parallaxes.
Subsequently,
repair
local
non-rigid
offsets
uniformly
implemented
F2M.
fused
provides
feedback
improve
accuracy,
improved
result
further
improves
result.
For
fusion,
solely
preserving
original
existing
methods,
we
attempt
incorporate
texture
enhancement
fusion.
We
test
on
four
types
of
data
(RGB-IR,
RGB-NIR,
PET-MRI,
CT-MRI).
Extensive
results
validate
superiority
universality
MURF.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2022,
Номер
18(12), С. 89 - 105
Опубликована: Сен. 14, 2022
This
research
is
aimed
at
planning
the
manner
in
which
secure
5G
communication
can
be
controlled
based
on
traffic
floods.
To
accomplish
excellent
administration
execution
of
organization
observing
and
directing
calculation
inescapable,
dynamic
steering
actual
equipment
isn't
reasonable
for
practical
plans
action.
Accordingly,
to
bring
down
functional
capital
consumption,
we
propose
a
strategy
called
versatile
made
do
with
help
(Quality
Service
MANET
(Mobile
specially
appointed
Network).
A
model
will
fulfilling
needs
customers
simultaneously
gives
huge
investment
funds
item
cost
convenience
was
presented
this
paper.
perform
steering,
planned
geography
virtualized
climate.
We
customized
CHAOS
network
flood
board
goes
about
as
consistent
northward
API
directing.
Network
infused
dynamically
from
1MB
up
10MB
(connect
b/w)
progressive
way
similar
10
occurrences.
In
conclusion,
performed
applying
control
hypothetical
method
assistance
calculations.
By
looking
two
situations,
noticed
prominent
distinction
throughput
controlling
application
MANETs.
data
refreshed
after
clockwork.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(10), С. 122 - 139
Опубликована: Май 24, 2022
Dark
web
is
a
canopy
concept
that
denotes
any
kind
of
illicit
activities
carried
out
by
anonymous
persons
or
organizations,
thereby
making
it
difficult
to
trace.
The
content
on
the
dark
constantly
updated
and
changed.
collection
classification
such
illegal
are
challenging
tasks,
as
they
time-consuming.
This
problem
has
in
recent
times
emerged
an
issue
requires
quick
attention
from
both
industry
academia.
To
this
end,
efforts
have
been
made
article
crawler
capable
collecting
pages,
cleaning
them,
saving
them
document
database,
proposed.
carries
automatic
gathered
pages
into
five
classes.
classifiers
used
classifying
include
Linear
Support
Vector
Classifier
(SVC),
Naïve
Bayes
(NB),
Document
Frequency
(TF-IDF).
experimental
results
revealed
accuracy
rate
92%
81%
were
achieved
SVC
NB,
respectively.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(13), С. 4 - 14
Опубликована: Июль 11, 2022
An
interesting
paradigm
is
a
metaverse
which
represents
the
next
generation
of
using
internet
to
improve
human
lives
and
provide
new
way
communicate
by
building
system
that
let
user
represented
their
avatar
work,
socialize
play
virtually
integrating
multiple
technologies
such
as
blockchain,
artificial
intelligence
well
virtual
augmented
reality.
However,
this
may
preserve
many
problems
related
security
privacy
starting
from
data
breaches
identity
theft,
in
paper
an
overview
world
architecture
connects
real
discuss
main
risks
within
Metaverse
Periodicals of Engineering and Natural Sciences (PEN),
Год журнала:
2021,
Номер
10(1), С. 178 - 178
Опубликована: Дек. 30, 2021
Copyright
is
a
tool
for
preventing
anyone
forged
to
copy
an
electronic
work
from
another
person
and
claim
that
referred
him.
Since
the
identity
of
always
determined
by
his
name
biometrics,
there
concern
handle
this
information,
preserve
copyright.
In
paper,
new
idea
copyright
technology
used
prove
video
copyright,
using
blind
watermarking
technique,
ownership
information
hidden
inside
frames
linear
congruential
generator
(LCG)
adapted
locations
vector
features
extracted
biometric
image
owner
instead
watermark
in
Pseudo
Noise
sequences
or
any
other
feature
extraction
technique.
When
providing
watermarked
vector,
statistical
operation
increase
randomization
state
amplifier
factors
LCG
function.
provides
random
positions
where
owner's
stored
video.
The
proposed
method
not
difficult
execute
can
present
adaptable
imperceptibility
robustness
performance.
output
results
show
approach
based
on
average
PSNR
embedded
50
around
47.5
dB
while
remains
undetectable.
MSSIM
values
with
range
(0.83
0.99).
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(08), С. 34 - 48
Опубликована: Апрель 26, 2022
The
past
few
years
have
witnessed
a
huge
increase
in
the
application
of
facial
recognition,
detection,
and
analysis
technology.
However,
face
recognition
systems
remain
most
popular
among
general
public.
system
can
detect
presence
when
exposed
to
one.
accuracy
fairness
that
be
derived
from
such
necessitate
their
use,
because
humans,
particularly
security
personnel
tired
target
wrong
person
as
suspect.
artificial
intelligence
are
properly
trained
capable
efficiently
identifying
classifying
faces
without
errors.
In
this
work,
use
Matlab
language
was
employed
building
software
is
recognizing
differentiating
different
patterns.
proposed
equipped
with
camera
serves
practical
aspect
captures
shots
sent
theoretical
part
special
program
designed
recognize
by
comparing
them
database
stored
within
program.
work
involved
Quantum
Neural
Network.
training
dataset
made
up
features
vectors
were
obtained
well-known
set
images
people.
Here,
Principle
Component
Analysis
(PCA)
used
for
extraction
feature
then
prepared
next
step.
experimental
results
revealed
efficient
achieved
through
well-trained
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(08), С. 124 - 137
Опубликована: Апрель 26, 2022
A
major
issue
in
the
field
of
education
is
exam
malpractice
and
other
forms
academic
dishonesty,
where
efforts
made
towards
assessment
students
are
undercut.
In
order
to
address
this
menace,
a
cheating
detection
system
has
been
proposed
study.
The
can
detect
real-time.
uses
video
surveillance
monitor
activities
student
during
exams,
especially
abnormal
behavior.
development
involved
use
three
different
techniques,
with
functions.
first
technique
helps
determining
direction
students’
heads
when
they
move
from
their
initial
direction,
which
script.
Some
form
involves
peeping
at
scripts
people
writing
same
exam.
Whenever
observes
deviation
that
exceeds
set
threshold,
it
classifies
behavior
as
abnormal.
second
works
movement
student’s
iris.
It
detects
iris
moves
copy
answers
written
documents
like
mobile
phones,
books,
hands,
summary
papers.
third
used
identifying
contact
between
hands
face,
well
for
shared
students,
such
sharing
incriminating
materials.
When
any
these
detected,
an
automatic
alarm
alerts
authority
about
thereby
minimizing
error
rate
occur
result
manual
monitoring.