To see the other types of publications on this topic, follow the link: Smarty (Computer file).

Journal articles on the topic 'Smarty (Computer file)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Smarty (Computer file).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Iqbal, Iqbal. "Designing Game File Compression Applications With Implementing the Stout Code Algorithm." Management of Information System Journal 3, no. 1 (2024): 1–9. https://doi.org/10.47065/mis.v3i1.1917.

Full text
Abstract:
Games today are increasingly modern and have stunning graphics so that the size of the game files contained in the game becomes very large, because these games are increasingly modern and have very stunning graphics so that the graphics are very realistic. Games that are now available on computers or smart phones have stunning graphics and each one must have a game file that is on the storage media. Game files contained in the storage media can cause the capacity of the storage media to reach its limit, and game files on the computer version usually require that the game be downloaded or files
APA, Harvard, Vancouver, ISO, and other styles
2

Manakhari, Sushanth Sreenivasamurthy, Ajinkya Prabhu Jadhav, Twinkle Paraye, and Anurag Gate. "Improving Data Accessibility with Distributed File System: A Blockchain Ethereum Approach." European Journal of Information Technologies and Computer Science 4, no. 4 (2024): 7–12. http://dx.doi.org/10.24018/compute.2024.4.4.133.

Full text
Abstract:
In the evolving landscape of digital data management, blockchain technology emerges as a transformative force, particularly through its implementation within Ethereum. This paper delves into the role of Ethereum in enhancing data accessibility across distributed file systems. By leveraging the power of smart contracts, Ethereum introduces a level of automation and reliability previously unattainable in traditional systems. The integration of Ethereum with decentralized storage solutions like the Inter Planetary File System (IPFS) facilitates not only more transparent and efficient access to da
APA, Harvard, Vancouver, ISO, and other styles
3

Alrobieh, Ziad Saif, and Ali Mohammed Abdullah Ali Raqpan. "File Carving Survey on Techniques, Tools and Areas of Use." Transactions on Networks and Communications 8, no. 1 (2020): 16–26. http://dx.doi.org/10.14738/tnc.81.7636.

Full text
Abstract:
In digital and computer forensics, file carving is a very hot research topic. That is the main reason why the research is needed to be focused on improving file carving techniques, so that digital investigation can obtain important data and evidence from damaged or corrupted storage media. In the digital forensic investigation, analyzing the unallocated space of storage media is necessary to extract the deleted or pre-written files when the file system metadata is missing or corrupted. Data carving can be defined as a method to recover the file from unallocated space based on different factors
APA, Harvard, Vancouver, ISO, and other styles
4

Harabuga, Yu S. "FEATURES OF COMPUTER TECHNICAL RESEARCH OF THE INFORMATION IN THE MEMORY OF SIM, USIM AND R-UIM-CARDS." Theory and Practice of Forensic Science and Criminalistics 17 (November 29, 2017): 318–24. http://dx.doi.org/10.32353/khrife.2017.40.

Full text
Abstract:
The paper considers the features of expert research of elementary files contents of SIM, USIM and R-UIM-cards, the information on which is absent in the current edition of technique 10.9.10 «Technique of computer technical research of information in the memory of SIM-cards». Effective standards which regulate the structure of files in SIM, USIM and R-UIM-cards, are specified. For today there are three types of identification modules of cellular communication customers: SIM-cards for networks of standard GSM, R-UIM-cards for networks ofstandard CDMA and USIM-cards for networks ofstandards UMTS
APA, Harvard, Vancouver, ISO, and other styles
5

N. Sangeeta and Seung Yeob Nam. "Blockchain and Interplanetary File System (IPFS)-Based Data Storage System for Vehicular Networks with Keyword Search Capability." Electronics 12, no. 7 (2023): 1545. http://dx.doi.org/10.3390/electronics12071545.

Full text
Abstract:
Closed-circuit television (CCTV) cameras and black boxes are indispensable for road safety and accident management. Visible highway surveillance cameras can promote safe driving habits while discouraging moving violations. According to CCTV laws, footage captured by roadside cameras must be securely stored, and authorized persons can access it. Footages collected by CCTV and Blackbox are usually saved to the camera’s microSD card, the cloud, or hard drives locally but there are concerns about security and data integrity. These issues may be addressed by blockchain technology. The cost of stori
APA, Harvard, Vancouver, ISO, and other styles
6

Carthen, Chase D., Araam Zaremehrjardi, Vinh Le, et al. "A Novel Spatial Data Pipeline for Orchestrating Apache NiFi/MiNiFi." International Journal of Software Innovation 12, no. 1 (2023): 1–14. http://dx.doi.org/10.4018/ijsi.333164.

Full text
Abstract:
In many smart city projects, a common choice to capture spatial information is the inclusion of lidar data, but this decision will often invoke severe growing pains within the existing infrastructure. In this article, the authors introduce a data pipeline that orchestrates Apache NiFi (NiFi), Apache MiNiFi (MiNiFi), and several other tools as an automated solution to relay and archive lidar data captured by deployed edge devices. The lidar sensors utilized within this workflow are Velodyne Ultra Puck sensors that produce 6-7 GB packet capture (PCAP) files per hour. By both compressing the file
APA, Harvard, Vancouver, ISO, and other styles
7

Telagam, Nagarjuna, Nehru Kandasamy, Menakadevi Nanjundan, and Arulanandth TS. "Smart Sensor Network based Industrial Parameters Monitoring in IOT Environment using Virtual Instrumentation Server." International Journal of Online Engineering (iJOE) 13, no. 11 (2017): 111. http://dx.doi.org/10.3991/ijoe.v13i11.7630.

Full text
Abstract:
A remote monitoring and control are one of the most important criteria for maximizing the production in any industry. With the development of modern industry the requirement for industrial monitoring system is getting higher. This project explains the real time scenario of monitoring temperature and humidity in industries. National Instruments my RIO is used and results are observed on Lab VIEW and VI Server. The server VI program and client VI program is developed in block diagram for the two sensor data. This proposed system develops a sensor interface device essential for sensor data acquis
APA, Harvard, Vancouver, ISO, and other styles
8

Alukwe, Chrispus. "Enhancing Cybersecurity: Smart Intrusion Detection in File Server SYSTEMS." Journal of Science, Innovation and Creativity 2, no. 1 (2023): 1–6. http://dx.doi.org/10.58721/jsic.v2i1.287.

Full text
Abstract:
System security is a major challenge worldwide, which has led to the increasing implementation of security surveillance systems in the public and private sectors. Likewise, it is inevitable to secure server-based systems that store vast amounts of sensitive data that is accessed from time to time. Intrusion Detection Systems (IDS) use metrics to detect anomalous activity on computers and computer networks. Modern detection algorithms try to reach detection metrics by acting as an antivirus. This is not enough, the need to explore more controlled, porous, and more secure systems is inevitable,
APA, Harvard, Vancouver, ISO, and other styles
9

Srivastava, Nayan. "A.I.- Smart Assistant." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 2384–87. http://dx.doi.org/10.22214/ijraset.2021.35553.

Full text
Abstract:
Artificial Intelligent is widely used when it comes to everyday life. Computer science explains AI research as a study of brilliant agents. Every In almost any direction one turns to today, some computer-based information processing technology intervention, whether by a person knowingly or not. Artificial Intelligence has already changed our way of life. A device that we can see in its nature and take action increases its chances of success goals. Input to the recommendations algorithm can be a file for user database and items, and careless removal will be recommendations. User to install in t
APA, Harvard, Vancouver, ISO, and other styles
10

Qiao, Yanchen, Weizhe Zhang, Xiaojiang Du, and Mohsen Guizani. "Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–22. http://dx.doi.org/10.1145/3436751.

Full text
Abstract:
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the security of IoT devices. The traditional malware classification methods mainly rely on feature engineering. To improve accuracy, a large number of different types of features will be extracted from malware files in these methods. That brings a high complexity to the classification. To solve these issues, a malware classification method based on Word2Vec and Multilayer Perception (
APA, Harvard, Vancouver, ISO, and other styles
11

Chen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing, and Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.

Full text
Abstract:
The emergence of the cloud storage has brought great convenience to people’s life. Many individuals and enterprises have delivered a large amount of data to the third-party server for storage. Thus, the privacy protection of data retrieved by the user needs to be guaranteed. Searchable encryption technology for the cloud environment is adopted to ensure that the user information is secure with retrieving data. However, most schemes only support single-keyword search and do not support file updates, which limit the flexibility of the scheme. To eliminate these problems, we propose a blockchain-
APA, Harvard, Vancouver, ISO, and other styles
12

Jawdhari, Hayder A., and Alharith A. Abdullah. "A New Environment of Blockchain based Multi Encryption Data Transferring." Webology 18, no. 2 (2021): 1379–91. http://dx.doi.org/10.14704/web/v18i2/web18396.

Full text
Abstract:
Blockchain is one of the technologies provided by the global distribution of computing power. Simply put, the blockchain is the digital ledger in which transactions are recorded. It all started with a desire to see a new form of security system for transferring confidential files. It aims to achieve many goals like decreasing the process time for transferring files to the other party, and reducing the overall expenses as the files are only transferred across the blockchain network with no need for the files to be uploaded and downloaded to the drive. More effective applications have the abilit
APA, Harvard, Vancouver, ISO, and other styles
13

Lee, Jino, and Taeshik Shon. "Forensic Analysis of IoT File Systems for Linux-Compatible Platforms." Electronics 11, no. 19 (2022): 3219. http://dx.doi.org/10.3390/electronics11193219.

Full text
Abstract:
Due to recent developments in IT technology, various IoT devices have been developed for use in various environments, such as card smart TVs, and smartphones Communication between IoT devices has become possible. Various IoT devices are found in homes and in daily life, and IoT technologies are being combined with vehicles, power, and wearables, amongst others. Although the usage of IoT devices has increased, the level of security technology applied to IoT devices is still insufficient. There is sensitive information stored inside IoT devices, such as personal information and usage history, so
APA, Harvard, Vancouver, ISO, and other styles
14

Prat, Lionel, Cheryl Baker, and Nhien An Le-Khac. "MapExif." International Journal of Digital Crime and Forensics 7, no. 2 (2015): 53–78. http://dx.doi.org/10.4018/ijdcf.2015040104.

Full text
Abstract:
Recently, the integration of geographical coordinates into a picture has become more and more popular. Indeed almost all smartphones and many cameras today have a built-in GPS receiver that stores the location information in the Exif header when a picture is taken. Although the automatic embedding of geotags in pictures is often ignored by smart phone users as it can lead to endless discussions about privacy implications, these geotags could be really useful for investigators in analysing criminal activity. Currently, there are many free tools as well as commercial tools available in the marke
APA, Harvard, Vancouver, ISO, and other styles
15

Hammad, Muhammad, Jawaid Iqbal, Ch Anwar ul Hassan, et al. "Blockchain-Based Decentralized Architecture for Software Version Control." Applied Sciences 13, no. 5 (2023): 3066. http://dx.doi.org/10.3390/app13053066.

Full text
Abstract:
Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. Following the success of bitcoin, the first practical application of blockchain, it is being implemented in other fields such as healthcare, supply chains, financial management, real estate, electoral systems, and so on. Blockchain’s core features include decentralization, immutability, and interminability. Most version control repositories are centralized and can be modified
APA, Harvard, Vancouver, ISO, and other styles
16

Ai, Sophy, and Jangwoo Kwon. "Extreme Low-Light Image Enhancement for Surveillance Cameras Using Attention U-Net." Sensors 20, no. 2 (2020): 495. http://dx.doi.org/10.3390/s20020495.

Full text
Abstract:
Low-light image enhancement is one of the most challenging tasks in computer vision, and it is actively researched and used to solve various problems. Most of the time, image processing achieves significant performance under normal lighting conditions. However, under low-light conditions, an image turns out to be noisy and dark, which makes subsequent computer vision tasks difficult. To make buried details more visible, and reduce blur and noise in a low-light captured image, a low-light image enhancement task is necessary. A lot of research has been applied to many different techniques. Howev
APA, Harvard, Vancouver, ISO, and other styles
17

Chen, Yeong-Chin, Mariana Syamsudin, and Sunneng S. Berutu. "Pretrained Configuration of Power-Quality Grayscale-Image Dataset for Sensor Improvement in Smart-Grid Transmission." Electronics 11, no. 19 (2022): 3060. http://dx.doi.org/10.3390/electronics11193060.

Full text
Abstract:
The primary source of the various power-quality-disruption (PQD) concerns in smart grids is the large number of sensors, intelligent electronic devices (IEDs), remote terminal units, smart meters, measurement units, and computers that are linked by a large network. Because real-time data exchange via a network of various sensors demands a small file size without an adverse effect on the information quality, one measure of the power-quality monitoring in a smart grid is restricted by the vast volume of the data collection. In order to provide dependable and bandwidth-friendly data transfer, the
APA, Harvard, Vancouver, ISO, and other styles
18

Nallamothu, Tharun K. "Enhance Cross-Device Experiences Using Smart Connect Ecosystem." International Journal of Technology, Management and Humanities 9, no. 03 (2023): 26–35. https://doi.org/10.21590/ijtmh.2023090303.

Full text
Abstract:
Smart Connect is a computer program that connects multiple devices, including PCs, tablets, smartphones, andsmart TVs, to make them one digital ecosystem. It enables users to control accessories, share data, stream shows,and change tasks smoothly. Smart Connect employs wireless technologies such as Bluetooth and Wi-Fi toconnect and manage devices, making it easy for users to extend displays, sync notifications, and leveragesophisticated features such as converting mobile devices into desktops and smartphones into webcams. Smart Connect resolves challenges such as fragmented workflows, ineffici
APA, Harvard, Vancouver, ISO, and other styles
19

E, ARUL, VISHNU PRASANTH B, SUGANTH SUGANTH, MITHUNRAJ P, and KATHIRAVAN M. "SPEECH ENABLED OPERATING SYSTEM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–9. https://doi.org/10.55041/ijsrem40378.

Full text
Abstract:
The concept of the work is to create a speech interface while controlling computers using OS to manage computer operations through speech. It is more than a mere corridor is giving a smooth entry into a computer but at the same time we have made what seems to be complex operation very easy. It has been implemented on the Linux platform and uses Speech Recognition libraries with Google Speech API to convert typed direct spoken word commands to the computer fully optimized with pyttsx3 python for feedback voice output to the user. The features that are supported by this interface include typing,
APA, Harvard, Vancouver, ISO, and other styles
20

Xu, Yuanjin. "Application of Remote Sensing Image Data Scene Generation Method in Smart City." Complexity 2021 (January 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/6653841.

Full text
Abstract:
Remote sensing image simulation is a very effective method to verify the feasibility of sensor devices for ground observation. The key to remote sensing image application is that simultaneous interpreting of remote sensing images can make use of the different characteristics of different data, eliminate the redundancy and contradiction between different sensors, and improve the timeliness and reliability of remote sensing information extraction. The hotspots and difficulties in this direction are based on remote sensing image simulation of 3D scenes on the ground. Therefore, constructing the 3
APA, Harvard, Vancouver, ISO, and other styles
21

Shi, Daijiao, Chao Jiang, and Zhongcheng Song. "Utilizing Multimedia Data Transmission Technology for Interactive Design in Smart Home Products." International Journal of Interdisciplinary Telecommunications and Networking 17, no. 1 (2024): 1–18. https://doi.org/10.4018/ijitn.365122.

Full text
Abstract:
In the actual production of smart home products, it is difficult to complete the matching design in specific stages. Therefore, the design workload at different stages will have a certain time gap. For the first time in this paper, user groups are divided into two categories, namely users, controllers, buyers and Experiencers. A new smart home system model is designed. Its innovation lies in the integrated system of Internet of things and smart home. Connect the home appliances to the network through the gateway, and communicate with mobile phones and computers. Through analyzing and comparing
APA, Harvard, Vancouver, ISO, and other styles
22

Banerjee, S., F. Steenkeste, P. Couturier, M. Debray, and A. Franco. "Telesurveillance of elderly patients by use of passive infra-red sensors in a 'smart' room." Journal of Telemedicine and Telecare 9, no. 1 (2003): 23–29. http://dx.doi.org/10.1258/135763303321159657.

Full text
Abstract:
We have developed an automated surveillance system based on passive infra-red sensors. Eight sensors were installed in a hospital room. A computer automatically captured data from the sensors every night from 21:00 until 06:00 the following morning. The sensors were polled twice per second and when a sensor was activated by movement, the event and time were recorded in a data file. At the end of the surveillance period the program analysed the data and generated a report showing the activities taking place in the room and their times. Four elderly patients were observed for a total of 97 night
APA, Harvard, Vancouver, ISO, and other styles
23

Pallavi, Deshmukh, Shinde Lalita, Ahire Namrata, and Kamod Sayli. "Transcription Management System." International Journal of Trend in Scientific Research and Development 2, no. 3 (2018): 2100–2103. https://doi.org/10.31142/ijtsrd11433.

Full text
Abstract:
Transcription Management System automates an entire workflow of voice and transcripts files with a very simple and easier manner. The complete synthesis is based on interactive voice response where user can record their information in terms of audio file. Recent Admission Management Systems are often being breached for the visually impaired persons. They need to depend on another person for filling any kinds of forms. So our project helps such kind of people to fill their forms by recording voice. Any kind of user can utilize this system and reduce their time by storing data in wave format ins
APA, Harvard, Vancouver, ISO, and other styles
24

Mankar, Ishan. "Smart Surveillance System Using RESNET-50 and MTCNN." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 4380–86. http://dx.doi.org/10.22214/ijraset.2024.62554.

Full text
Abstract:
Abstract: In recent years, advances in computer vision and artificial intelligence have led to the development of sophisticated surveillance systems capable of tracking and identifying individuals in a variety of situations. This research presents a new intelligent surveillance system designed to track multiple people in a video and generate a comprehensive log file to keep records of identified people. The proposed system integrates state-of-the-art techniques in face detection and recognition to achieve accurate and efficient identification of people in video streams. The system uses a custo
APA, Harvard, Vancouver, ISO, and other styles
25

Suseno, Taufiq Rizky Darmawan, Irawan Afrianto, and Sufa Atin. "Strengthening data integrity in academic document recording with blockchain and InterPlanetary file system." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 2 (2024): 1759. http://dx.doi.org/10.11591/ijece.v14i2.pp1759-1769.

Full text
Abstract:
A diploma is a certificate or official document given by a school or college that is useful for continuing education, applying for jobs, and assessing student intelligence. The main problem with diplomas and other academic documents is that many are forged. This study aims to develop a prototype for recording student academic data using blockchain and blockchain and InterPlanetary file system (IPFS). The research stages were conducted with system conceptualization, data modeling, smart contract development, IPFS integration, data transaction development, user interface/user experience (UI/UX)
APA, Harvard, Vancouver, ISO, and other styles
26

Janhavi Satam. "Examination of Approaches for Identifying Vulnerabilities in Smart Contracts." Journal of Electrical Systems 20, no. 4s (2024): 2162–67. http://dx.doi.org/10.52783/jes.2322.

Full text
Abstract:
Objective: By reviewing various previous works, this paper collects the multiple of approaches, strategies used to identify vulnerabilities in smart contracts. Blockchain is a decentralized technology that securely and immutably, records transactions across numerous computers in a visible manner. On a blockchain, smart contracts are self-executing agreements that independently execute and verify contract conditions. This reduces the need for middlemen and increases transparency. Smart contract vulnerabilities are problems in the code that could allow other parties to gain access to, alter, or
APA, Harvard, Vancouver, ISO, and other styles
27

Durner, Dominik, Badrish Chandramouli, and Yinan Li. "Crystal." Proceedings of the VLDB Endowment 14, no. 11 (2021): 2432–44. http://dx.doi.org/10.14778/3476249.3476292.

Full text
Abstract:
Cloud analytical databases employ a disaggregated storage model, where the elastic compute layer accesses data persisted on remote cloud storage in block-oriented columnar formats. Given the high latency and low bandwidth to remote storage and the limited size of fast local storage, caching data at the compute node is important and has resulted in a renewed interest in caching for analytics. Today, each DBMS builds its own caching solution, usually based on file-or block-level LRU. In this paper, we advocate a new architecture of a smart cache storage system called Crystal , that is co-located
APA, Harvard, Vancouver, ISO, and other styles
28

Yu, LiWei, Lei Zhang, and Zhen Gong. "An Optimization Model for Landscape Planning and Environmental Design of Smart Cities Based on Big Data Analysis." Scientific Programming 2022 (April 20, 2022): 1–12. http://dx.doi.org/10.1155/2022/2955283.

Full text
Abstract:
This paper adopts “digital landscape design logic,” analyzes and researches smart city and digital landscape design, and builds a digital city based on design logic, design basis, environment analysis, and results in a presentation based on the dilemma of landscape garden planning and design at this stage and the development trend of the smart garden and digital landscape design. The optimization model of the landscape and environment design is constructed based on design logic, design basis, environment analysis, and result presentation. First, on the Hadoop distributed computing platform bas
APA, Harvard, Vancouver, ISO, and other styles
29

Horvath, Kaleb, Mohamed Riduan Abid, Thomas Merino, Ryan Zimmerman, Yesem Peker, and Shamim Khan. "Cloud-Based Infrastructure and DevOps for Energy Fault Detection in Smart Buildings." Computers 13, no. 1 (2024): 23. http://dx.doi.org/10.3390/computers13010023.

Full text
Abstract:
We have designed a real-world smart building energy fault detection (SBFD) system on a cloud-based Databricks workspace, a high-performance computing (HPC) environment for big-data-intensive applications powered by Apache Spark. By avoiding a Smart Building Diagnostics as a Service approach and keeping a tightly centralized design, the rapid development and deployment of the cloud-based SBFD system was achieved within one calendar year. Thanks to Databricks’ built-in scheduling interface, a continuous pipeline of real-time ingestion, integration, cleaning, and analytics workflows capable of en
APA, Harvard, Vancouver, ISO, and other styles
30

Yang, Ting, Guanghua Zhang, Yin Li, Yiyu Yang, He Wang, and Yuqing Zhang. "Detecting Privacy Leakage of Smart Home Devices through Traffic Analysis." Security and Communication Networks 2022 (July 15, 2022): 1–10. http://dx.doi.org/10.1155/2022/5655314.

Full text
Abstract:
Under the management of the Internet of Things platform, smart home devices can be operated remotely by users and greatly facilitate people’s life. Currently, smart home devices have been widely accepted by consumers, and the number of smart home devices is rising rapidly. The increase of smart home devices introduces various security hazards to users. Smart home devices are vulnerable to side-channel attacks based on network traffic. The event of smart home devices can be identified by network surveillants. Given this situation, we designed a set of standardized workflows for traffic capturin
APA, Harvard, Vancouver, ISO, and other styles
31

Dheyaa Ismael, Khansaa, and Stanciu Irina. "Face recognition using viola-jones depending on python." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 3 (2020): 1513. http://dx.doi.org/10.11591/ijeecs.v20.i3.pp1513-1521.

Full text
Abstract:
<p>In this paper, the proposed software system based on face recognition the proposed system can be implemented in the smart building or any VIP building need security interring in general, The human face will be recognized from a stream of pictures or video feed, this technology recognizes the person according to the specific algorithm, the algorithm that employed in this paper is the Viola–Jones object detection framework by using Python. The task of the proposed facial recognition system consists of two steps, the first one was detected the human face from live video using the webcame
APA, Harvard, Vancouver, ISO, and other styles
32

Ismael, Khansaa Dheyaa, and Stanciu Irina. "Face recognition using Viola-Jones depending on Python." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 3 (2020): 1513–21. https://doi.org/10.11591/ijeecs.v20.i3.pp1513-1521.

Full text
Abstract:
In this paper, the proposed software system based on face recognition the proposed system can be implemented in the smart building or any VIP building need security interring in general. The human face will be recognized from a stream of pictures or video feed, this technology recognizes the person according to the specific algorithm, the algorithm that employed in this paper is the Viola–Jones object detection framework by using Python. The task of the proposed facial recognition system consists of two steps, the first one was detected the human face from live video using the webcamera
APA, Harvard, Vancouver, ISO, and other styles
33

Dr., S.V. Pattlawar Dr. S.W. Mohod Neha Randhe. "Comparative Study of Development in Techniques for Smart Detection of Fire." International Journal of Research in Computer & Information Technology 7, no. 1 (2022): 9–14. https://doi.org/10.5281/zenodo.6676432.

Full text
Abstract:
The progress on fire detection technologies has been substantial over the last decade due to advances in sensor, microelectronics, and information technologies, as well as a greater understanding of fire physics. This paper provides a review of progress in fire detection technologies over the last decade, including various emerging sensor technologies (e.g., computer vision system, distributed fiber optic temperature sensor, and intelligent multiple sensors), signal processing, and monitoring technology (e.g., real-time control via the Internet) and integrated fire detection systems. Some prob
APA, Harvard, Vancouver, ISO, and other styles
34

Tanveer Baig, Z., and Chandrasekar Shastry. "Smart Hybridized Routing Protocol for Animal Monitoring and Tracking Applications." Scalable Computing: Practice and Experience 23, no. 4 (2022): 339–49. http://dx.doi.org/10.12694/scpe.v23i4.2040.

Full text
Abstract:
Wireless sensor networks (WSN) have been exploited for {countless} application domains, most notably the surveillance of environments and habitats, which has already become a critical mission. As a result, WSNs have been implemented to monitor animal care and track their health status. However, excessive energy utilization and communication traffic on packet transmissions lead to system deterioration, especially whenever perceived information captured in the monitoring area is transferred to the access point over multiple dynamic sinks. Further to manage the energy and data transmission issue,
APA, Harvard, Vancouver, ISO, and other styles
35

Fernández-Blanco, Gabriel, Iván Froiz-Míguez, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés. "Design, Implementation and Practical Energy-Efficiency Evaluation of a Blockchain Based Academic Credential Verification System for Low-Power Nodes." Applied Sciences 15, no. 12 (2025): 6596. https://doi.org/10.3390/app15126596.

Full text
Abstract:
The educational system manages extensive documentation and paperwork, which can lead to human errors and sometimes abuse or fraud, such as the falsification of diplomas, certificates or other credentials. In fact, in recent years, multiple cases of fraud have been detected, representing a significant cost to society, since fraud harms the trustworthiness of certificates and academic institutions. To tackle such an issue, this article proposes a solution aimed at recording and verifying academic records through a decentralized application that is supported by a smart contract deployed in the Et
APA, Harvard, Vancouver, ISO, and other styles
36

Schwarz, Franziska, Klaus Schwarz, Daniel Fuchs, Reiner Creutzburg, and David Akopian. "Firmware Vulnerability Analysis of Widely Used Low-Budget TP-Link Routers." Electronic Imaging 2021, no. 3 (2021): 135–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-135.

Full text
Abstract:
TP-Link Technologies Co, Ltd. is a Chinese manufacturer of networking products and has a 42% share of the consumer WLAN market, making it the market leader. The company sells about 150 million devices per year. Many people worldwide use the Internet every day and are connected to the Internet with their computers. In the world of smart homes, even coffee machines, refrigerators, smart sockets, and light bulbs have found their way to the Internet, not to mention the many smartphones, which are, of course, also connected to the Internet. Since many different dangers come from a heater or printer
APA, Harvard, Vancouver, ISO, and other styles
37

Pinheiro, Alexandre, Edna Dias Canedo, Rafael Timoteo De Sousa, and Robson De Oliveira Albuquerque. "Monitoring File Integrity Using Blockchain and Smart Contracts." IEEE Access 8 (2020): 198548–79. http://dx.doi.org/10.1109/access.2020.3035271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Alhaddad, Mohammed J., Monagi H. Alkinani, Mohammed Salem Atoum, and Alaa Abdulsalm Alarood. "Evolutionary Detection Accuracy of Secret Data in Audio Steganography for Securing 5G-Enabled Internet of Things." Symmetry 12, no. 12 (2020): 2071. http://dx.doi.org/10.3390/sym12122071.

Full text
Abstract:
With the unprecedented growing demand for communication between Internet of Things (IoT) devices, the upcoming 5G and 6G technologies will pave the path to a widespread use of ultra-reliable low-latency applications in such networks. However, with most of the sensitive data being transmitted over wireless links, security, privacy and trust management are emerging as big challenges to handle. IoT applications vary, from self-driving vehicles, drone deliveries, online shopping, IoT smart cities, e-healthcare and robotic assisted surgery, with many applications focused on Voice over IP (VoIP) and
APA, Harvard, Vancouver, ISO, and other styles
39

Dozias, Anne, Cristian Camilo Otalora-Leguizamón, Marco Bianchetti, and Maria Susana Avila-Garcia. "Smart pens to assist fibre optic sensors research: Evaluating OCR tools." Avances en Interacción Humano-Computadora, no. 1 (October 31, 2018): 41. http://dx.doi.org/10.47756/aihc.y3i1.42.

Full text
Abstract:
Reproducibility is one of the big challenges in research. Lab notebooks have been used to record data, observations and relevant remarks of the research processes. Smart pens are devices that record audio, handwriting notes thanks to micro patterned paper, and generate pdf files and audio enriched notes (pencasts). The handwriting notes can then be processed using optical character recognition (OCR) software to generate digital documents allowing the user to archive and access these notes in an easier way. However, OCR for handwriting is still a challenge in the computer vision research area.
APA, Harvard, Vancouver, ISO, and other styles
40

Patil, Anand N., and Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission." Journal of Autonomous Intelligence 6, no. 2 (2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.

Full text
Abstract:
<p>Adaptive transport technologies based on vehicular ad hoc networks (VANET) has proven considerable potential in light of the developing expansion of driver assistance and automobile telecommunication systems. However, confidentiality and safety are the vital challenges in vehicular ad hoc networks which could be seriously impaired by malicious attackers. While protecting vehicle privacy from threats, it is imperative to stop internal vehicles from putting out bogus messages. Considering these issues, a novel machine learning based message authentication combined with blockchain and in
APA, Harvard, Vancouver, ISO, and other styles
41

Yogesha, T., and Dr S. N. Thimmaraju. "Intelligent Web Mining: Using Text, Image, Audio, and Video Data to Gain Knowledge." Journal of Internet Services and Information Security 15, no. 1 (2025): 401–12. https://doi.org/10.58346/jisis.2025.i1.026.

Full text
Abstract:
There are various techniques for extracting relevant conclusions from various types of data the efficient approach that combines the power of data analysis, with intelligence and machine learning is smart web mining which enables the extraction of diverse data forms including text documents, videos and audio files and images effectively and efficiently. This study delves into the techniques and resources employed in web mining to accurately assess and comprehend data. Most web data is in the form of text. They are commonly fetched with algorithms like topic modelling, sentiment analysis, and o
APA, Harvard, Vancouver, ISO, and other styles
42

Ciorap, Mariana, Dogan Gures, and Cătălin Gabriel Dumitraş. "A Computer Aided Design Software Comparative Study with Applications in Industry 4.0 – Smart Manufacturing." Bulletin of the Polytechnic Institute of Iași. Machine constructions Section 68, no. 1 (2022): 47–68. http://dx.doi.org/10.2478/bipcm-2022-0004.

Full text
Abstract:
Abstract The concept Industry 4.0 implies many elements such as CAD/CAM/CAE, simulation, additive fabrication, IoT (internet of things) and it was a result of the demands of the industry in decreasing the period of product designing, flexibility of the design, and quick response to the market demands.. With the help of CAD software, the design period for a new product was reduced by almost 30 percent. Based on this reason, the CAD software family was developed during the last twenty years giving the possibility to create more complex 3D models, parametrization and calculus for product cost or
APA, Harvard, Vancouver, ISO, and other styles
43

Abish, Raj. M. S., Kumar. A. S. Manoj, and V. Murali. "Smart Assistant for Blind Humans using Rashberry PI." International Journal of Trend in Scientific Research and Development 2, no. 3 (2018): 1712–18. https://doi.org/10.31142/ijtsrd11498.

Full text
Abstract:
An OCR Optical Character Recognition system which is a branch of computer vision and in turn a sub class of Artificial Intelligence. Optical character recognition is the translation of optically scanned bitmaps of printed or hand written text into audio output by using of Raspberry pi. OCRs developed for many world languages are already under efficient use. This method extracts moving object region by a mixture of Gaussians based background subtraction method. A text localization and recognition are conducted to acquire text information. To automatically localize the text regions from the obje
APA, Harvard, Vancouver, ISO, and other styles
44

S. Jadhav, Vilas, Somnath A Wankhede, Priyanka B. Nikam, and Anil L. Tidar. "Greenhouse Monitoring and Controlling Using LabVIEW Automation." Journal of Control System and Control Instrumentation 9, no. 3 (2023): 27–33. http://dx.doi.org/10.46610/jocsaci.2023.v09i03.005.

Full text
Abstract:
Traditional greenhouses need to regulate or monitor and control the climactic condition changes to grow healthy plants and other crops. A greenhouse control system should ideally include data collecting, transmission, and remote monitoring. This paper design a system of a model that controls and monitor the temperature, light intensity and soil moisture level right and left side of the soil by sensing the values from sensors and controlling the temperature, and moisture of the soil using one fan, water pumps accordingly. Monitoring and controlling a greenhouse environment collects data from se
APA, Harvard, Vancouver, ISO, and other styles
45

Iacobescu, Ciprian, Gabriel Oltean, Camelia Florea, and Bogdan Burtea. "Unified InterPlanetary Smart Parking Network for Maximum End-User Flexibility." Sensors 22, no. 1 (2021): 221. http://dx.doi.org/10.3390/s22010221.

Full text
Abstract:
Technological breakthroughs have offered innovative solutions for smart parking systems, independent of the use of computer vision, smart sensors, gap sensing, and other variations. We now have a high degree of confidence in spot classification or object detection at the parking level. The only thing missing is end-user satisfaction, as users are forced to use multiple interfaces to find a parking spot in a geographical area. We propose a trustless federated model that will add a layer of abstraction between the technology and the human interface to facilitate user adoption and responsible dat
APA, Harvard, Vancouver, ISO, and other styles
46

Rashid, A. R. A., M. K. A. Azmi, W. M. Mukhtar, and N. A. M. Taib. "IoT-Integrated Smart Gardening System for Real-Time Monitoring and User-Controlled with Smart Film." Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 17, no. 1 (2025): 11–17. https://doi.org/10.54554/jtec.2025.17.01.002.

Full text
Abstract:
Internet of things (IoT) refers to devices connected to the internet that enable human-to-human or human-to-computer communication. It facilitates the collection and exchange of data between these devices and users. This study presents an IoT-based Smart Garden integrated with smart film technology, designed to predict light intensity and monitor daily plant growth. Despite a strong interest in gardening, many individuals lack the time to properly care for their plants. Therefore, this study proposes a simple and efficient method for plant monitoring and control using a smartphone or other con
APA, Harvard, Vancouver, ISO, and other styles
47

Palaiokrassas, Georgios, Petros Skoufis, Orfefs Voutyras, et al. "Combining Blockchains, Smart Contracts, and Complex Sensors Management Platform for Hyper-Connected SmartCities: An IoT Data Marketplace Use Case." Computers 10, no. 10 (2021): 133. http://dx.doi.org/10.3390/computers10100133.

Full text
Abstract:
In this paper, we demonstrate the multiple points of innovation when combining blockchain technology with Internet of Things (IoT) and security frameworks. The deployment and use of IoT device networks in smart city environments has produced an enormous amount of data. The fact that those data are possessed by multiple sources that use independent systems for data collection, storage, and use impedes the exploitation of their value. Blockchains, as distributed ledgers, can be used for addressing the development of a universal system for data collection and distribution. Smart contracts can be
APA, Harvard, Vancouver, ISO, and other styles
48

Mohammed, Marwa Sami, and Asaad Noori Hashim. "Protect medical records by using blockchain technology." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 1 (2023): 342. http://dx.doi.org/10.11591/ijeecs.v32.i1.pp342-352.

Full text
Abstract:
<span>Recently, medical records have been stored and shared locally, which creates a risk of data loss or corruption; these records may be stored and shared through cloud-based central data centers; nonetheless, this strategy has disadvantages, such as the need for significant storage space and the privacy concerns associated with network-wide data sharing. Medical records require increased security and confidentiality, furthermore, these records must be protected when transmitted to and shared with doctors of the same specialization, to solve this problem, blockchain technology was used
APA, Harvard, Vancouver, ISO, and other styles
49

Patel, Ochchhav, and Hiren Patel. "Enhancing Data Security in Healthcare IoT: An Innovative Blockchain-based Solution." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10s (2023): 69–80. http://dx.doi.org/10.17762/ijritcc.v11i10s.7597.

Full text
Abstract:
The Internet of Things (IoT) has revolutionized the healthcare industry by enabling the seamless integration of medical devices, sensors, and data-driven applications. However, the large influx of sensitive healthcare data and the proliferation of linked devices have caused grave worries about data security and privacy. Traditional centralized security systems are unable to handle the changing threats and problems in the IoT healthcare setting. This study suggests a novel strategy for boosting data security in the healthcare industry that makes use of blockchain technology. The main goal of th
APA, Harvard, Vancouver, ISO, and other styles
50

Kaneriya, Jayana, and Hiren Patel. "A Secure and Privacy-Preserving Student Credential Verification System Using Blockchain Technology." International Journal of Information and Education Technology 13, no. 8 (2023): 1251–60. http://dx.doi.org/10.18178/ijiet.2023.13.8.1927.

Full text
Abstract:
Advancements in digital technologies have made the storage, sharing, and verification of educational credentials extremely important for entities such as students, universities, institutions, and companies. Digital credentials play an important role in students’ lives as a lifelong learning passport. The educational field is experiencing numerous issues such as academic record forgery, record misuse, credential data tampering, time-consuming verification procedures, and issues related to ownership and control. Modern-day technology, Blockchain, is an appropriate alternative to resolve these is
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!