{"title":"Gesture Recognition and Sign Language Detection using Deep Learning","authors":"Sherin Shanavas, Naila N N, Harikrishnan S R","doi":"10.48175/ijarsct-19315","DOIUrl":"https://doi.org/10.48175/ijarsct-19315","url":null,"abstract":"Gesture recognition and sign language detection are essential for improving human-computer interaction and accessibility. The proposed system employs deep learning techniques using TensorFlow and Keras, combined with computer vision capabilities of OpenCV, to enhance the accuracy of gesture and sign language interpretation. Convolutional Neural Networks (CNNs) are utilised to extract spatial and spatiotemporal features from video frames, ensuring robust gesture recognition. For sign language detection, CNNs recognize static hand gestures, while sequential models built with Keras facilitate the translation of continuous sign language. This integration showcases the potential of TensorFlow, Keras, and OpenCV in creating more inclusive and intuitive digital experiences","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"33 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mr. Pradeep Nayak, Lavanya M Moger, Lohit M Patgar, Manish D Salian, Manoj Rao
{"title":"A Review on a Study of Block Chain-Based Malware Detection System for Smartphone Applications","authors":"Mr. Pradeep Nayak, Lavanya M Moger, Lohit M Patgar, Manish D Salian, Manoj Rao","doi":"10.48175/ijarsct-19312","DOIUrl":"https://doi.org/10.48175/ijarsct-19312","url":null,"abstract":"The widespread use of smartphones in modern culture has resulted in an increased threat of malware targeting these devices, demanding novel techniques to improve security. Blockchain technology has emerged as a possible alternative due to its decentralization, transparency, and immutability. This research paper looks at the state of blockchain-based malware detection systems for smartphone applications. We discuss typical malware detection approaches and the obstacles they confront in the mobile context. We also go over the fundamentals of blockchain technology and how it can be used to improve security. We examine various techniques to integrate blockchain into malware detection systems using case studies and academic articles, emphasizing the benefits of decentralization and transparency. Despite the potential benefits, we find several issues with blockchain-based solutions, including scalability, performance, and privacy concerns. Finally, we explore future research areas and provide insights into how to overcome current limits and improve the effectiveness of these systems. Overall, the purpose of this work is to provide a full understanding of blockchain-based malware detection for cellphones, as well as to guide future research in this crucial area of cybersecurity","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"52 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Compression and Various Approaches – A Review","authors":"Ritu Shrivastava, Manila Jain","doi":"10.48175/ijarsct-19317","DOIUrl":"https://doi.org/10.48175/ijarsct-19317","url":null,"abstract":"Medical images are very much important in the field of medical science for the future reference of the patients, needs to be stored. These images require the process of compression before storing it. Compression is a process of encoding the image and to reduce the size of image, storage and transmission. In this paper comparative analysis of different medical images compression techniques and performance results has been discussed. However, the medical image compression has intense scope in future but it also has lot of difficulties and challenges to achieve necessities of the medical field","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"22 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141927862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diagnosis of Parkinson's: A Novel Approach","authors":"Omkar, Anith, Pratik, Sushmitha, Sruthi Dinesh","doi":"10.48175/ijarsct-19316","DOIUrl":"https://doi.org/10.48175/ijarsct-19316","url":null,"abstract":"In Europe, 1.2 million people suffer with Parkinson's disease (PD), and during the next few decades, there will likely be an exponential increase in the disease's prevalence. The lack of neurologists qualified to provide skilled care for Parkinson's disease (PD) will provide a challenge to this epidemiological trend. Patients are calling for strict symptom management and treatment education as Parkinson's disease (PD) becomes more widely recognized. Furthermore, due to the very diverse character of symptoms among patients as well as changes within the same patient, new tools are needed to enable clinicians and patients monitor the disease in the context of their daily lives and modify treatment in a more pertinent manner. Currently, a number of body-worn sensors (BWS) have been proposed to track clinical aspects of parkinsonian patients, including motor variations like tremor, has been included to tools for research and patient management. Here, we offer a useful anthology that highlights the features of the BWSs that PD patients in Europe use the most, with an emphasis on how they might be used as instruments to enhance therapy management. Technology for monitoring non-motor aspects is also taken into consideration. BWS undoubtedly present fresh chances to enhance PD management tactics, but it's important to define exactly how they fit into everyday routine treatment.","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"37 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mr. Pradeep Nayak, Mr. Darshan K Revankar, Mr. Gautham P Kini, Mr. Yashash Raj C G, Ms. Dikshita Devadiga
{"title":"Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing","authors":"Mr. Pradeep Nayak, Mr. Darshan K Revankar, Mr. Gautham P Kini, Mr. Yashash Raj C G, Ms. Dikshita Devadiga","doi":"10.48175/ijarsct-19314","DOIUrl":"https://doi.org/10.48175/ijarsct-19314","url":null,"abstract":"This paper explores the benefits of cloud storage, a fundamental component of cloud computing, which provides users with nearly limitless storage capabilities. Users can substantially decrease their local storage requirements by allowing data to be outsourced to cloud servers. However, the paper also addresses security privacy concerns linked to cloud storage, which stem from data ownership and management division, resulting in users losing direct control over their outsourced data. \u0000The authors concentrate on the challenge of verifiable outsourced data deletion, a significant issue that has not been adequately addressed in either industry or academic circles. They present an effective fine-grained outsourced data deletion scheme utilizing the invertible Bloom filter. This solution facilitates both public and private verification of the storage and deletion processes. Suppose the cloud server fails to manage or remove the data accurately and creates the associated evidence. In that case, users can detect any malicious actions by the cloud server with a high likelihood. \u0000Additionally, the authors note that within their proposed scheme, the computational complexity of both data deletion and verification of deletion results remains unaffected by the quantity of outsourced data blocks. This property makes the scheme appropriate for extensive data deletion scenarios. \u0000Ultimately, the paper includes a thorough security evaluation and performance assessment, validating the security and practicality of the proposed scheme. This comprehensive method for tackling the issue of verifiable outsourced data deletion in cloud storage represents a notable contribution to the field","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"29 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Never Say “NO”\u0000(Strategies for Nurses to Communicate Politely)","authors":"Capt. Usha Banerjee, Ms. D. Maryline Flinsi","doi":"10.48175/ijarsct-19239","DOIUrl":"https://doi.org/10.48175/ijarsct-19239","url":null,"abstract":"Effective communication is the cornerstone of quality patient care and nurses are essential in fostering understanding, compassion, and respect in their interactions with patients, families, and other healthcare professionals. In the current healthcare system, one of the frequent complaints that patients express on post-discharge satisfaction surveys is rude behavior of the staff. By directly saying “NO”, nurses make patients to feel unwanted and neglected. Many times, this neglect has landed in the loss of patient attachment and lead to an increased risk of liability and dissatisfaction. In this article the impact of saying no to the patient and alternative strategiesof saying no has been discussed","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"3 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141796858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}