International Journal of Advanced Research in Science, Communication and Technology最新文献

筛选
英文 中文
Gesture Recognition and Sign Language Detection using Deep Learning 利用深度学习进行手势识别和手语检测
Sherin Shanavas, Naila N N, Harikrishnan S R
{"title":"Gesture Recognition and Sign Language Detection using Deep Learning","authors":"Sherin Shanavas, Naila N N, Harikrishnan S R","doi":"10.48175/ijarsct-19315","DOIUrl":"https://doi.org/10.48175/ijarsct-19315","url":null,"abstract":"Gesture recognition and sign language detection are essential for improving human-computer interaction and accessibility. The proposed system employs deep learning techniques using TensorFlow and Keras, combined with computer vision capabilities of OpenCV, to enhance the accuracy of gesture and sign language interpretation. Convolutional Neural Networks (CNNs) are utilised to extract spatial and spatiotemporal features from video frames, ensuring robust gesture recognition. For sign language detection, CNNs recognize static hand gestures, while sequential models built with Keras facilitate the translation of continuous sign language. This integration showcases the potential of TensorFlow, Keras, and OpenCV in creating more inclusive and intuitive digital experiences","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"33 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on a Study of Block Chain-Based Malware Detection System for Smartphone Applications 基于区块链的智能手机应用程序恶意软件检测系统研究综述
Mr. Pradeep Nayak, Lavanya M Moger, Lohit M Patgar, Manish D Salian, Manoj Rao
{"title":"A Review on a Study of Block Chain-Based Malware Detection System for Smartphone Applications","authors":"Mr. Pradeep Nayak, Lavanya M Moger, Lohit M Patgar, Manish D Salian, Manoj Rao","doi":"10.48175/ijarsct-19312","DOIUrl":"https://doi.org/10.48175/ijarsct-19312","url":null,"abstract":"The widespread use of smartphones in modern culture has resulted in an increased threat of malware targeting these devices, demanding novel techniques to improve security. Blockchain technology has emerged as a possible alternative due to its decentralization, transparency, and immutability. This research paper looks at the state of blockchain-based malware detection systems for smartphone applications. We discuss typical malware detection approaches and the obstacles they confront in the mobile context. We also go over the fundamentals of blockchain technology and how it can be used to improve security. We examine various techniques to integrate blockchain into malware detection systems using case studies and academic articles, emphasizing the benefits of decentralization and transparency. Despite the potential benefits, we find several issues with blockchain-based solutions, including scalability, performance, and privacy concerns. Finally, we explore future research areas and provide insights into how to overcome current limits and improve the effectiveness of these systems. Overall, the purpose of this work is to provide a full understanding of blockchain-based malware detection for cellphones, as well as to guide future research in this crucial area of cybersecurity","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"52 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Compression and Various Approaches – A Review 图像压缩和各种方法 - 综述
Ritu Shrivastava, Manila Jain
{"title":"Image Compression and Various Approaches – A Review","authors":"Ritu Shrivastava, Manila Jain","doi":"10.48175/ijarsct-19317","DOIUrl":"https://doi.org/10.48175/ijarsct-19317","url":null,"abstract":"Medical images are very much important in the field of medical science for the future reference of the patients, needs to be stored. These images require the process of compression before storing it. Compression is a process of encoding the image and to reduce the size of image, storage and transmission. In this paper comparative analysis of different medical images compression techniques and performance results has been discussed. However, the medical image compression has intense scope in future but it also has lot of difficulties and challenges to achieve necessities of the medical field","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"22 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141927862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diagnosis of Parkinson's: A Novel Approach 诊断帕金森病:一种新方法
Omkar, Anith, Pratik, Sushmitha, Sruthi Dinesh
{"title":"Diagnosis of Parkinson's: A Novel Approach","authors":"Omkar, Anith, Pratik, Sushmitha, Sruthi Dinesh","doi":"10.48175/ijarsct-19316","DOIUrl":"https://doi.org/10.48175/ijarsct-19316","url":null,"abstract":"In Europe, 1.2 million people suffer with Parkinson's disease (PD), and during the next few decades, there will likely be an exponential increase in the disease's prevalence. The lack of neurologists qualified to provide skilled care for Parkinson's disease (PD) will provide a challenge to this epidemiological trend. Patients are calling for strict symptom management and treatment education as Parkinson's disease (PD) becomes more widely recognized. Furthermore, due to the very diverse character of symptoms among patients as well as changes within the same patient, new tools are needed to enable clinicians and patients monitor the disease in the context of their daily lives and modify treatment in a more pertinent manner. Currently, a number of body-worn sensors (BWS) have been proposed to track clinical aspects of parkinsonian patients, including motor variations like tremor, has been included to tools for research and patient management. Here, we offer a useful anthology that highlights the features of the BWSs that PD patients in Europe use the most, with an emphasis on how they might be used as instruments to enhance therapy management. Technology for monitoring non-motor aspects is also taken into consideration. BWS undoubtedly present fresh chances to enhance PD management tactics, but it's important to define exactly how they fit into everyday routine treatment.","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"37 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing 云计算中可公开验证的高效细粒度数据删除方案
Mr. Pradeep Nayak, Mr. Darshan K Revankar, Mr. Gautham P Kini, Mr. Yashash Raj C G, Ms. Dikshita Devadiga
{"title":"Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing","authors":"Mr. Pradeep Nayak, Mr. Darshan K Revankar, Mr. Gautham P Kini, Mr. Yashash Raj C G, Ms. Dikshita Devadiga","doi":"10.48175/ijarsct-19314","DOIUrl":"https://doi.org/10.48175/ijarsct-19314","url":null,"abstract":"This paper explores the benefits of cloud storage, a fundamental component of cloud computing, which provides users with nearly limitless storage capabilities. Users can substantially decrease their local storage requirements by allowing data to be outsourced to cloud servers. However, the paper also addresses security privacy concerns linked to cloud storage, which stem from data ownership and management division, resulting in users losing direct control over their outsourced data. \u0000The authors concentrate on the challenge of verifiable outsourced data deletion, a significant issue that has not been adequately addressed in either industry or academic circles. They present an effective fine-grained outsourced data deletion scheme utilizing the invertible Bloom filter. This solution facilitates both public and private verification of the storage and deletion processes. Suppose the cloud server fails to manage or remove the data accurately and creates the associated evidence. In that case, users can detect any malicious actions by the cloud server with a high likelihood. \u0000Additionally, the authors note that within their proposed scheme, the computational complexity of both data deletion and verification of deletion results remains unaffected by the quantity of outsourced data blocks. This property makes the scheme appropriate for extensive data deletion scenarios. \u0000Ultimately, the paper includes a thorough security evaluation and performance assessment, validating the security and practicality of the proposed scheme. This comprehensive method for tackling the issue of verifiable outsourced data deletion in cloud storage represents a notable contribution to the field","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"29 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Never Say “NO”(Strategies for Nurses to Communicate Politely) 绝不说 "不"(护士礼貌沟通的策略)
Capt. Usha Banerjee, Ms. D. Maryline Flinsi
{"title":"Never Say “NO”\u0000(Strategies for Nurses to Communicate Politely)","authors":"Capt. Usha Banerjee, Ms. D. Maryline Flinsi","doi":"10.48175/ijarsct-19239","DOIUrl":"https://doi.org/10.48175/ijarsct-19239","url":null,"abstract":"Effective communication is the cornerstone of quality patient care and nurses are essential in fostering understanding, compassion, and respect in their interactions with patients, families, and other healthcare professionals. In the current healthcare system, one of the frequent complaints that patients express on post-discharge satisfaction surveys is rude behavior of the staff. By directly saying “NO”, nurses make patients to feel unwanted and neglected. Many times, this neglect has landed in the loss of patient attachment and lead to an increased risk of liability and dissatisfaction. In this article the impact of saying no to the patient and alternative strategiesof saying no has been discussed","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"3 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141796858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improve Method for Plant Leaf Disease Detection and Classification using Deep Learning 利用深度学习改进植物叶片病害检测和分类方法
Jeetendra Mahor, Ashish Gupta
{"title":"An Improve Method for Plant Leaf Disease Detection and Classification using Deep Learning","authors":"Jeetendra Mahor, Ashish Gupta","doi":"10.48175/ijarsct-19238","DOIUrl":"https://doi.org/10.48175/ijarsct-19238","url":null,"abstract":"In countries like India, whose important occupation is agriculture, face a huge loss when the crops get affected by any type of disease. These diseases attack the crops in various stages and can destroy the entire production. Since most diseases are transmitted from one crop to another there is an essential requirement to detect the type of disease in the early stage so that farmers can take the required action to “save the crops” and production. Early disease detection is one of the essential activities for enhancing agricultural productivity. Diseases spread very quickly in the parts of the leaves that affect the growth of the plants. Early detection is a challenging task as the symptoms are mild for accurate identification. This research paper presents an enhanced CNN based MCC-ECNN model with fine-tuned hyper-parameters and various batch sizes for accurate plant leaf disease classification.","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"1 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141797002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Survey of Blockchain for the Internet of Things Smart Home 物联网智能家居区块链高级调查
Pratheeksha Shetty, Prof. Jayanth Kumar Rathod, Sanika Gowda, Drushya Hegde, Niriksha Rai
{"title":"Advanced Survey of Blockchain for the Internet of Things Smart Home","authors":"Pratheeksha Shetty, Prof. Jayanth Kumar Rathod, Sanika Gowda, Drushya Hegde, Niriksha Rai","doi":"10.48175/ijarsct-19237","DOIUrl":"https://doi.org/10.48175/ijarsct-19237","url":null,"abstract":"\"The Internet of Things (IoT) has many uses, like making homes smarter. But a big problem with IoT is that it relies too much on a central server, which can be risky. Blockchain, a new kind of system where everyone shares control, can fix this issue. Smart homes face lots of security problems, like hackers and privacy concerns. Blockchain is helpful here too, making sure data and transactions are safe. This paper talks about using Blockchain in smart homes, breaking it down into three main parts. It explains how Blockchain can protect data and transactions, and talks about the security of IoT smart homes.\".","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"11 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141796438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Rights of the Person with Disabilities in Chennai 关于钦奈残疾人权利的研究
Rohith.VP, Gokul. V
{"title":"A Study on Rights of the Person with Disabilities in Chennai","authors":"Rohith.VP, Gokul. V","doi":"10.48175/ijarsct-19232","DOIUrl":"https://doi.org/10.48175/ijarsct-19232","url":null,"abstract":"The rights of persons with disabilities encompass a broad spectrum, advocating for equal opportunities, inclusion, and non-discrimination. This abstract explores the evolving landscape of disability rights, emphasising the importance of accessibility in various domains such as education, employment, and public spaces. It delves into the transformative impact of international conventions like the UN Convention on the Rights of Persons with Disabilities, highlighting the shift from a medical to a human rights-based approach. The abstract also addresses ongoing challenges, emphasising the need for societal awareness, legal frameworks, and technological advancements to ensure the full and meaningful participation of persons with disabilities in all aspects of life.It explores key legal frameworks, such as the UN Convention on the Rights of Persons with Disabilities, shedding light on the fundamental principles of dignity, autonomy, and non-discrimination. The abstract delves into the multifaceted dimensions of disability rights, encompassing education, employment, and social participation. It also addresses contemporary challenges and the ongoing efforts to create a more accessible and equitable world for persons with disabilities, underlining the imperative of fostering awareness, dismantling barriers, and promoting a rights-based approach to disability inclusion","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"63 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141802517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Cross-Site Scripting (XSS) Attack: A Comprehensive Review 跨站脚本 (XSS) 攻击:全面回顾
Prof. Jayanthkumar A Rathod, Darshan S Gowda, Kartik M, Paresh Talekar, Nagaraj Daddi, Ashwini Bhairanallikar, Gousiya G
{"title":"The Cross-Site Scripting (XSS) Attack: A Comprehensive Review","authors":"Prof. Jayanthkumar A Rathod, Darshan S Gowda, Kartik M, Paresh Talekar, Nagaraj Daddi, Ashwini Bhairanallikar, Gousiya G","doi":"10.48175/ijarsct-19230","DOIUrl":"https://doi.org/10.48175/ijarsct-19230","url":null,"abstract":"Cross-site scripting (XSS) is a critical threat to web applications, involving the insertion of malicious code to compromise user trust and extract sensitive information. This paper presents a comprehensive review of various XSS attack types, including Reflected, Persistent, DOM-based, Blind XSS, and Self-XSS. It discusses prevention and remediation strategies such as secure development practices, data assessment, content filtering, encoding, and the use of web application firewalls and security tools like Cloudflare and Zscaler. Despite advancements, XSS vulnerabilities persist due to inadequate security measures during development. The paper emphasizes the need for robust security plans and introduces Sanctum's App-Scan as an example of an effective security measure. Lastly, it underscores the importance of understanding and addressing the diverse forms of XSS attacks to ensure comprehensive internet security","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"51 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141805181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信