International Journal of Advanced Research in Science, Communication and Technology最新文献

筛选
英文 中文
Data Secure De-Duplication in Cloud Environment 云环境中的数据安全重复数据删除
L. Kavitha, Sumalatha. V
{"title":"Data Secure De-Duplication in Cloud Environment","authors":"L. Kavitha, Sumalatha. V","doi":"10.48175/ijarsct-18420","DOIUrl":"https://doi.org/10.48175/ijarsct-18420","url":null,"abstract":"In the current area of information explosion, users’ demand for data storage is increasing, and data on the cloud has become the first choice of users and enterprises. Cloud storage facilitates users to backup and share data, effectively reducing users’ storage expenses. As the duplicate data of different users are stored multiple times, leading to a sudden decrease in storage utilization of cloud servers. Data stored in plaintext form can directly remove duplicate data, while cloud servers are semi-trusted and usually need to store data after encryption to protect user privacy. In this paper, we focus on how to achieve secure re-duplication and recover data in ciphertext for different users, and determine whether the indexes of public key searchable encryption and the matching relationship of trapdoor are equal in cipher text to achieve secure de-duplication. For the duplicate file, the data user’s re-encryption key about the file is appended to the ciphertext chain table of the stored copy. The cloud server uses the re-encryption key to generate the specified transformed ciphertext, and the data user decrypts the transformed ciphertext by its private key to recover the file. The proposed scheme is secure and efficient through security analysis and experimental simulation analysis.","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"10 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141099110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SatelliteChangeNet: Deep Learning approach for Detection & Prediction SatelliteChangeNet:用于检测和预测的深度学习方法
Dr. Sharda Chhabria, Mr. Aditya Bhagwat, Mr. Om Barde
{"title":"SatelliteChangeNet: Deep Learning approach for Detection & Prediction","authors":"Dr. Sharda Chhabria, Mr. Aditya Bhagwat, Mr. Om Barde","doi":"10.48175/ijarsct-18463","DOIUrl":"https://doi.org/10.48175/ijarsct-18463","url":null,"abstract":"In geoscience, Detection is a useful method for analyzing land surface changes using data from Earth observation and for uncovering links between human activities and environmental phenomena. Detection in remote sensing is a rapidly evolving area of interest that is relevant for a number of fields. Recent years have seen a large number of publications and progress, even though the challenge is far from solved. This review focuses on deep learning applied to the task of Detection in multispectral remote-sensing images. In this work, SatelliteChangeNet addresses the growing need for an accurate and effective method to monitor and predict changes in satellite imagery, which is important for many purposes such as environmental monitoring, urban planning, and agriculture and disaster management. The changes always aim to show the struggle with the body and its different structures and lead to the search for a deep learning process. The program focuses on the use of satellite data for exploration of new areas, urban development analysis, environmental management damage, and change and prediction with important applications in agriculture. Water resources and farmland provide a lot of information about our planet. Analyzing these changes over time is important for understanding land use, environmental change, and natural hazards","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"14 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141100457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reliable and Equitable Attribute-Based Proxy Re-encryption System for Cloud Data Sharing 用于云数据共享的可靠公平的基于属性的代理再加密系统
Rishi N, S Anu Priya2
{"title":"A Reliable and Equitable Attribute-Based Proxy Re-encryption System for Cloud Data Sharing","authors":"Rishi N, S Anu Priya2","doi":"10.48175/ijarsct-18402","DOIUrl":"https://doi.org/10.48175/ijarsct-18402","url":null,"abstract":"The widespread acceptance and quick growth of cloud computing have made data sharing easier than ever before. What is preventing widespread adoption of cloud computing, however, is how to guarantee the security of the user's data in the cloud. Safe data sharing in cloud computing can be achieved through the use of proxy re-encryption. With the use of a semi trusted cloud server, a data owner can encrypt shared data in the cloud using their own public key, converting it into an encryption meant only for authorized recipients to control access. To help us grasp this fundamental better, this paper provides a thorough and motivating overview of re-encryption of proxy servers from a variety of angles. For granular access control of shared data, Ciphertext-Policy Attribute based Aes (CP-ABE) is a possible cryptographic primitive. Each user in CP-ABE has a set of attributes, and access structures based on attributes are used to encrypt data. If and only if a user's characteristics meet the requirements of the ciphertext access structure, the user can decrypt a ciphertext. Practical applications typically call for additional requirements in addition to this fundamental one. Our research centers on the significant problem of attribute revocation, which poses a challenge for CP-ABE methods","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"6 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141100944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIGNSense: Auditory -Optic Impairment Communication Bridge SIGNSense:听觉-视觉障碍沟通桥梁
B H Theja, Harshitha S, Likitha G, Dr. Soumya Patil
{"title":"SIGNSense: Auditory -Optic Impairment Communication Bridge","authors":"B H Theja, Harshitha S, Likitha G, Dr. Soumya Patil","doi":"10.48175/ijarsct-18166","DOIUrl":"https://doi.org/10.48175/ijarsct-18166","url":null,"abstract":"Language experts have recognized sign languages as natural languages with the ability to convey human emotions and ideas. Translation from written language into sign videos or extraction of spoken language sentences from sign videos is the aim of sign language translation. Sign language is the principal means of communication for the deaf and hard of hearing community, which comprises 32 million children and 328 million adults worldwide who suffer from hearing impairment. However, the inability of current systems to accurately translate and transmit sign language motions in real-time prevents effective and spontaneous communication. This research provides a revolutionary technique that enables real-time recognition of ISL gestures by integrating natural language processing with cross-modal integration. The methodology uses cutting-edge methods like the Single Shot Multibox Detector (SSD) with MobileNetV2 architecture for data collection, preprocessing, model selection, and training. In real-time inference, the trained model attains an impressive 94% accuracy rate, showcasing strong performance and encouraging outcomes for enhancing communication accessibility for people with hearing impairments","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141099632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Study on Gold Price Prognosis using Machine Learning 利用机器学习加强黄金价格预测研究
Dr. S. Sasikala, Dr. R. Bhuvana
{"title":"An Enhanced Study on Gold Price Prognosis using Machine Learning","authors":"Dr. S. Sasikala, Dr. R. Bhuvana","doi":"10.48175/ijarsct-18401","DOIUrl":"https://doi.org/10.48175/ijarsct-18401","url":null,"abstract":"Machine learning has emerged as a prominent research area for predicting gold prices, utilizing historical data and algorithms. The field aims to uncover patterns, trends, and connections among various factors that influence gold prices, including economic indicators, geopolitical events, and supply and demand dynamics. By employing machine learning algorithms, predictive models can be constructed to provide valuable insights into potential patterns in gold price movements. This enables traders, investors, and other stakeholders to make informed decisions when it comes to gold investments. In our study, we delve into the realm of data science and machine learning techniques to forecast gold prices. We meticulously analyze historical gold price data, develop sophisticated forecasting models, and rigorously evaluate their performance. Through this process, we are able to identify meaningful patterns and correlations that significantly contribute to the prediction of future gold prices. One of the key aspects of our study is the assessment of the reliability and accuracy of various machine learning models specifically designed for gold price prediction. We examine different algorithms and approaches, comparing their effectiveness in capturing the underlying patterns in gold price movements. This evaluation provides us with important findings and insights, enabling us to determine the most suitable models for accurate gold price forecasting. However, it is crucial to acknowledge the limitations inherent in our study. The forecasting of gold prices is a complex task influenced by a multitude of factors, some of which may be unpredictable or subject to sudden changes. Therefore, our models may not capture all the nuances and intricacies of gold price dynamics. To address these limitations, we propose recommendations for future research, such as exploring novel data sources, incorporating additional variables, or improving the models' adaptability to changing market conditions. Machine learning plays a pivotal role in the field of gold price prediction. By leveraging historical data and employing sophisticated algorithms, we can uncover valuable insights and patterns that assist in forecasting future gold prices. Our study aims to contribute to this growing body of research by developing reliable models and providing important insights for traders, investors, and other stakeholders in the gold market","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"8 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141101391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Health Care System 分散式医疗保健系统
Dr. C. S. Shinde, Aparna Patil, Ankita Mangave, Jayprakash Kadam, Akshay Jadhav
{"title":"Decentralized Health Care System","authors":"Dr. C. S. Shinde, Aparna Patil, Ankita Mangave, Jayprakash Kadam, Akshay Jadhav","doi":"10.48175/ijarsct-18444","DOIUrl":"https://doi.org/10.48175/ijarsct-18444","url":null,"abstract":"Decentralized medical systems represent a shift in medical delivery that distributes rights and information across the network rather thanrelying on a central location. This model leverages blockchain technology to ensure medical records are secure, transparent, and tamper-proof. Patients can have more control overtheir information, allowing or revoking access as needed. Collaboration has improved, making the exchange of information between doctors easier. Smart contracts automate, secure, and streamline the billing and insurance process. This decentralized framework increases privacy by reducing the risk of serious data breaches","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"7 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141106976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Digital Metaverse Chartered Accountant 虚拟数字元宇宙特许会计师
Ganesh H, Akhilesh Patil, Gauri Jadhav, Shweta Jadhav, Prof. P. T. Shitole
{"title":"Virtual Digital Metaverse Chartered Accountant","authors":"Ganesh H, Akhilesh Patil, Gauri Jadhav, Shweta Jadhav, Prof. P. T. Shitole","doi":"10.48175/ijarsct-18432","DOIUrl":"https://doi.org/10.48175/ijarsct-18432","url":null,"abstract":"A globally renowned financial expert that oversees customers' budgets, audits, taxes, and company strategy is a chartered accountant. You can work for companies, the government, or private citizens as a CA Assisting clients with money management and offering professional financial advice are your duties. For the accounting sector, the emergence of virtual reality (VR) and the metaverse offers an exciting opportunity. Modern technologies like blockchain, artificial intelligence (AI), and data analytics, which come together to form a virtual environment that reimagines the function of the accountant, are the foundation of this paradigm shift. Virtual Digital Metaverse Chartered Accountant is what we're working on. By using artificial intelligence (AI), one may automate repetitive processes related to financial reporting, taxation, predictive analytics, business intelligence, and automation of regular tasks. Chartered accountants are becoming increasingly important to the growth and recovery of the Indian economy. They guarantee honest, ethical trade and commercial practices, support the smooth operation of businesses and organizations, and apply their financial know-how to different economic and financial initiatives aimed at improving the country. They are therefore crucial to boosting the economy. Forecasting the budget, tax audits, creating monthly financial reports, capital planning, tax planning, and other duties are all part of the CA's job description. Additionally, since the GST was implemented, their function has grown stronger and more significant","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"41 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141103541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Off-Grid Power Management System using IoT 利用物联网的离网电力管理系统
Praise C Cossam
{"title":"Off-Grid Power Management System using IoT","authors":"Praise C Cossam","doi":"10.48175/ijarsct-18437","DOIUrl":"https://doi.org/10.48175/ijarsct-18437","url":null,"abstract":"The \"Off-Grid Solar Power Management System Using IoT\" project is a solution to address the energy needs of remote and off-grid locations through the integration of renewable solar power and Internet of Things (IoT) technology. In the face of limited access to conventional power sources, this project leverages IoT devices and smart technologies to create a robust energy management system. The system allows for the efficient capture, storage, and distribution of solar energy while enabling real-time monitoring. Key features include data collection on solar panel performance, energy consumption, and user-friendly interfaces accessible through web applications. This project demonstrates the potential to provide sustainable, reliable, and environmentally friendly energy solutions for off grid communities here in Malawi, enhancing their quality of life and contributing to global efforts for clean energy adoption","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"2 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141105563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of 3D Hologram using Machine Learning 利用机器学习设计和实现 3D 全息图
Mr. Aswatha Narayana, Aishwarya Patil, Akhila U, Ambika Durgad, Hema S J
{"title":"Design and Implementation of 3D Hologram using Machine Learning","authors":"Mr. Aswatha Narayana, Aishwarya Patil, Akhila U, Ambika Durgad, Hema S J","doi":"10.48175/ijarsct-18429","DOIUrl":"https://doi.org/10.48175/ijarsct-18429","url":null,"abstract":"Holographic means “entire recording” and originates from the Greek words “holo” (“whole”) and “graphic” (“message”). “Entire” refers to the recording of both the intensity and the phase of the object, as opposed to conventional photography, where only the intensity profile of the object is recorded.\u0000In a new stage in the organisation and control of the industrial value chain, interchangeably with the fourth industrial revolution. It has a broad vision with well-defined frameworks and reference designs, focusing on bridging physical infrastructure and digital technology in so- called cyber-physical systems. Apart from the other essential technologies, Holography is considered a new innovative technology that can completely transform the vision of Industry\u00004.0. In industrial applications, holographic technology is used for quality control in manufacturing and fracture testing, such as holographic nondestructive testing. Holography has a wide range of applications in medicine, the military, weather forecasting, virtual reality, digital art, and security. The fourth industrial revolution aims to provide automated asset monitoring, decision-making for corporate operations, and real-time network connectivity. This paper explores holography and its significant benefits through various development processes, features, and applications, where the focus is on ‘holography for Industry 4.0'. Hologram technology is a new industry trend and can impact multiple domains of Industry 4.0. Furthermore, the adoption of holographic technologies may improve the efficiency of existing products and services in other technology sectors such as architecture, 3D modelling, mechatronics, robotics, and healthcare and medical engineering","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"35 35","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141103963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exposing Deep Fake Face Detection using LSTM and CNN 使用 LSTM 和 CNN 深度检测假人脸
Alisha Muskaan, Nagarathna S, Sandhya C S, Viju J, B Sumangala
{"title":"Exposing Deep Fake Face Detection using LSTM and CNN","authors":"Alisha Muskaan, Nagarathna S, Sandhya C S, Viju J, B Sumangala","doi":"10.48175/ijarsct-18434","DOIUrl":"https://doi.org/10.48175/ijarsct-18434","url":null,"abstract":"The rapid advancement of deep learning techniques, creating realistic multimedia content has become increasingly accessible, leading to the proliferation of DeepFake technology. DeepFake utilizes generative deep learning algorithms to produce or modify face features in a highly realistic manner, often making it challenging to differentiate between real and manipulated media. This technology, while beneficial in fields such as entertainment and education, also poses significant threats, including misinformation and identity theft. Consequently, detecting DeepFakes has become a critical area of research. In this paper, we propose a novel approach to DeepFake face detection by integrating Convolutional Neural Networks (CNN) with Long Short-Term Memory (LSTM) networks. Our method leverages the strengths of CNNs in spatial feature extraction and LSTMs in temporal sequence modeling to enhance detection accuracy. The CNN component captures intricate facial features, while the LSTM analyzes the temporal dynamics of video frames. We evaluate our model on several benchmark datasets, including Celeb-DF (v2), DeepFake Detection Challenge Preview, and FaceForensics++. Experimental results demonstrate that our hybrid CNN-LSTM model achieves state-of-the-art performance, surpassing existing methods in both accuracy and robustness. This study highlights the potential of combining CNN and LSTM architectures for effective DeepFake detection, contributing to the ongoing efforts to safeguard against digital media manipulation","PeriodicalId":472960,"journal":{"name":"International Journal of Advanced Research in Science, Communication and Technology","volume":"6 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141106843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信