Zobrazeno 1 - 10
of 151
pro vyhledávání: '"S. Shitharth"'
Autor:
S. Shitharth, Abdulrhman M. Alshareef, Adil O. Khadidos, Khaled H. Alyoubi, Alaa O. Khadidos, Mueen Uddin
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-22 (2023)
Abstract Ensuring the privacy and trustworthiness of smart city—Internet of Things (IoT) networks have recently remained the central problem. Cyborg intelligence is one of the most popular and advanced technologies suitable for securing smart city
Externí odkaz:
https://doaj.org/article/b253c76225b44e0fb3454cb7ef4135ec
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-12 (2023)
Abstract Abnormal human behavior must be monitored and controlled in today’s technology-driven era, since it may cause damage to society in the form of assault or web-based violence, such as direct harm to a person or the propagation of hate crimes
Externí odkaz:
https://doaj.org/article/e448c6814cb4416284154b9b67743337
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-16 (2023)
Abstract Worldwide, pneumonia is the leading cause of infant mortality. Experienced radiologists use chest X-rays to diagnose pneumonia and other respiratory diseases. The diagnostic procedure's complexity causes radiologists to disagree with the dec
Externí odkaz:
https://doaj.org/article/464e29baa3fd4c6bbe6cdb930f060fe4
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-15 (2023)
Abstract The geographical location of any region, as well as large-scale environmental changes caused by a variety of factors, invite a wide range of disasters. Floods, droughts, earthquakes, cyclones, landslides, tornadoes, and cloudbursts are all c
Externí odkaz:
https://doaj.org/article/65c9871387b64a22a156b32f239e6143
Publikováno v:
IEEE Access, Vol 11, Pp 48123-48135 (2023)
Energy consumption has become an essential factor in designing modern computer system architecture. Because of physical limits, the termination of Moore’s law and Dennard’s scaling has forced the computer design community to investigate new appro
Externí odkaz:
https://doaj.org/article/16eb71f3e20f4ea28cded71e29d43861
Autor:
Devikanniga Devarajan, D. Stalin Alex, T. R. Mahesh, V. Vinoth Kumar, Rajanikanth Aluvalu, V. Uma Maheswari, S. Shitharth
Publikováno v:
IEEE Access, Vol 10, Pp 126957-126968 (2022)
Cervical cancer affects nearly 4% of the women across the globe and leads to mortality if not treated in early stage. A few decades before, the mortality rate was too high when compared to the present statistics. This is achieved as nowadays most of
Externí odkaz:
https://doaj.org/article/c8b900fd38a94bf494a6b10ca2602819
Autor:
Alaa O. Khadidos, S. Shitharth, Hariprasath Manoharan, Ayman Yafoz, Adil O. Khadidos, Khaled H. Alyoubi
Publikováno v:
IEEE Access, Vol 10, Pp 85289-85304 (2022)
With the advent of smart city networks and increased utilization of vehicles, the Internet of Vehicles (IoV) has attracted more attention from researchers. But, providing security to this type of network is one of the challenging and demanding tasks
Externí odkaz:
https://doaj.org/article/63c85d6f913b42a0b721435923774dd7
Autor:
S. Shitharth, Pravin R. Kshirsagar, Praveen Kumar Balachandran, Khaled H. Alyoubi, Alaa O. Khadidos
Publikováno v:
IEEE Access, Vol 10, Pp 46424-46441 (2022)
Intrusion detection and classification have gained significant attention recently due to the increased utilization of networks. For this purpose, there are different types of Network Intrusion Detection System (NIDS) approaches developed in the conve
Externí odkaz:
https://doaj.org/article/9b3d292fe2134e08ad32fd0579ffe9de
Publikováno v:
Measurement: Sensors, Vol 23, Iss , Pp 100405- (2022)
Without integrating various sensor data sets, sensing information in the presence of leakage for large-scale pipeline systems is very challenging. A data fusion methodology, wherein more sensor data is merged to give relevant information, is necessar
Externí odkaz:
https://doaj.org/article/d38262545ffb47a6af31d1caa3acc4d8
Autor:
S. Shitharth, Kantipudi Mvv Prasad, K. Sangeetha, Pravin R. Kshirsagar, Thanikanti Sudhakar Babu, Hassan Haes Alhelou
Publikováno v:
IEEE Access, Vol 9, Pp 156297-156312 (2021)
Providing security to the Supervisory Control and Data Acquisition (SCADA) systems is one of the demanding and crucial tasks in recent days, due to the different types of attacks on the network. For this purpose, there are different types of attack d
Externí odkaz:
https://doaj.org/article/df3cb54ac59f422588a496a0859fb7b3