Cyberbullying is when someone is bullied using technology as an intermediary. Despite the fact that it has been a problem for many years, the impact on young people has just recently become more widely recognized. Bullies thrive on social media platforms, and teens and children who use them are vulnerable to attacks. A copious amount of usergener...
 Block chaining technology is a distributed infrastructure and computing paradigm. The latest version is represented by the super account book. The latest version is block chain 3. From the perspective of large data, this paper systematically combs the essence and core technology of block chain technology, and expounds the application status...
 In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients’ data at any point of time. Secure cloud storage protocols enable a client to check integrity of outsourced data. In this article, we explore the possibili...
 Nowadays, digital images are a main source of shared information in social media. Meanwhile, malicious software can forge such images for fake information. So, it’s crucial to identify these forgeries. This problem was tackled in the literature by various digital image forgery detection techniques. But most of these techniques are tied to detec...
 The utilization of cloud storage is increasingly prevalent as the field of cloud computing continues to expand. Several cloud data auditing schemes have been proposed within the academic community to guarantee the availability and integrity of cloud data. Nevertheless, several schemes rely on public key infrastructure and identity-based encrypt...
 This paper centers around changing the process for having 'text' as secret word as individuals will generally frequently fail to remember their passwords and need to recuperate it. Proposing the procedure for having picture as a secret word which is kept encoded in a data set and unscrambled and matched to check for approval of client. It has been ...
 Offloading computation-intensive tasks (e.g., blockchain consensus processes and data processing tasks) to the edge/cloud is a promising solution for blockchain-empowered mobile edge computing. However, the traditional offloading approaches (e.g., auction-based and game-theory approaches) fail to adjust the policy according to the changing environ...
 Offloading computation-intensive tasks (e.g., block chain agreement cycles and information handling undertakings) to the edge/cloud is a promising answer for block chain-enabled versatile edge figuring. Nonetheless, the conventional offloading approaches (e.g., sell off based and game-hypothesis draws near) neglect to change the strategy as per the...
 A new method is discussed to enhance the security of communications over Internet. The method is based on utilization of electronic graphic images being sent as part of messages that require secure communication and certification. At the core of the proposed method are Electronic Virtual Stamps implemented as familiar and easily recognizable electr...
 This paper reviewed literature from 1999 to 2014 inclusively on how Speech-to-Text Recognition (STR) technology has been applied to enhance learning. The first aim of this review is to understand how STR technology has been used to support learning over the past fifteen years, and the second is to analyze all research evidence to understand how Spe...
 Aerial security means performing security-aimed monitoring and surveillance operations with the help of airborne vehicles. This kind of activities suggest that human officers (security organizations, law enforcement, police etc.) would be able to remotely monitor and view video and data acquired from Drones while planning and evaluating their opera...
 During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires block...
 Hotspot mapping is a popular analytical technique that is used to help identify where to target police and crime reduction resources. In essence, hotspot mapping is used as a basic form of crime prediction, relying on retrospective data to identify the areas of high concentrations of crime and where policing and other crime reduction resources shou...
 Typical approaches to visual vehicle tracking across large area require several cameras and complex algorithms to detect, identify and track the vehicle route. Due to memory requirements, computational complexity and hardware constrains, the video images are transmitted to a dedicated workstation equipped with powerful graphic processing units. How...
 Although information systems and technology (IS/IT) investments have always caused varying degrees of business change, the main purpose of many of today's IS/IT implementations is to change the business and/or organization in some significant way. However, most organizations' approaches to managing IS/IT developments have changed little in the last...
 Currently, the development of mobile applications heavily relies on using conventional computers as development platform. MobiDev enables people in emerging countries without access to a computer but to a cell phone to develop their own locally relevant applications. The goal of the MobiDev project is to simplify development and deployment of appli...
 This article deals with multimedia data, which combines basic functions with high quality graphics, sound, video and animation and definitions of multimedia. Also deals with multimedia characteristics, network technology – Ethernet, Provisioning and ATM, bandwidth needs and multimedia networking along with data transfers protocols. Right issues for...
 Caller ID (caller identification) is a service provided by telephone carriers to transmit the phone number and/or the name of a caller to a callee. Today, most people trust the caller ID information, and it is increasingly used to authenticate customers (e.g., by banks or credit card companies). However, with the proliferation of smartphones and Vo...
 In present industry, communication is the key element to progress. Passing on information, to the right person, and in the right manner is very important, not just on a corporate level, but also on a personal level. The world is moving towards digitization, so are the means of communication. Phone calls, emails, text messages etc. have become an in...
 This paper investigates the applicability of machine-driven Speech Emotion Recognition (SER) towards the augmentation of theatrical performances and interactions (e.g. controlling stage color /light, stimulating active audience engagement, actors’ interactive training, etc.). For the needs of the classification experiments, the Acted Emotional Spee...
 In this paper, we describe a surveillance program which is to be designed that can automatically detect the gestures or signs of aggression and brutality on real time. A single CCTV human operator can handle very limited set of operations, so as the number of CCTV camera increases the need of the human intervention also increases which can also cau...
 This conceptual paper exclusively focused on how artificial intelligence (AI) serves as a means to identify a target audience. Focusing on the marketing context, a structured discussion of how AI can identify the target customers precisely despite their different behaviors was presented in this paper. The applications of AI in customer targeting an...
 Recently, automatic vehicle location (AVL) has become more widely used, affordable and popular than ever before. AVL is used for different tracking purposes, especially for those related to tracking one vehicle or a fleet of vehicles. Tracking system technology was made possible by the integration of three new technologies: navigational technologie...
 Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives too fast. Therefore, it is not possible to catch and punish those kinds of people because the traffic personal might not be able to retrieve vehicle number from th...
 Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such t...
 Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere an...
 Student’s attendance tracking is a vital issue in order to monitor students’ performance in the classroom as well as in their studies. It becomes a key concern because the university authority maintains a rule that one student can only attend in the exam if his/her attendance is higher or equal to several percentages (60%,70% or 80% etc.) otherwise...
 Due to Increase in the amount of data in the field of genomics, meteorology, biology, environmental research and many others, it has become difficult to find, analyse patterns, associations within such large data. Interesting association is to be found in the large data sets to draw the pattern and for knowledge purpose. The benefit of analysing th...
 Distance Learning has been steadily gaining popularity. More and more universities and colleges are offering online course to increase enrollments. However, one question remains for those who teach online courses: who is doing the real course work? In this paper we will survey the commonly used methods to prevent e-Cheating, look at a few e-Proctor...
 Blockchain’s foundations of decentralisation, cryptographic security and immutability make it a strong contender in reshaping the healthcare landscape worldwide. Blockchain solutions are currently being explored for: (1) securing patient and provider identities; (2) managing pharmaceutical and medical device supply chains; (3) clinical research and...
 Networking, which is one of the most significant aspects of information technology revolution, is developing increasingly day after day. This is because it offers a huge amount of knowledge, resources and human experiences. On the one hand, it contains a considerable amount of harmful content, because of misusing. On the other hand, sitting for a l...
 A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is called graphical user authentication (GUA). The most common computer authentication method is to use alphanumerical usernames and p...
 Information security is a vital aspect of Intelligent Transportation Systems (ITS) involving public data collection. Road images captured for use as a basis of traffic manipulation in ITS should take all precautions for encrypting the wirelessly transferred image. This paper presents an Enhanced Cipher Block Chaining (ECBC) operation mode to ensu...
 Subsequent to the introduction of Bit coin, the field of cryptocurrency has seen unprecedented growth. Mobile applications known as wallets often facilitate user interaction to these crypto currencies. With a perceived real world value these wallets are a target for attackers. Unlike mainstream financial services applications, cryptocurrency wallet...
  With the increasing popularity of blockchain technology, it has also become a hotbed of various cybercrimes. As a traditional way of scam, the phishing scam has new means of scam in the blockchain scenario and swindles a lot of money from users. In order to create a safe environment for investors, an ecient method for phishing detection is urge...
 The Software Defined Network in Internet of Things (SDN-IoT) is enjoying growing popularity due to its flexibility, automaticity and programmability. However, there still lack proper permission management on SDN-IoT applications (SIApps), especially when the SIApp’s required northbound interfaces are located in multiple heterogeneous controllers wi...
 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
 Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years.With the integration of block chain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicle sat any time.Specifically, the block chain technology...
 The Vehicle-to-Grid (V2G) network is, where the battery-powered vehicles provide energy to the power grid, is highly emerging. A robust, scalable, and cost-optimal mechanism that can support the increasing number of transactions in a V2Gnetwork is required. Existing studies use traditional block chain as to achieve this requirement. Block chain-en...
 ? The health care services industry is always showing signs of change and supporting new advancements and advances. One of the predominant requirements in today's health care systems is to protect the patient's medical report against potential attackers. Hence, it is basic to have secure information that can just approve people can get to the patie...
 The combination of pervasive edge computing and block chain technologies opens up significant possibilities for Industrial Internet of Things (IIoT) applications, but there are several critical limitations regarding efficient storage and rapid response for large-scale low-delay IIoT scenarios. To address these limitations, we propose a hierarchical...
 Nowadays scalable IoT management is a bottleneck of IoT development due to the geographically dispersed distribution, fragmented ownerships, and ever growing population of IoT devices. To intelligently manage massive decentralized applications (dApps) in IoT use cases, Edgence (EDGe + intelligence) is proposed to use edge clouds to access IoT devic...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com