This paper presents a Blockchain-based framework for providing Blockchain services for purposes of stability in terms of consensus protocol infrastructure and governance mechanisms and accessible auxiliary services suitable for the vast majority of current business needs, including fundamental factors such as digital identity with autonomous identi...
|
Vehicular edge computing (VEC) has emerged as a solution that places computing resources at the edge of the network to address resource management, service continuity, and scalability issues in dynamic vehicular environments. However, VEC faces challenges such as task offloading, varying communication conditions, and data security.
To tackle thes...
|
Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform. Internet-of-Things (IoT) incorporates power systems, particularly smart grid features and the delivery of new services from the utility side to the end user over a two-way communication channel.
...
|
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.
The privacy of health data can only be preserved by keeping it in an encrypted form, but it affects usability and flexibility in terms of effective search. Attribute-based searc...
|
Problem Overview Innovation is a key driver of growth and success in educational institutions. Tracking and measuring innovation excellence is essential for fostering a culture of continuous improvement, recognizing achievements, and guiding strategic decisions. However, identifying, quantifying, and presenting innovation indicators can be challeng...
|
Enhancing Patient Care with Advanced Ventilation System intends to revolutionize mechanical ventilation by creating an automated ventilator that uses an Ambu bag and has complete monitoring features.
The system precisely sets and controls respiratory parameters such as tidal volume, respiratory rate, minute ventilation, peak and plateau pressures...
|
To help consumers enjoy healthy food, technology investigation for food freshness sensing is conducted. In this study meat is selected as the detection target based on a consumer survey CO2, TVOC, and MQ135 are investigated.
The results showed that CO2 and TVOC could be a used for food freshness sensing in a closed space such as box. In today's w...
|
Background: The rehabilitation institutes involved in this activity face high therapy cases load and more number of student therapists with less number of therapy supervisors. Following this system in manual mode impedes providing prompt services.
Description: Clinical services with respect to speech language therapy begins with patient allocatio...
|
Hospitals/Departments shall be able to enter and Update Data in the Mobile Application which can be viewed by the Super Admin dynamically for efficient Implementation of Health and Family Welfare Schemes, other Health programmes and provide key inputs for policy formulation and appropriate programme interventions.
This Mobile Application will fac...
|
Background: During CSSR (Collapsed Structure Search and Rescue) operations, NDRF teams encounter challenges in identifying buried deceased bodies amidst rubble and debris. Traditional search methods are often time-consuming and labor-intensive, hampering the timely recovery of victims and increasing the risk of further casualties. Description: THe ...
|
With the aim to provide "Right Quantity of "Right Product" on "Right Place" on "Right Time" in "Right Condition" at "Right Cost" for "Right People" and also to streamline the distribution of drugs to institutions and ensure availability of drugs at all times, a new, innovative system named Drug Inventory and supply chain Tracking system is required...
|
Background: The AYUSH sector, encompassing Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy, is burgeoning with innovative startups. However, these startups face challenges in registering their ventures due to cumbersome, opaque, and decentralized processes.
An efficient registration portal is crucial for fostering growth, facilitatin...
|
Background: The AYUSH sector, encompassing Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy, is burgeoning with innovative startups. However, these startups face challenges in registering their ventures due to cumbersome, opaque, and decentralized processes.
An efficient registration portal is crucial for fostering growth, facilitatin...
|
Background- Agricultural productivity and food security are heavily dependent on the health of crops and livestock. Farmers, especially in remote or resource-limited areas, often face challenges in diagnosing and reporting diseases that affect their livestock and crops.
Early diagnosis and timely reporting are crucial for effective disease manage...
|
Background: In metro system OEM install the switches and bind these switches with their MAC address mostly so it is difficult to install or upgrade the different switch in network without compromising the cyber security. Retrofitting these systems with modern security protocols can he challenging and costly, particularly for organizations with limi...
|
Background: Dual use precursor chemicals are substances that have legitimate industrial and commercial applications but can also be used in the illicit manufacture of drugs. For e.g. Opium is converted to Heroin using Acetic Anhydride and manufacturing of Methamphetamine is done using Ephedrine or Pseudoephedrine.
Precursor chemicals are essentia...
|
Background: In today’s digital age, a wide variety of services and processes take place online. Users of these digital facilities are required to upload government-issued containing documents or provide data for successfully availing the services. However, the uploaded documents or data which are required to facilitate these digital services and pr...
|
Location based services provide many value added features to their mobile clients for information retrieval about their current location which can be processed to get the related information about their locality.
In the Emergency cases the doctors nearby (from the app) will fill the gap by providing the information of all the doctors present near...
|
The purpose of Online Food Ordering System is to automate the existing manual system by the help of computerized equipment’s and full-fledged computer software, fulfilling their requirements, so that their valuable data/information can be stored for a longer period with easy accessing and manipulation of the same.
The required software and hardwa...
|
Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions.
Modernization will have both beneficial and negative effects. ...
|
Student attendance play significant role in order to justify academic outcome of a student and school as overall. Unfortunately, there is no automated attendance record keeping application available in Malaysia’s secondary schools.
A preliminary study has been conducted in one of secondary schools in Selangor, Malaysia in order to understand the ...
|
Nowadays, detecting credit card fraud is a major social issue. Credit card usage on e-commerce and banking websites has quickly expanded in recent years. The usage of credit cards in online transactions has made it simple, but it has also increased the frequency of fraud transactions.
Modernization will have both beneficial and negative effects. ...
|
Cloud computing technology will bring to banks such advantages as cost savings, enhanced data processing capacity and improved quality of financial services. To further promote the application of cloud computing in the banking industry, the first and foremost task is to solve the security problem.
Judging from the commercial banks, cloud computin...
|
With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries.
In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of ...
|
A software web application based on facial recognition is used to create a gate pass system. During college hours, it coordinates the student's gate pass request and leave. This system is ready for use and is simple to operate and manage.
A gate pass security system is what this system is called. Its main goal is to keep the campus safe from ou...
|
Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the da...
|
Every cooperate organization, institution or government agency requires data and good quality information to function effectively. It is not an over statement to say that many organizations, institutions or government agencies have become critically dependent on the use of database system for their successes especially in the hospital. Data collect...
|
Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalys...
|
Sales enterprise in management appears fragmented and incoherent customer information make enterprise management or relevant personnel cannot view all of the data and related information, customer information that results could not keep consistent and complete, use the computer to car sales information management, has the crafts incomparable advant...
|
This paper deals with development of inventory management system for a manufacturing Industry. The developed software System is easy to use, less time consuming & all detail about the inventory items & transaction status. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The repor...
|
There has been an asymmetric shift towards harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT based devices with the expanding cloud infr...
|
With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have become emerging challenges of the IoT. In this paper, we are concerned about the security of image transmission in green IoT. I...
|
In recent years, the Internet of Things (IoT) has been contemplated as the next technological advancement in the era of internet. This paper discloses the architecture of a multilayer, multimode security system for IoT. The proposed system is capable of providing multiple security solutions that support anonymous authentication, device privacy, dat...
|
In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resource...
|
The population of cloud computing greatly facilitates the sharing of explosively generated image today. While benefiting from the convenient of cloud, the privacy protection mechanism that commonly applied in cloud service makes the spreading of illegal and harmful data very hard to be detected or controlled. Such a realistic threat should be serio...
|
Strongly quantized fixed-point arithmetic is now considered a well-established solution to deploy Convolutional Neural Networks (CNNs) on limited-memory low-power IoT endnodes. Such a trend is challenging due to the lack of support for low bitwidth fixed-point instructions in the Instruction Set Architecture (ISA) of state-of-the-art embedded Micro...
|
With the widespread application of cloud storage, ensuring the integrity of user outsourced data catches more and more attention. To remotely check the integrity of cloud storage, plenty of protocols have been proposed, implemented by checking the equation constructed by the aggregated blocks, tags, and indices. However, the verifier only has the k...
|
Cloud computing enables enterprises and individuals to outsource and share their data. This way, cloud computing eliminates the heavy workload of local information infrastructure. Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data shari...
|
With the development of cloud computing, the great amount of storage data requires safe and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of shared data is ensured to achieve data privacy preservation. Second, the security of stored data is ensured. That is, when stored shared data are subject to frequent ac...
|
Reversible data hiding in encrypted images (RDHEI) is an effective technique of data security. Most state-of-theart RDHEI methods do not achieve desirable payload yet. To address this problem, we propose a new RDHEI method with hierarchical embedding. Our contributions are twofold. (1) A novel technique of hierarchical label map generation is propo...
|
Ciphertext-policy attribute-based encryption (CPABE) is a promising encryption technology for secure data sharing in cloud computing, in which data owner can fully control access structure associated with a ciphertext. However, it brings a major drawback which is known as key escrow problem, since the decryption users’ secret keys are issued by an ...
|
In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today’s cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increas...
|
? The health care services industry is always showing signs of change and supporting new advancements and advances. One of the predominant requirements in today's health care systems is to protect the patient's medical report against potential attackers. Hence, it is basic to have secure information that can just approve people can get to the patie...
|
In recent years, the need for high security with reliability in the wireless network has tremendously been increased. To provide high security in reliable networks, mobile ad hoc net-works (MANETs) play a top role, like open network boundary, distributed network, and fast and quick implementation. By expanding the technology, the MANET faces a numb...
|
Cloud computing is a great innovation in the world of computing, there also exist downsides of cloud computing. These most important challenges are security and privacy of data on the cloud, check availability of data on the cloud. For these problems, data storage security refers to the security of data on the storage media. Security is an importan...
|
Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its efficient and low cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data confidentiality and service user p...
|