Big data architecture for network security
Research is considering security of big data and retaining the performance during its
transmission over network. It has been observed that there have been several researches …
transmission over network. It has been observed that there have been several researches …
Application of integrated steganography and image compressing techniques for confidential information transmission
BK Pandey, D Pandey, S Wairya… - Cyber security and …, 2022 - Wiley Online Library
In the present day, images and videos account for nearly 80% of all the data transmitted
during our daily activities. This work employs a combination of novel stegnography and data …
during our daily activities. This work employs a combination of novel stegnography and data …
Effective and secure transmission of health information using advanced morphological component analysis and image hiding
The using morphological component analysis, deep learning, and steganography, this study
examines the secure transmission, identification, and validation of textual pictures via this …
examines the secure transmission, identification, and validation of textual pictures via this …
Carpooling solutions using machine learning tools
S Pramanik - Handbook of Research on Evolving Designs and …, 2022 - igi-global.com
If there isn't enough parking within a university's campus, it will take a long time to look for
parking. If a university has a number of research stations that are geographically apart from …
parking. If a university has a number of research stations that are geographically apart from …
An analysis of the operations and confrontations of using green IT in sustainable farming
Green IT seeks to utilise computing facilities in an energy-capability, expenditure-
minimization, along with ecologically amiable way by greening the employ, dum**, layout …
minimization, along with ecologically amiable way by greening the employ, dum**, layout …
Securing healthcare medical image information using advance morphological component analysis, information hiding systems, and hybrid convolutional neural …
BK Pandey, D Pandey - Computers in Biology and Medicine, 2025 - Elsevier
Health care images contain a variety of imaging information that has specific features, which
can make it challenging to assess and decide on the methods necessitated to safeguard the …
can make it challenging to assess and decide on the methods necessitated to safeguard the …
A review paper on cause of heart disease using machine learning algorithms
In India and all devolving country, heart disease is the main cause of mortality. Heart
disease causes and prevention have been studied for years, and new information is always …
disease causes and prevention have been studied for years, and new information is always …
Credit card fraud detection using machine learning
1. The study affirmed that the performance of the algorithms like Decision Trees, K-Means,
Random Forest, Neural Network, Xgboost and, Logistic Regression was better than other …
Random Forest, Neural Network, Xgboost and, Logistic Regression was better than other …
Blockchain-based decentralized voting system security Perspective: Safe and secure for digital voting system
J Singh, U Rastogi, Y Goel, B Gupta - arxiv preprint arxiv:2303.06306, 2023 - arxiv.org
This research study focuses primarily on Block-Chain-based voting systems, which facilitate
participation in and administration of voting for voters, candidates, and officials. Because we …
participation in and administration of voting for voters, candidates, and officials. Because we …
[HTML][HTML] Novel Steganographic Method Based on Hermitian Positive Definite Matrix and Weighted Moore–Penrose Inverses
In this paper, we describe the concept of a new data-hiding technique for steganography in
RGB images where a secret message is embedded in the blue layer of specific bytes. For …
RGB images where a secret message is embedded in the blue layer of specific bytes. For …