Big data architecture for network security

B Bansal, VN Jenipher, R Jain, R Dilip… - Cyber Security and …, 2022 - Wiley Online Library
Research is considering security of big data and retaining the performance during its
transmission over network. It has been observed that there have been several researches …

Application of integrated steganography and image compressing techniques for confidential information transmission

BK Pandey, D Pandey, S Wairya… - Cyber security and …, 2022 - Wiley Online Library
In the present day, images and videos account for nearly 80% of all the data transmitted
during our daily activities. This work employs a combination of novel stegnography and data …

Effective and secure transmission of health information using advanced morphological component analysis and image hiding

BK Pandey, D Pandey, VK Nassa, S George… - Artificial Intelligence on …, 2022 - Springer
The using morphological component analysis, deep learning, and steganography, this study
examines the secure transmission, identification, and validation of textual pictures via this …

Carpooling solutions using machine learning tools

S Pramanik - Handbook of Research on Evolving Designs and …, 2022 - igi-global.com
If there isn't enough parking within a university's campus, it will take a long time to look for
parking. If a university has a number of research stations that are geographically apart from …

An analysis of the operations and confrontations of using green IT in sustainable farming

S Pramanik, S Joardar, OP Jena… - AIP Conference …, 2023 - pubs.aip.org
Green IT seeks to utilise computing facilities in an energy-capability, expenditure-
minimization, along with ecologically amiable way by greening the employ, dum**, layout …

Securing healthcare medical image information using advance morphological component analysis, information hiding systems, and hybrid convolutional neural …

BK Pandey, D Pandey - Computers in Biology and Medicine, 2025 - Elsevier
Health care images contain a variety of imaging information that has specific features, which
can make it challenging to assess and decide on the methods necessitated to safeguard the …

A review paper on cause of heart disease using machine learning algorithms

YN Prajapati, M Kumar - Journal of Pharmaceutical Negative …, 2022 - pnrjournal.com
In India and all devolving country, heart disease is the main cause of mortality. Heart
disease causes and prevention have been studied for years, and new information is always …

Credit card fraud detection using machine learning

A KUMAR, A JAIN, M Ariz, N Kumar - Journal of Pharmaceutical …, 2022 - pnrjournal.com
1. The study affirmed that the performance of the algorithms like Decision Trees, K-Means,
Random Forest, Neural Network, Xgboost and, Logistic Regression was better than other …

Blockchain-based decentralized voting system security Perspective: Safe and secure for digital voting system

J Singh, U Rastogi, Y Goel, B Gupta - arxiv preprint arxiv:2303.06306, 2023 - arxiv.org
This research study focuses primarily on Block-Chain-based voting systems, which facilitate
participation in and administration of voting for voters, candidates, and officials. Because we …

[HTML][HTML] Novel Steganographic Method Based on Hermitian Positive Definite Matrix and Weighted Moore–Penrose Inverses

S Pepić, M Saračević, A Selim, D Karabašević… - Applied Sciences, 2024 - mdpi.com
In this paper, we describe the concept of a new data-hiding technique for steganography in
RGB images where a secret message is embedded in the blue layer of specific bytes. For …