HTTPs is essentially an integration of the Hypertext Transfer Protocol with either TLS or SSL. The responsibility of SSL/TLS in HTTPs is to encrypt the content of HTTP. Without encryption, the communication can be comprehended ...
In surveillance systems, video quality must be kept above a certain limit to be able to perceive the contents. In the standard
system, when the overall throughput drops, all cameras data rate, regardless their importance, ...
Optical character recognition concerns translating character images into character text. Four main stages constitute any optical recognition system. They are pre-processing, feature extraction, character recognition, and ...
This paper presents a text detector system, named NNBoxes, which detects text with both high accuracy and efficiency, NNBoxes is a hybrid technique between the Neural network (Noise reduction and letters prediction) and ...
A large quantity of data is being generated in the form of blogs, tweets and updates of opinions on the topic of interest.People give their feelings and opinions on different topics such as movies, products, education, ...
Phu Phu, Tran Nguyen; Gia Han, Dang Phuong; Cong Luong, Nguyen; Van Cuong, Nguyen(2021-01-01)
Static Random-Access Memory (SRAM) has become phenomenally crucial to a board spectrum of VLSI designs and applications, ranging from high-performance CPUs to low-power mobile hand-held devices. As technology scaling helps ...
Computer Supported Collaborative Learning (CSCL) provides the possibility of learning through collaborative interaction, and the social construction of knowledge through the utilization of information technology (IT). It ...
Dibal, Peter Yusuf; N. Onwuka, Elizabeth; Agajo, James; O. Alenoghena, Caroline; Adejo, Achonu(2021-01-01)
Very Large Scale Integration (VLSI) design is a technological advancement in electronics that has widely shortened the window from concept to a working prototype in any design. It has also made it possible to design and ...
Audio is one of the multimedia's main component and is the most common way of communication, and many conversations may possess crucial information like credit card numbers, voter card details, etc. Hence the security and ...
El-Khamy, Said E.; Elragal, Hassan M.; Polus, Remon(2021-01-01)
Non-Orthogonal Multiple Access (NOMA) is considered as one of the key technologies for the fifth generation (5G) of the cellular networks. However, due to the complexity of the Successive Interference, spatial multiple ...
Nowadays, smart meters are being used for measuring power consumption at the consumer end. These smart meters send the energy consumption data to the control center of the service provider at regular intervals. However, ...
Video conference service is an application that offers video and audio at the same time, and it is one of the real-time applications that deplete the capacity of any system significantly. Fortunately, the IEEE 802.16e ...
Abid, Noor Hamad; T. Faraj Al-Janabi, Sufyan(2021-01-01)
Voting is the process through which representatives of the country (or an organization) are chosen. However, some voters may not go to the polls to vote for personal or public reasons. One solution to this problem is ...
Vital, T. PanduRanga; Sangeeta, K.; Kumar, Kalyana Kiran(2021-01-01)
Education is the vital parameter of the country for development in divergent areas like cultivation, economic, political, health, and so on. Any educational Institute’s (universities, colleges, schools) main goal is to ...
In this paper, different models for disease detection and classification are studied for cannabis plants. Cannabis plants are used for medical and recreational purposes with its recent legalization in some places. Cannabis ...
Binary information extracted from biometrics is variable when it is generated from photographic images. If the same bit-string representation can be produced repeatedly, these bit-strings are useful for applications that ...
Doo, Ill Chul; Shin, Hyun Duck; Park, Mee Hwa(2021-01-01)
In this paper, we propose a business analysis method that automatically collects review information related to a specific product by using a web crawler, analyzes the customer's emotional response to the product, and ...
A Blockchain is a distributed, decentralized and ordered list of special data structures called as blocks, where each block is connected to its previous block by a special pointer called as hash pointer, resulting in an ...
Wireless Sensor Network (WSN) is an essential constituent of IoT based smart city applications.WSN is one of the prominent sensing technologies for data acquisition in smart surveillance and monitoring applications. However, ...
Gait abnormality is a common problem in humans after any lower limb injury or a stroke attack or. The detection of abnormal gait is an important measure for designing and following appropriate rehabilitation protocol. This ...