Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2024
Advanced EEG-Based Classification of Periodic Leg Movements and Bruxism Using Complexity and Entropy Features
Procedia Computer Science (PROCS), Volume 235, Issue CPages 1034–1043https://doi.org/10.1016/j.procs.2024.04.098AbstractPeriodic leg movements (PLM) and bruxism are prevalent sleep disorders that significantly impact sleep quality and overall health. Accurate and timely detection of these disorders is pivotal for effective treatment and improved patient well-being. ...
- research-articleMay 2024
- research-articleJanuary 2023
Efficient blockchain addresses classification through cascading ensemble learning approach
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 15, Issue 2Pages 195–210https://doi.org/10.1504/ijesdf.2023.129278Bitcoin is a pseudonymous, decentralised cryptocurrency that has become one of the most widely utilised digital assets to date. Because of its uncontrolled nature and Bitcoin users' inherent anonymity, it has seen a significant surge in its use for ...
- research-articleJanuary 2023
Classifying blockchain cybercriminal transactions using hyperparameter tuned supervised machine learning models
International Journal of Computational Science and Engineering (IJCSE), Volume 26, Issue 6Pages 615–626https://doi.org/10.1504/ijcse.2023.135281Bitcoin is a crypto asset with transactions recorded on a decentralised, publicly accessible ledger. The real-world identity of the bitcoin blockchain users is masked behind a pseudonym, known as an address that provides a high level of anonymity, which ...
- research-articleJanuary 2023
Classifying Transactional Addresses using Supervised Learning Approaches over Ethereum Blockchain
Procedia Computer Science (PROCS), Volume 218, Issue CPages 2018–2025https://doi.org/10.1016/j.procs.2023.01.178AbstractEthereum is a digital asset whose transactions are kept on a decentralized, globally accessible ledger. An Ethereum Blockchain owner's real identity is concealed behind a pseudonym termed an address. Because of this, Ethereum is frequently used in ...
- research-articleJanuary 2023
Comparative Approach to Detect Nocturnal Frontal Lobe Epilepsy Sleep Disorder through Frequency spectrum and its Energy Levels
Procedia Computer Science (PROCS), Volume 218, Issue CPages 479–487https://doi.org/10.1016/j.procs.2023.01.030AbstractEEG data has proved to reflect the activities of the brain over all the sections with respect to human activities. It is useful in both cases that are in awakening states and in the sleep stage. Most of brain disease is due to the deterioration of ...
- research-articleMay 2023
Keypoint Detection for Identifying Body Joints using TensorFlow
ICIMMI '22: Proceedings of the 4th International Conference on Information Management & Machine IntelligenceArticle No.: 111, Pages 1–6https://doi.org/10.1145/3590837.3590948Keypoint Detection for the Body Joints is a process of finding and detecting all the important body joints of a human being. It takes an RGB image as input gives a list of keypoints as output. It can be applied for single-person body joints detection or ...
- research-articleMay 2023
Human Pose Estimation using Deep Learning Techniques
ICIMMI '22: Proceedings of the 4th International Conference on Information Management & Machine IntelligenceArticle No.: 72, Pages 1–6https://doi.org/10.1145/3590837.3590909Human Pose Estimation is a method of detecting and classifying all the key human body joints. A 2D Human Pose Estimation method predicts the two-dimensional coordinates from an input image. Classical methods used deformable parts models for detecting ...
- articleJuly 2020
Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications
International Journal of Digital Crime and Forensics (IJDCF), Volume 12, Issue 3Pages 58–76https://doi.org/10.4018/IJDCF.2020070105Nowadays, mobile cloud applications have attracted millions of smartphone users due to the proliferation of cyber technologies and a wide range of applications. Mobile cloud forensic investigation methodologies need tremendous growth due to the ...
- research-articleJanuary 2020
UML-based process model for mobile cloud forensic application framework - a preliminary study
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 12, Issue 3Pages 262–278https://doi.org/10.1504/ijesdf.2020.108296The mobile cloud forensics has received a great deal of attention within the digital forensics community. Collecting potential evidence from the mobile cloud by applying forensically sound methods faces severe setback due to technological advancements. ...
- research-articleJanuary 2020
Enhanced Forensic Process for Improving Mobile Cloud Traceability in Cloud-Based Mobile Applications
Procedia Computer Science (PROCS), Volume 167, Issue CPages 907–917https://doi.org/10.1016/j.procs.2020.03.390AbstractRecently, the raPID popularity of smart phones significantly impacts the day-to-day activities of humans due to the increased access to social media and instant messaging services. The misuse of social media services leads to different cybercrime ...
- research-articleFebruary 2024
Enhancing Decision Tree Classification Accuracy through Genetically Programmed Attributes for Wart Treatment Method Identification
Procedia Computer Science (PROCS), Volume 132, Issue CPages 1685–1694https://doi.org/10.1016/j.procs.2018.05.141AbstractOrigin: Warts are produced and developed on the human body due to infection induced by Human Papillomavirus. The most influenced zone of warts are hands and feet particularly, which is bit irritating and difficult to recoup in later stages. The ...
- research-articleAugust 2016
Protecting Sensitive Warehouse Data through UML based Modeling
ICIA-16: Proceedings of the International Conference on Informatics and AnalyticsArticle No.: 31, Pages 1–6https://doi.org/10.1145/2980258.2980316In today's competitive scenario in industries, each organization wants huge profit. A Data Warehouse is a place for storage of reservoir of data from the various organizations in the range of hundreds of gigabytes to terabytes in size. During the course ...
- research-articleJanuary 2013
UML modeling of load optimization for distributed computer systems based on genetic algorithm
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 38, Issue 1Pages 1–7https://doi.org/10.1145/2413038.2413043Distributed computing has now become one of the most efficient network system configurations to exhibit parallelism in loosely coupled systems. These systems are known for better reliability, availability, scalability and robustness, intended to provide ...
- research-articleMay 2012
Semantics for UML model transformation and generation of regular grammar
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 37, Issue 3Pages 1–5https://doi.org/10.1145/2180921.2180931Graphs are one of the most popular non linear data structures used to represent various data objects. These graphical structures can further be classified into directed and undirected graph representations. For modeling purpose, UML has adopted the ...
- research-articleOctober 2009
Performance evaluation of network system through UML
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 34, Issue 5Pages 1–3https://doi.org/10.1145/1598732.1598740In distributing computing environments, information processing is distributed among many computer systems rather than confined to a single computer. They are widely used for enhancing the performance of complex and bulky numerical calculations. ...
- research-articleFebruary 2009
Performance evaluation for object oriented software systems
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 34, Issue 2Pages 1–5https://doi.org/10.1145/1507195.1507213Distributed computing has become an integral part of large and complex computation used in large organizations. It not only hides the complexities of processing from its user but it also delivers high-level security, reliability and availability. In ...