- Biometric Identification and Security
- User Authentication and Security Systems
- Computational Drug Discovery Methods
- Non-Invasive Vital Sign Monitoring
- Digital Media Forensic Detection
- Anomaly Detection Techniques and Applications
- Cloud Computing and Resource Management
- Technology Adoption and User Behaviour
- IoT-based Smart Home Systems
- ERP Systems Implementation and Impact
- Wireless Body Area Networks
- IoT and Edge/Fog Computing
- Context-Aware Activity Recognition Systems
- Entrepreneurship Studies and Influences
- ECG Monitoring and Analysis
- Vehicular Ad Hoc Networks (VANETs)
- Peptidase Inhibition and Analysis
- Fire Detection and Safety Systems
- Network Security and Intrusion Detection
- Software Engineering Research
- Migration, Ethnicity, and Economy
- Video Surveillance and Tracking Methods
- Chemical Synthesis and Analysis
- Mobile Health and mHealth Applications
- Opportunistic and Delay-Tolerant Networks
Amrita Vishwa Vidyapeetham
2024-2025
University of KwaZulu-Natal
2024-2025
Sylhet Agricultural University
2024
College of Applied Sciences, Nizwa
2023-2024
International Information Technologies University
2023-2024
University of Waterloo
2024
University of Baghdad
2023
College of Applied Sciences- Ibri
2023
Sudan University of Science and Technology
2022
Haliç University
2021
In this prototyped project, an attempt will be made to develop a locking system for cars so it would not start without alcohol checking mechanism. The take the advantage of pre-existing Alcohol sensor. fact, project is intended granting base further explorations in future. This aimed at exiting efforts accidents prevention developments, hope implementing real life increase roads safety.
This paper proposed a new detection method to detect video copy-move forgery with significant improvement in terms of its accuracy based on the optical flow inconsistencies that considers image motion for clone an object movement displacement paths. Finally, paths are compared between each other using Dynamic Time Warping (DTW) matching algorithm object. The experimental results show this is higher than preceding relevant study and very encouraging.
The purpose of this paper is to investigate the relationship between green supply chain management (GSCM), sustainability and environmental uncertainties through corporate social responsibility (CSR) perspective.The study also tries examine mediating role in sustainable performance.The carried out on firms oil gas sector Kingdom Oman results are analyzed using SEM-PLS.The findings reveal fact that performance has become primary objective organizations.Achieving now becoming main for business...
Robots are devised in such way to dispose of human intervention from labour extensive and hazardous work environment. At times they also used travel unreachable workplaces that typically not possible access by human. Pipe inspections fall the same category due fact carry toxic chemicals fluids. Furthermore, most pipeline segments have tiny internal diameter or bends which end up The complex inner geometry hazard content constraints pipes call for robots inspection so as test corrosion,...
Iris recognition is one of the most reliable biometrics for identification purpose in terms reliability and accuracy. Hence, this research integration cancelable features iris using encryption decryption non-invertible transformation proposed. Here, biometric data protected via proposed method. The experimental results showed that rate achieved 99.9% Bath-A dataset with a maximum decision criterion 0.97 along acceptable processing time.
Abstract Human malaria remains a global health challenge, with Plasmodium falciparum responsible for the most severe cases. Despite efforts, eradicating has proven difficult, mainly because of rise in drug resistance, particularly against artemisinin and its derivatives. One possible cause this resistance is activation unfolded protein response (UPR), which helps maintain cellular balance under stress. In P. , UPR operates through ubiquitin-proteasome system (UPS), involves proteins such as...
Abstract Acetyl-CoA Synthetase 2 (ACSS2) has emerged as a new target for anticancer development owing to its high expression in various tumours and enhancement of malignancy. Stressing the growing interest peptide-derived drugs featuring better selectivity efficacy, computational protocol was applied design peptide inhibitor ACSS2. Herein, 3600 sequences derived from ACSS2 nucleotide motif were generated by classifying 20 amino acids into six physiochemical groups. De novo modeling...
Carbon monoxide (CO) gas is a compound produced by incomplete combustion of various carbon-based fuels and substances. The slow accumulation this poisonous can cause headaches, nausea, vomiting, vertigo confusion which are harmful for the passengers' safety environmental protection. This study aims to design an integrated system vehicle that sense detect gases such as carbon (CO). Further, it monitors content lively displays their concentration every second. It also provides alarm...
The main purpose of this paper is to understand the true impact security on e-banking users and its relationship with user behavior toward acceptance. This reviews in-depth previous studies factors affecting e-banking. Security trust, risks, protection strategy best practices for future trends are discussed help banks consumers mitigate suitable secure transactions Results from reviewing valuable in shows that trust privacy concerns have highest accepting any system. issues can decrease...
DeepFake is a concern for celebrities and everyone because it simple to create.DeepFake images, especially high-quality ones, are difficult detect using people, local descriptors, current approaches.On the other hand, video manipulation detection more accessible than an image, which many state-of-the-art systems offer.Moreover, of depends entirely on its through images.Many worked in but they had complex mathematical calculations preprocessing steps, limitations, including that face must be...
Mitotic kinesins are eukaryotic proteins that play a vital role in cellular mitosis. Their over-expression malignant rather than normal cells and their specific made kinesin inhibitors promising cancer therapeutics. The realization of in-vitro antitumor activity the investigational molecule-monastrol-was traced to its allosteric inhibition ATPase motor domain Human Kensin-5 (Eg5) prompted extensive efforts towards inhibitors. Many reports pointed prospect Kinesin-like protein (KIFC1) as...
ABSTRACT Protein–protein interactions, or PPIs, are a part of every biological activity and have been linked to number diseases, including cancer, infectious neurological disorders. As such, targeting PPIs is considered strategic vital approach in the development new medications. Nonetheless, wide flat contact interface makes it difficult find small‐molecule PP inhibitors. An alternative strategy would be use PPI interaction motifs as building blocks for design peptide‐based Herein, we...
Many researchers realised that iris as biometrics is the most accurate means for recognition since of human contain uniquepatterns. Hence in this study, we used Gabor filter feature extraction to evaluate possibility extracting half with Support Vector Machine classifier. Initial findings based on experimental analysis conducted showed proposed method suitable input performance attained specifically FAR and FRR 0.21% ERR 99.56%. Thus, technique could be overcome occlusion due eyelids...
Fire fighter robot is a machine developed by humans to guard human live, because the accidents happening during fire extinguishing process uncountable. This main function detect and move towards automatically extinguish it from safe distance using water. robot's movement behavior will be fully controlled programmable raspberry pi. which in form of vehicle right, left, front back fire. also have thermal camera an infrared mounted over it. The purpose temperature provide night vision imaging...
Digital video can be manipulated and edited easily because of the available robust processing editing software. In current times, digital image tools has contributed to challenge in authenticating multimedia content an accurate manner. It is now possible modify, through adding removing, pertinent evidence form a recording without leaving clue as tampering process. Even worse, some post-methods effects, which insert deleting object order mimic or hide particular event frames video, are also...
The number of migrants with specialized skills and higher education has increased significantly since the 1990s. These are very active in high-tech engineering-intensive industries that rely heavily on knowledge, innovation advanced systems processes. This paper pieces together literature this group people to brings light their importance contribution host countries. We noted by virtue knowledge contribution, globally valued may enjoy unique privileges. Their key takes forms of: filling...
Recently, (Radio Frequency Identification) RFID based frameworks move beyond security to turn into tracking systems that integrate with more proficient materials inside the library, involving easier and quicker charging & discharging, handling inventorying. In this study, a book RFID-based system has been designed developed replace existing library barcoding system. This enables librarians minimise spent time is required for scanning barcodes during discharging process. Further, technology...