Linked e-resources

Details

Intro
Organization
Preface
Contents
Editors and Contributors
A New Modified MD5-224 Bits Hash Function and an Efficient Message Authentication Code Based on Quasigroups
1 Introduction
1.1 Hash Function Without a Key
1.2 Hash Function with Key or HMAC
2 Preliminaries
2.1 Quasigroup
2.2 Optimal Quasigroups
2.3 Brief Description of MD5
3 Proposed Schemes
3.1 Quasigroup Expansion (QGExp) Operation
3.2 Quasigroup Compression (QGComp) Operation
4 Implementation and Software Performance
5 Security Analysis
5.1 Analysis of QGMD5

5.2 Collision Resistance
5.3 Avalanche Effect
5.4 Analysis of QGMAC
6 Conclusions
References
Leveraging Transfer Learning for Effective Recognition of Emotions from Images: A Review
1 Introduction
2 Contributions by Researchers on Human Facial Emotion Recognition
2.1 Feature Extraction Methods
2.2 Classification
2.3 Transfer Learning
3 Methodology
3.1 Dataset
3.2 Data Preprocessing
3.3 Model Architectures
3.4 Experimental Study
4 Experimental Study and Comparison
5 Conclusion and Future Work
References

An Automated System for Facial Mask Detection and Face Recognition During COVID-19 Pandemic
1 Introduction
2 Related Work
3 Methodology
3.1 Image Preprocessing
3.2 Deep Learning Architecture
3.3 Face Recognition Module
4 Algorithm Used in Proposed model
4.1 Convolutional Neural Network (CNN)
4.2 Haar Cascade Algorithm
5 Limitations and Future Works
6 RESULTS
6.1 Face Mask Detection Module
6.2 Face Recognition Module
7 Conclusion
References
ROS Simulation-Based Autonomous Navigation Systems and Object Detection
1 Introduction
2 Related Work

3 Robot and Environment
4 Software and Platforms
4.1 ROS
4.2 RDS
4.3 RVIZ
5 ROS Autonomous Navigation
5.1 Map Creation
5.2 Localization
5.3 Path Planning
6 Object Detection
7 Results
7.1 Room Map Creation
7.2 Object Detection
7.3 Navigation
8 Conclusion and Further Work
References
Robotic Assistant for Medicine and Food Delivery in Healthcare
1 Introduction
2 The Robot
2.1 The Mechanical Implementation
2.2 Omnidirectional Wheels
2.3 Inverse Kinematic Model
3 Control system of the robot
3.1 Rotary Encoders

3.2 Proximity Sensors
3.3 Gyroscope
4 Testing of the Robot
5 Future work
6 Conclusions
References
Privacy-Preserving Record Linkage with Block-Chains
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Privacy-Preserving Record Linkage
3.2 Partial De-identification at Source
4 System Design
4.1 Service 1
4.2 Service 2
5 Performance Analysis
6 Security Analysis
7 Conclusion
References
Performance Analysis of Rectangular QAM Schemes Over Various Fading Channels
1 Introduction
2 Rectangular Quadrature Amplitude Modulation

Browse Subjects

Show more subjects...

Statistics

from
to
Export