- Home
- A-Z Publications
- Recent Patents on Engineering
- Previous Issues
- Volume 15, Issue 4, 2021
Recent Patents on Engineering - Volume 15, Issue 4, 2021
Volume 15, Issue 4, 2021
-
-
Text Encryption Based on Huffman Coding and ElGamal Cryptosystem
Authors: Khoirom M. Singh, Laiphrakpam Dolendro Singh and Themrichon TuithungBackground: Data that are in the form of text, audio, image, and video are used everywhere in our modern scientific world. These data are stored in physical storage, cloud storage and other storage devices. Some of these data are very sensitive and require efficient security while storing as well as in transmitting from the sender to the receiver. Objective: With the increase in data transfer operation, enough space is also req Read More
-
-
-
A Virtual Machine Migration Mechanism Based on Firefly Optimization for Cloud Computing
Authors: Shalu Singh and Dinesh SinghBackground: Cloud computing is one of the prominent technology revolutions around us. It is changing the ways the consumer expends services, changing the ways the organization develop and run applications and is completely reshaping the old business models in multiple industries. Cloud service providers need large-scale data centers for offering cloud resources to users, the electric power consumed by these data center Read More
-
-
-
Iterative Framework and Privacy Preservation in Reciprocal Recommendation
Authors: Nazia Tabassum and Tanvir AhmadAlthough there are many reciprocal recommenders based on different strategies which have found applications in different domains but in this paper we aim to design a common framework for both symmetric as well as asymmetric reciprocal recommendation systems (in Indian context), namely Job recommendation (asymmetric) and Online Indian matrimonial system (symmetric). The contributions of this paper is multifol Read More
-
-
-
Key Independent Image Deciphering using Neighbourhood Similarity Characteristics and Divide-and-conquer Attack
Authors: Ram Ratan and Arvind YadavAim: The aim of the paper is to analyse the security strength of image encryption schemes which are based on pixel rotation and inversion functions. The key independent image decryption methodologies are presented to obtain original images with intelligible contents from encrypted images using neighbourhood similarity characteristics and divide-and-conquer attack. Background: The efficiency and security strength Read More
-
-
-
Quantum Computation Based Grover’s Search Algorithm and its Variations
Authors: Kapil K. Soni and Akhtar RasoolBackground: The future computations need parallelism, and a way to achieve the same is through quantum-based specific properties. Quantum computation supports exponential operation to be performed in parallel over a single execution step and hence achieves computational speedup. Objective: One of the quantum-based algorithms allows to search the key element over an index based unstructured database and succ Read More
-
-
-
A Seven-layered Model Architecture, Network Model, Protocol Stack, Security, Application, Issues and Challenges in Internet of Vehicle
Authors: Intyaz Alam, Sushil Kumar and Pankaj K. KashyapBackground: Recently, the Internet of Things (IoT) has brought various changes in the existing research field by including new areas such as smart transportation, smart home facilities, smart healthcare, etc. In smart transportation systems, vehicles contain different components to access information related to passengers, drivers, vehicle speed, and many more. This information can be accessed by connecting vehicles wit Read More
-
-
-
Conceptual Framework to Mitigate Internet of Things-DDoS Attacks Using Fog Nodes
Authors: B.B. Gupta and S.A. HarishInternet of Things has proven to maximize workflow and data sensing capabilities. Contrarily, Distributed Denial of Service attacks that employ compromised Internet of Things devices have caused considerable damage to the Information Technology infrastructure since their advent. More specifically, Application-level attacks facilitated using affected Internet of Things devices are found to be difficult to detect and defend a Read More
-
-
-
A Heuristic Approach to Crime Prediction based on Generalization of Crime Categories
Authors: Gaurav Hajela, Meenu Chawla and Akhtar RasoolBackground: As crime rates are increasing all over the world, many methods for crime prediction based on data mining have been proposed in the past. Crime prediction finds application in areas like predictive policing, Hotspot evaluation and geographic profiling. It has been observed in the past that crime is closely related to geographical location, time, weather conditions and day of the week. Objective: Thus, to tackle crim Read More
-
-
-
Network Intrusion Detection Methods Based on Deep Learning
Authors: Xiangwen Li and Shuang ZhangTo detect network attacks more effectively, this study uses Honeypot techniques to collect the latest network attack data and proposes network intrusion detection classification models, based on deep learning, combined with DNN and LSTM models. Experiments showed that the data set training models gave better results than the KDD CUP 99 training model’s detection rate and false positive rate. The DNN-LSTM intrusion Read More
-
-
-
Overview of Wireless Implantable Energy Supply and Communication Technology
Authors: Shuang Zhang, Yuping Qin, Jiang-ming Kuang, Jining Yang, Jin Xu, Jiujiang Wang and Yihe LiuWith the development of integrated circuits and microelectronics, integrated and miniaturized implantable medical devices are increasingly used in modern medical technologies, e.g., cardiac pacemakers, vasodilators, and cochlear implants. However, the normal operation of these devices is inseparable from the availability of sufficient energy supply and the bidirectional transmission of internal and external signals. Due to the Read More
-
-
-
Contactless Core-temperature Monitoring by Infrared Thermal Sensor using Mean Absolute Error Analysis
Authors: Fahad L. Malallah, Baraa T. Shareef, Mustafah Ghanem Saeed and Khaled N. YasenAims and Objectives: Usually, the increase in temperature of an individual indicates the possibility of being infected with a disease that might be risky to other people, such as coronavirus. Traditional techniques for monitoring body core-temperature require body contact either by oral, rectum, axillary, or tympanic means, which are unfortunately considered intrusive in nature as well as causes of contagion. Therefore, s Read More
-
-
-
Torsional Vibration Suppression of Electric Vehicle Power Transmission System Based on Parameter Optimization and Fuzzy Control
Authors: Guoqiang Chen and Zhifei YangBackground: The torsional vibration of the power transmission system has heavy effect on the ride comfort and safety of the vehicle, which has attracted plenty of research. Therefore, aiming at the torsional vibration problem of the electric vehicle power transmission system, enough study on how to suppress the torsional vibration is clearly of great benefit. Objective: The goal of the work is to explore the new method to sup Read More
-
-
-
Study on Physical and Mechanical Properties of Q4 Loess in Lanzhou Rail Transit Area
Authors: Xiaoping Cao and Shoubang SunBackground: It has been observed that part of the tunnel of rail transit of line 1# in Lanzhou city passes through loess. Loess has obvious water sensitivity and anisotropy, these obvious characteristics have different degrees of influence on different projects. Objective: This study aims to compare the differences of shear strength with the vertical and horizontal direction through the triaxial and direct shear test, and perm Read More
-
Volumes & issues
-
Volume 19 (2025)
-
Volume 18 (2024)
-
Volume 17 (2023)
-
Volume 16 (2022)
-
Volume 15 (2021)
-
Volume 14 (2020)
-
Volume 13 (2019)
-
Volume 12 (2018)
-
Volume 11 (2017)
-
Volume 10 (2016)
-
Volume 9 (2015)
-
Volume 8 (2014)
-
Volume 7 (2013)
-
Volume 6 (2012)
-
Volume 5 (2011)
-
Volume 4 (2010)
-
Volume 3 (2009)
-
Volume 2 (2008)
-
Volume 1 (2007)
Most Read This Month
Article
content/journals/eng
Journal
10
5
false
en
