Skip to main content
This paper proposes the technique of storing of image data in the FPGA memory and subsequent processing of the stored image data using MicroBlaze processor core of the Xilinx FPGA device. Though related research work exists in processing... more
    • by 
    •   2  
      Image ProcessingBinary Image
The Internet of Things (IoT) is one of the major technological trends which is utilized to monitor natural and human made resources to help in predicting and detecting exigence events like flood, fire, gas and water leak that can pose an... more
    • by 
    •   2  
      EngineeringComputer Science
Biometrics has become important in security applications. In comparison with many other biometric features, iris recognition has very high recognition accuracy because it depends on iris which is located in a place that still stable... more
    • by 
    • by 
In this paper we propose a design using both a microprocessor and light sensors for automatic room light detection and control. Our design, the HLCM (Home Light Control Module) which will be installed in every light fixture of a family,... more
    • by 
    •   2  
      Embedded SystemElectrical and Electronic Engineering
A new type of brain tumor identification system is proposed and analyzed in this paper by detecting Infected Region using a combination of Region Growing Algorithm, Cryptography and Digital Watermarking. The information related to... more
    • by 
    •   3  
      CryptographyBit Error RateGraphical User Interfaces
Willingness-To-Pay (WTP) is the most a person is willing to pay for a good or service. Conversely, Willingness-To-Accept (WTA) is the minimum amount a person is willing to accept for giving up a good or service. People often attribute a... more
    • by 
    • Social Science Research Network
Conversational agents have transcended into multiple industries with increased ability for user engagement in intelligent conversation. Conversations with chatbots are different from interpersonal communication in terms of turntaking,... more
    • by 
    •   2  
      PsychologyComputer Science
Individual concerns about account takeover and subversion are well-documented. Surveys indicate that concerns for the privacy and security of online accounts are widely shared. Adopting Two-Factor Authentication (2FA) is an action that... more
    • by 
    •   2  
      Computer ScienceUsability
A large proportion of email messages in an average Internet user's inbox are unwanted commercial messages from mailing lists, bots, and so on. Although such messages often include instructions to unsubscribe, people still struggle with... more
    • by 
    • Computer Science
    • by 
    • Computer Science
The purpose of this study is to understand the privacy concerns and behavior of non-WEIRD populations in online messaging platforms. Analysis of surveys (n = 674) of WhatsApp users in Saudi Arabia and India revealed that Saudis had... more
    • by 
    • Internet privacy
Technology is uniquely positioned to help us analyze large amounts of information to provide valuable insight during widespread public health concerns, like the ongoing COVID-19 pandemic. In fact, information technology companies like... more
    • by 
    •   3  
      BusinessComputer ScienceInternet privacy
The IETF Manufacturer Usage Description (MUD) standard was designed to protect IoT devices through network micro-segmentation. In practice, this is implemented using per-device access control that is defined by the manufacturer. This... more
    • by 
    •   4  
      Computer ScienceVisualizationUsabilitySoftware Deployment
The behaviour of nonlinear turbo codes that use nonlinear finite state sequential machines (FSSMs), designed over the finite field GF(4), as constituent encoders is studied. These FSSMs show a nonzero output for the all-zero input case.... more
    • by 
Graphical elements: particularly tables and figures contain a visual summary of the most valuable information contained in a document. Therefore, localization of such graphical objects in the document images is the initial step to... more
    • by 
In this conference proceeding, a novel intensity profile measuring systems is presented that is controlled by gesture recognition principles. This low-cost device works much faster and can be used to measure profiles of wide variety of... more
    • by 
The extraction of blood vessels by morphological segmentation and the detection of the severity of diabetic retinopathy are proposed in this paper. The proposed algorithm extracts the finest vessels in the retina within a remarkably... more
    • by 
    • Medicine
Fingerprint recognition, one of the important biometric verification tools plays an important role in maintaining good security in any sort of systems. The fingerprint recognition in this paper deals with the extraction of features... more
    • by 
    • Computer Science
Diabetic Retinopathy, one of the most common diseases occurring in diabetic patients results in partial or complete vision loss. So, its early detection is needed and needs to be taken care of. The paper deals with the filter based... more
    • by 
    • Computer Science