Design and Evaluation of Parallel Processing Techniques for 3D Liver Segmentation and Volume Rendering
Ensuring Software Quality in Engineering Environments
New 3D Face Matching Technique for an Automatic 3D Model Based Face Recognition System
Algorithmic Cost Modeling: Statistical Software Engineering Approach
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
COVID-19 is commonly known as a novel coronavirus disease, which is a highly contagious disease that emerged in China in late 2019. This disease is caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It is a virus belonging to the large family of coronaviruses. The disease first emerged in Wuhan, China in 2019 and then quickly developed into a global pandemic, spreading to more than 213 countries. The well-known symptoms of COVID-19 are fever, shortness of breath, dry cough, and other symptoms. Pain or difficulty breathing may occur. Most of these symptoms point to signs of respiratory infections and lung abnormalities that can be detected by radiologists. So, chest xray and computed tomography images can be used with machine learning algorithms to find the disease.
Recent developments in Steganalysis have made it difficult to secure personal content, messages, or digital images using steganography. Using Steganalysis can easily reveal the presence of hidden information in storage files. This paper presents a new Steganographic approach to communication between two individuals. The approach presented in this paper uses both Steganographic and cryptographic methods. Cryptography uses Rivest–Shamir–Adleman (RSA) and Steganography use image Steganography to hide data. It also uses the mutual authentication process to satisfy all services in the field of cryptography, i.e., access control, confidentiality, integrity, and authentication. In this way, it can store data more securely. Since it uses the RSA algorithm to protect the data again, it performs Steganography to hide the data in the image. Thus, any other person on the network cannot access the data present on the network. Only the sender and receiver can extract the message from the data.
Globally, illegal fishing is posing a serious financial challenge to the fishing industry. Because of this, illegal fishing pushes many fish populations to extinction. This paper proposes analyzing illegal fishing using data analysis and machine learning techniques. The existing methods use data manipulation in the illegal fishing data due to the delay in catching illegal vessels, while in this system the data is entered manually. This paper offers data analytics to find these vessels. It may collect raw data from Global Fishing Watch (GFW) and analyze the data to find vessels, whether it is used for illegal or legal fishing. Based on the sensors attached to the ship, it can find data about the Automatic Identification System (AIS) location, the ship's type, and the ship's speed. This model can predict illegal fishing and take appropriate action against illegal fishing vessels.
Visualizations of algorithms contribute to improving computer science education. The process of teaching and learning of algorithms is sometimes, complex and hard to understand problem. Visualization is a useful technique for learning and analyzing any algorithm easily. Pathfinding refers to computing an optimal route between the specified start and goal nodes. It is an important research topic in the area of Artificial Intelligence with applications in fields such as GPS, Real-Time Strategy Games, Robotics, logistics while implemented in static or dynamic or real-world scenarios. Recent developments in pathfinding lead to more improved, accurate and faster methods and still captivates the researcher's attention for further improvement and developing new methods as more complex problems arise or being developed in AI. A great deal of research work is done in pathfinding for generating new algorithms that are fast and provide optimal path since the publication of the Dijkstra algorithm in 1959.
The Internet has become a vital source in cutting-edge business, so e-shopping has become important not only from the point of view of the business person but also from the point of view of the customer. For business people, e-purchases open up new opportunities for work; for customers, make relative shopping possible. Many virtual store customers are instinctive and usually decide to stay at the outlet for a few seconds. The site plan is like decorating a store. Whether the stores look shabby or like thousands of other stores, the customer is more likely to run away to another store. Hence, it has developed a design to provide the client with uncomplicated research, data correction, and certain comments that are possible. In this design, an E-Commerce web page is passed to the stoner that can be used to purchase various types of online products. In this design, the payment system is not included because it uses a specific gateway to complete the payment system.