IMPROVED ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHMS

ABSTRACT The recent popularity of Elliptic Curve Digital Signature Algorithm (ECDSA) has been attributed to its capability of providing good security using shorter key size. Although ECDSA is secure based on the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP) and it is being used to ensure users’ authentication, transactions non-repudiation, and data integrity,

USE OF TRANSFER LEARNING AND MACHINE LEARNING FOR DISEASE PRONE DETECTION IN WATERMELON FRUIT

ABSTRACT Given that consumption has increased as a result of medical advice, watermelon crop disease detection is essential for maintaining its health. The Jupyter IDE, libraries, Kaggle dataset, preprocessing, constructing CNN model, training, and testing steps of a deep learning-based technique were suggested. The pre-selected box setting method used by the CNN model was enhanced

TOWARDS A BLOCKCHAIN-BASED PARTIAL COMPUTATION OFFLOADING FOR THE METAVERSE IN IN-NETWORK COMPUTING

ABSTRACT The Metaverse is anticipated to offer an immersive experience to many simultaneous users. Therefore, it is critical to optimally allocate computing resources to meet the massive users’ demand. Meanwhile, the In-network computing (COIN) paradigm has emerged to reduce delay and meet quality of experience (QoE) by using unused network resources for performing some tasks.

SMART IoT DRONE SYSTEMS FOR NEWS AND INTELLIGENCE GATHERING IN DIGITAL JOURNALISM

 ABSTRACT  The adoption of Internet of Things (IoT) Drones in journalism had signalled a digital revolution that altered news reporting, intelligence gathering, and the management of journalistic information processing in accordance with disruptive technology paradigm shift, which epitomizes information communication technologies(ICTs) digital ascendancy. The ICTs embedment are steadily changing how information are gathered and disseminated

PICTURE PASSWORD: A SURROGATE TO PIN AUTHENTICATION SCHEME ON ANDROID PHONES

ABSTRACT An authentication system on Android devices provides access control to the devices. It screens access to the devices. The security system makes it sufficiently difficult for an unauthorized person to gain access to computing resources. This work proposes an authentication scheme that could substitute Personal Identity Number (PIN) based on Passfaces technology. The scheme