Bibhudendra Acharya
YOU?
Author Swipe
View article: 42 Automated segmentation and tracking of group housed pigs using zero-shot vision-language tools.
42 Automated segmentation and tracking of group housed pigs using zero-shot vision-language tools. Open
Accurate individual tracking in group-housed pigs is critical for high-precision phenotyping, enabling novel trait development. Current approaches for automatic pig tracking rely on video recordings analyzed by computer vision models, whic…
View article: Reckless Status Calculation by Using Yolo and Model Trained on RNN
Reckless Status Calculation by Using Yolo and Model Trained on RNN Open
Reckless driving significantly contributes to road accidents and fatalities worldwide, including in Nepal. To tackle this critical issue, we developed reckless driver detection application, an innovative system utilizing advanced machine l…
View article: MIE-SPD: A New and Highly Efficient Chaos-Based Multiple Image Encryption Technique With Synchronous Permutation Diffusion
MIE-SPD: A New and Highly Efficient Chaos-Based Multiple Image Encryption Technique With Synchronous Permutation Diffusion Open
Due to the advancement of computing technologies and the Internet of Things, there has been a notable rise in image data in different sectors. Having safety mechanisms in place is crucial to protect image data from unauthorised access. Thi…
View article: Comparative Analysis of Machine Learning Algorithms: KNN, SVM, Decision Tree and Logistic Regression for Efficiency and Performance
Comparative Analysis of Machine Learning Algorithms: KNN, SVM, Decision Tree and Logistic Regression for Efficiency and Performance Open
This paper presents a comparative study of machine learning models namely K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Decision Tree, and Logistic Regression on two datasets: 20Newsgroups and Wine datasets. Based on basic accur…
View article: FSR-SPD: an efficient chaotic multi-image encryption system based on flip-shift-rotate synchronous-permutation-diffusion operation
FSR-SPD: an efficient chaotic multi-image encryption system based on flip-shift-rotate synchronous-permutation-diffusion operation Open
Images are a crucial component in contemporary data transmission. Numerous images are transmitted daily through the open-source network. This paper presents a multi-image encryption scheme that utilises flip-shift-rotate synchronous-permut…
View article: Hardware implementations of LBlock and XXTEA lightweight block ciphers for resource-constrained IoT application
Hardware implementations of LBlock and XXTEA lightweight block ciphers for resource-constrained IoT application Open
Recent growth in the number of connected Internet of Things (IoT) devices in a network has raised lot of security related issues. Since these devices are mostly battery powered, have low memory and weak computational capability, therefore …
View article: Efficient hardware implementations of QTL cipher for RFID applications
Efficient hardware implementations of QTL cipher for RFID applications Open
Extensive deployment of ubiquitous computing devices brings wide range of privacy and security issues in the low-resource domain. Various lightweight algorithms are proposed to solve security problem for these resource-constrained environm…
View article: Energy-Efficient and High-throughput Implementations of Lightweight Block Cipher
Energy-Efficient and High-throughput Implementations of Lightweight Block Cipher Open
Security in resource-constrained devices has drawn the great attentions to researchers in recent years. To make secure transmission of critical information in such devices, lightweight cryptography algorithms come in light to large extend.…
View article: FPGA Implementation of RECTANGLE Block Cipher Architectures
FPGA Implementation of RECTANGLE Block Cipher Architectures Open
In recent time, various lightweight algorithms have been proposed to provide security in a constrained resource environment. With so many algorithms and their different implementations, it is hard to choose the appropriate security primiti…
View article: An Extensive Judgment of Rectangular Microstrip Patch Antenna with Flexible Substrates
An Extensive Judgment of Rectangular Microstrip Patch Antenna with Flexible Substrates Open
In this paper, the performance of U-slot Rectangular Microstrip Patch Antennas (RMSA) is analyzed by using different flexible substrates. The RMSA is designed to operate for a resonant frequency of 2.45 GHz with flexible substrate material…
View article: Distance Based Analysis For Detection Of Intrusions And Anomalies
Distance Based Analysis For Detection Of Intrusions And Anomalies Open
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In IDS a stream of data is inspected and rules are applied in order to determine whether some attack is taking place. Intrusion Detection Syst…