Vijay Kumar Chaurasiya
YOU?
Author Swipe
View article: AI-Based Fraud Detection System in Online Transactions
AI-Based Fraud Detection System in Online Transactions Open
In the fast-paced digital world, the habit of online transactions has become the part and parcel of everyday life. On the other hand, it has also increased the fraudulent factor regarding cybercrime. Artificial Intelligence, in this regard…
View article: Secure Transactions in <scp>IoT</scp> Network Using <scp>PINN</scp>‐Based Intrusion Detection System and <scp>HDPoA</scp> Blockchain Protocol
Secure Transactions in <span>IoT</span> Network Using <span>PINN</span>‐Based Intrusion Detection System and <span>HDPoA</span> Blockchain Protocol Open
IoT is a rapidly developing technology with a wealth of creative application possibilities. However, IoT wireless sensor networks are vulnerable to Denial of Service (DoS) attacks due to their insecure nature. Although network integrity an…
View article: A comparative study on cognitive flexibility between elite and sub elite male soccer players
A comparative study on cognitive flexibility between elite and sub elite male soccer players Open
View article: Alert generation and Vehicle Authenticationin fog environment
Alert generation and Vehicle Authenticationin fog environment Open
Be it the advancement of infrastructure or the impact of the pandemic, more and more vehicles are added to the system. This has significantly increased traffic density, resulting in traffic jams and sometimes leading to collisions. Therefo…
View article: Privacy-Preserving Hybrid Federated Learning Framework for Mental Healthcare Applications: Clustered and Quantum Approaches
Privacy-Preserving Hybrid Federated Learning Framework for Mental Healthcare Applications: Clustered and Quantum Approaches Open
Privacy-preserving approaches are essential in health- care applications where sensitive data is involved. Federated learning (FL) has emerged as a widely adopted approach for collaboratively training decentralized models without sharing i…
View article: Spectral Sentinel: Leveraging Shadow Networks and Decoy Systems for Advanced Incursion Surveillance
Spectral Sentinel: Leveraging Shadow Networks and Decoy Systems for Advanced Incursion Surveillance Open
It would be an understatement to say that the internet is hazardous in this age of constantly evolving attack mechanisms and pervasive data thefts.For security specialists, it is akin to engaging in an endless game of cat-and-mouse as they…
View article: Preventing Insider Attacks in Databases
Preventing Insider Attacks in Databases Open
Many web applications that rely on centralized databases face vulnerabilities to insider attacks.While these systems implement multiple layers of security measures against external hackers, they may overlook the threat posed by employees w…
View article: Datasets for Indoor Positioning with Single-AP Wi-Fi Fingerprinting
Datasets for Indoor Positioning with Single-AP Wi-Fi Fingerprinting Open
Datasets for Indoor Positioning with Single-AP Wi-Fi Fingerprinting.
View article: Datasets for Indoor Positioning with Single-AP Wi-Fi Fingerprinting
Datasets for Indoor Positioning with Single-AP Wi-Fi Fingerprinting Open
Datasets for Indoor Positioning with Single-AP Wi-Fi Fingerprinting.
View article: Automatic Firearm Detection in Images and Videos Using YOLO-Based Model
Automatic Firearm Detection in Images and Videos Using YOLO-Based Model Open
In this day and age, we are witness to ever increasing gun violence all around the world. Technology has surpassed all human beliefs where each person can be easily tracked through their mobiles or through the fortitude of CCTV cameras ava…
View article: GENDER DIFFERENCE IN DEPRESSION: WITH REFERENCE TO ELITE SPORTSPERSONS
GENDER DIFFERENCE IN DEPRESSION: WITH REFERENCE TO ELITE SPORTSPERSONS Open
Present study comparatively assessed depression in elite male and female sportspersons. To conduct the study, 50 elite male sportspersons (Average age 24.77 years) and 50 elite female sportspersons (Average age 25.12 years) were selected a…
View article: A study on unplanned hostile aggression in national female hockey players of gold, silver and bronze medal Winning teams
A study on unplanned hostile aggression in national female hockey players of gold, silver and bronze medal Winning teams Open
Unplanned hostile aggression is the result of an intense emotional state and it is impulsive as compared to facilitative aggression to achieve goals. The present study analysed unplanned hostile aggression in national female hockey players…
View article: Computationally secure threshold secret sharing scheme with minimal redundancy
Computationally secure threshold secret sharing scheme with minimal redundancy Open
When designing and using distributed storage systems with cloud technology, the security issues become crucial. One of the promising mechanisms is the computationally secure threshold secret sharing scheme. We propose a computationally sec…
View article: Detection of Malicious Node Behaviour via I-Watchdog Protocol in Mobile Ad Hoc Network with DSDV Routing Scheme
Detection of Malicious Node Behaviour via I-Watchdog Protocol in Mobile Ad Hoc Network with DSDV Routing Scheme Open
Mobile ad hoc network, is nowadays becoming extremely famous in research vicinity. A range of protocols and methodology is coming into account to resolve an assortment of issues associated with a mobile ad hoc network. The nodes in mobile …
View article: Neural Network Based Human Age-group Estimation in Curvelet Domain
Neural Network Based Human Age-group Estimation in Curvelet Domain Open
In this paper we investigate whether human digital fingerprints can be used to estimate human age-groups. To our knowledge, human age-group estimation using digital fingerprints have not been addressed formally. Human age-group estimation …