The advancements in digital video technology have empowered video surveillance to play a vital role in ensuring security and safety. Public and private enterprises use surveillance systems to monitor and analyze daily activities. Consequently, a massive volume of data is generated in videos that require further processing to achieve security protocol. Analyzing video content is tedious and a time-consuming task. Moreover, it also requires high-speed computing hardware. The video summarization concept has emerged to overcome these limitations. This paper presents a customized video summarization framework based on deep learning. The proposed framework enables a user to summarize the videos according to the Object of Interest (OoI), for example, person, airplane, mobile phone, bike, and car. Various experiments are conducted to evaluate the performance of the proposed framework on the video summarization (VSUMM) dataset, title-based video summarization (TVSum) dataset, and own dataset. The accuracy of VSUMM, TVSum, and own dataset is 99.6%, 99.9%, and 99.2%, respectively. A desktop application is also developed to help the user summarize the video based on the OoI.
Hacking is a typical method for breaching personal and confidential information. As a result, hacking is also known as infiltration. Intrusions, on the other hand, were not always recognized as theft and were employed for productive purposes. A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. Because today's life is lived in a digital world, we need to protect our privacy from cyber-attacks. The proposed paper discussed ethical hacking and its ramifications, in which black hackers "hack" networks. The proposed research emphasizes ethical hacking tactics. This research also examines the impact of ethical hacking on business, education, health, society, the workplace, technology, sensitive information, and human life. Finally, a brief survey based on certain questions is better to grasp the public's understanding of ethical hacking. In summary, this research offers the user fascinating and helpful information when working on ethical hacking.
Nowadays, individuals are getting steadily dynamic in achieving the possible ways to clean their environment. The concerned teams have initiated other developments to build tidiness. Previously, prior data on filling the trash container was required, which cautions and sends cautioning messages to the city workers for cleaning the trash receptacle on schedule and protecting the city. In this framework, numerous dustbins through urban areas from various regions are associated with utilizing IoT innovation. This program can be used conveniently to verify the status of the dust bin, the garbage in the dust containers, clean the dust bin on time, and maintain the atmosphere's safety and prevent contamination from overflows from the dust containers. So, people don't have to test everyone's work manually, so they'll get a warning if the container is full. A sensor over the garbage container would be placed to detect the full amount of waste, and when it exceeds the excessive volume, a warning will be transmitted to the company office. The proposed framework based on Arduino IDE, cloud computing concept and Load Sensor will help clean any city. Load Sensors are utilized to distinguish the dimension of trash gathered in the containers. The application also gets Latitude and Longitude estimations of the territory where the Garbage Bins are put.
The potential of information technology has influenced the efficiency and quality of healthcare worldwide. Currently, several republics are incorporating electronic health records (EHRs). Due to reluctance of technological adaptation & implementational complexities, electronic health record systems are not in practice. Due to the emphasis on achieving general compatibility, users may perceive systems as being imposed and providing insufficient customizability, which may exacerbate issues in a setting of national implementation. EHS improves patient safety and confidentiality and ensures operative, effective, well-timed, reasonable, and patient-centred care, all of which substantially impact healthcare quality. Blockchain technology has been used by the EHS system, which supports web-based accessibility and availability. The difficulties of exchanging medical data can now be overcome by consumers using an infrastructure based on cloud computing. A variety of cryptographic approaches have been employed to encrypt and safeguard the data. This review paper aims to highlight the role and impact of blockchain in EHR. The proposed research describes cryptography methods, their classifications, and the challenges associated with EHR to identify gaps and countermeasures.
Nowadays COVID-19 is spreading everywhere which has badly affected the countries from social as well as economical perspectives. According to SOP people have to maintain social distancing, use face masks and avoid biometric devices for attendance in order to prevent the coronavirus. Several techniques have been developed in order to maintain the attendance in Covid-19 pandemic by considering the precautions to reduce the spread of coronavirus. This paper provides a review of the biometric techniques such as face recognition, palm recognition, face mask detection, face recognition, and iris detection techniques adopted in COVID-19 to maintain/mark attendance in organizations/institutes. However, the challenges of the Covid-19 techniques also are part of this paper that highlights the issues in current techniques. The prime focus of this study is to differentiate biometric methods for researchers or users to decide which tools are better for their requirements.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.