Information and communication technology (ICT) and World Wide Web (WWW) are increasingly being used in daily life and becoming important in community, business, personal performance, and improvement of livelihood. people with disabilities (PWDs) can easily perform many tasks using WWW which might be difficult or impossible for them. However, many websites applications such as e-learning, e-commerce, and e-government are not specifically designed keeping in view PWD users. Through the web accessibility guidelines, web developers can build a web program accessible to PWDs. In this paper, we have investigated the issues related to website design that make it unavailable for PWDs. Keeping in view these issues, we have built a framework to make the web easier for PWDs. In addition, these issues are assessed using the GTmetrix, Netcraft, and WAVE accessibility tools and the results are generated using Google Analytics. Based on these results, we have proposed a simplified web version to improve website access for people with disabilities. The proposed prototype is also implemented on a website called Easywebcare by incorporating our recommendations for resolving the investigated issues. Analytics shows that the proposed type surpasses all existing activities in improving website accessibility for people with disabilities.
The recent two decades have witnessed tremendous growth in Internet of things (IoT) applications. There are more than 50 billion devices connected globally. IoT applications’ connectivity with the Internet persistently victimized them with a divergent range of traditional threats, including viruses, worms, malware, spyware, Trojans, malicious code injections, and backdoor attacks. Traditional threats provide essential services such as authentication, authorization, and accountability. Authentication and authorization are the process of verifying that a subject is bound to an object. Traditional authentication and authorization mechanisms use three different factors to identity a subject to verify if the subject has the right capability to access the object. Further, it is defined that a computer virus is a type of malware. Malware includes computer viruses, worms, Trojan horses, spyware, and ransomware. There is a high probability that IoT systems can get infected with a more sophisticated form of malware and high-frequency electromagnetic waves. Purpose oriented with distinct nature IoT devices is developed to work in a constrained environment. So there is a dire need to address these security issues because relying on existing traditional techniques is not good. Manufacturers and researchers must think about resolving these security and privacy issues. Most importantly, this study identifies the knowledge and research gap in this area. The primary objective of this systematic literature review is to discuss the divergent types of threats that target IoT systems. Most importantly, the goal is to understand the mode of action of these threats and develop the recovery mechanism to cover the damage. In this study, more than 170 research articles are systematically studied to understand security and privacy issues. Further, security threats and attacks are categorized on a single platform and provide an analysis to explain how and to what extent they damage the targeted IoT systems. This review paper encapsulates IoT security threats and categorizes and analyses them by implementing a comparative study. Moreover, the research work concludes to expand advanced technologies, e.g., blockchain, machine learning, and artificial intelligence, to guarantee security, privacy, and IoT systems.
In adaptivity, the interface of the device automatically adjusts and assists the user. The adaptive user interfaces can adapt their activities by monitoring user status, the state of the system, and the current situation according to the adaptation strategy. Usually, the intensity of adaptation is measured in effectiveness, efficiency, and satisfaction to analyze the smartphone’s adaptive features. The adaptive features of light-emitting diode (LED) notifications, voice commands, face recognition, screen rotation, kid mode, drive mode, night mode, Swift Keyboard, s-health, gesture recognition, and fingerprint are selected for both iOS and Android platforms. Task completion within a specific time frame is used to measure effectiveness and efficiency, while satisfaction is calculated using the after-scenario questionnaire (ASQ). A total of 550 users are involved in the experimentation. The usability evaluation is measured for smartphone features. The effectiveness of adaptive features contains higher adaptivity in face recognition (87%) and voice command (85%). Furthermore, the satisfaction level is greater for adaptive features than non-adaptive features. This study indicates that adaptive features can only be used after a thorough examination of the user’s context. Furthermore, the usability evaluation shows that there is a dire need for adaptive smartphone features to provide ease and satisfaction to the user.
The human brain, primarily composed of white blood cells, is centered on the neurological system. Incorrectly positioned cells in the immune system, blood vessels, endocrine, glial, axon, and other cancer-causing tissues, can assemble to create a brain tumor. It is currently impossible to find cancer physically and make a diagnosis. The tumor can be found and recognized using the MRI-programmed division method. It takes a powerful segmentation technique to produce accurate output. This study examines a brain MRI scan and uses a technique to obtain a more precise image of the tumor-affected area. The critical aspects of the proposed method are the utilization of noisy MRI brain images, anisotropic noise removal filtering, segmentation with an SVM classifier, and isolation of the adjacent region from the normal morphological processes. Accurate brain MRI imaging is the primary goal of this strategy. The divided section of the cancer is placed on the actual image of a particular culture, but that is by no means the last step. The tumor is located by categorizing the pixel brightness in the filtered image. According to test findings, the SVM could partition data with 98% accuracy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.