An optimal hybrid solution to local and global facial recognition through machine learning

K Raju, B Chinna Rao, K Saikumar… - A fusion of artificial …, 2022 - Springer
Face recognition need is fine assured as enormous industrial relevance use them to
implement one or another objective. As the programmes move closer to everyday usage to …

Machine learning based online handwritten Telugu letters recognition for different domains

B Sankara Babu, S Nalajala, K Sarada… - A Fusion of Artificial …, 2022 - Springer
Trending innovations utilized in numerous handwriting (HW) pattern detection of diverse
individuals are machine learning and neural networks. The (CNN) handwritten characters of …

A Novel Implementation of Linux Based Android Platform for Client and Server

M Kiran Kumar, S Kranthi Kumar, E Kalpana… - A Fusion of Artificial …, 2022 - Springer
Android is an excellent operating system and offers many applications. Nowadays, mobile
phones and tabs depend on the Linux platform. The Android working framework …

[HTML][HTML] Blockchain enabled optimal Hopfield Chaotic Neural network based secure encryption technique for industrial internet of things environment

MM Khayyat, MM Khayyat, S Abdel-Khalek… - Alexandria Engineering …, 2022 - Elsevier
Abstract Industrial Internet of Things (IIoT) denotes a network of interlinked sensors,
instruments, and other devices for industrial applications in the domains of manufacturing …

An image encryption scheme synchronizing optimized chaotic systems implemented on raspberry pis

O Guillén-Fernández, E Tlelo-Cuautle, LG de la Fraga… - Mathematics, 2022 - mdpi.com
Guaranteeing security in information exchange is a challenge in public networks, such as in
the highly popular application layer Message Queue Telemetry Transport (MQTT) protocol …

Dynamics of Hidden Attractors in Four‐Dimensional Dynamical Systems with Power Law

ZA Khan, J Khan, S Saifullah… - Journal of Function Spaces, 2022 - Wiley Online Library
Four‐dimensional continuous chaotic models with Caputo fractional derivative are
presented. Fixed point theory is used to investigate the existence and uniqueness of …

An efficient fractional Chebyshev chaotic map-based three-factor session initiation protocol for the human-centered IoT architecture

C Meshram, CC Lee, I Bahkali, AL Imoize - Mathematics, 2023 - mdpi.com
One of the most frequently used signaling techniques for initiating, sustaining, and
dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are …

IBOOST: a lightweight provably secure identity-based online/offline signature technique based on FCM for massive devices in 5G wireless sensor networks

C Meshram, AL Imoize, A Elhassouny, A Aljaedi… - IEEE …, 2021 - ieeexplore.ieee.org
The fifth-generation (5G) wireless network is commercialized. The need to integrate massive
devices in 5G and wireless sensor networks (WSN) to provide several convenient services …

K-symbol fractional order discrete-time models of Lozi system

RW Ibrahim - Journal of Difference Equations and Applications, 2023 - Taylor & Francis
In this investigation, we suggest different systems: the k-symbol fractional Lozi system (FLS),
the k-symbol fractional Lozi system. We examine several of these systems' crucial dynamics …

A New Fractional‐Order Map with Infinite Number of Equilibria and Its Encryption Application

A Gasri, AA Khennaoui, A Ouannas, G Grassi… - …, 2022 - Wiley Online Library
The study of the chaotic dynamics in fractional‐order discrete‐time systems has received
great attention over the last years. Some efforts have been also devoted to analyze fractional …