Pedestrian detection from images of the visible spectrum is a high relevant area of research given its potential impact in the design of pedestrian protection systems. In general, detection is made with two different phases, feature extraction and classification. Also, features for detection of pedestrian are already are available such as optimal feature model. But still required is an improvement in detection by reducing the execution time and false positive. The proposed model has three different phases, that is, background subtraction, feature extraction, and classification. In spite of giving entire information into feature extraction, the system gives only a useful information (foreground image) by twin background model. Then the foreground image moves to the feature extraction and classifies the pedestrian. For feature extraction, histogram of orientation gradient (HOG) L 1 normalization has been used. This will increase the detection accuracy and reduce the computation time of a process. In addition, false positive rate has been minimized. K E Y W O R D S HOG, human detection, pedestrian detection, SVM, twin background model
In the next few years, the mobile pay‐TV systems will be very popular due to their extensive applications. Providing security and privacy are the most challenging issues in the secure development of mobile pay‐TV systems. To avoid unauthorized access to mobile pay‐TV services, it is very important to authenticate the mobile users and the head end system (HES) in an anonymous manner. Even though several authentication schemes were proposed to provide anonymous authentication, the previously proposed schemes are not fit for mobile pay‐TV applications due to their high computational complexity. Hence, a computationally efficient anonymous authentication scheme is proposed in this article for secure service provision in mobile pay‐TV systems. The proposed authentication scheme can effectively authenticate both the mobile users and the HES with low computational cost in an anonymous manner. In addition, an anonymous batch authentication scheme is also proposed in this article to authenticate a batch of users in the subscription phase to alleviate the authentication burden of the HES. The security analysis section shows that the proposed scheme is more efficient in terms of security and the performance analysis section shows the strength of this article in terms of computational cost, while performing anonymous authentication in mobile pay‐TV systems.
Localization is considered as an important research concept for underwater acoustic sensor networks (UASNs). It performs significant role in diverse routing methods, estimating the node position and node recovery. In UASNs, localization methods have different characteristics compared with the terrestrial networks. The challenges involved in UASNs are varying water temperature and pressure, time synchronization of beacon nodes, complicated ocean currents, and positioning of nodes. To overcome these challenges, a virtual node is deployed using the Nelder–Mead algorithm with the static localization method. In this study, two types of localization methods namely static and dynamic methods are considered and a virtual node is deployed in a static localization manner. Since anchor nodes cannot communicate to the entire network for localization additionally, virtual nodes are deployed to measure the received signal strength indicator and error ratio for effective transmission. In addition “GPS node” is equipped with a ship for easy deployment without communication overhead. The simulation result justifies that static localization for an autonomous underwater sensor networks perform with better coverage rate without time synchronization and acoustic transmission overhead.
The medical data produced from various sensors of sensitive information so there is a need to secure them through security solutions. At present, many security solutions are available in the market to secure the medical data. Transport layer security (TLS) is designed to transfer the client from the client to the server in a more secure manner. The major advantage of using TLS is it will not lose any data while transferring the message from client to server. Datagram transport layer security (DTLS) is designed specifically to use in constrained networks. The DTLS protocol consists of major components like base protocol, record layer, and handshake protocol.The main disadvantage of DTLS is the attacker can send multiple Hello messages to the server. This can cause an attack against the server and this attack encourages a new connection between the client and server and also it increases required bandwidth and resources for every message. The main objective of the proposed work is to use the constrained application protocol (CoAP) with DTLS in place of user datagram protocol (UDP) for the secure transmission of data. To evaluate the efficiency of the system, the packet loss ratio, data transmission time, and handshake time are calculated.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.