Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Home Automation-Based Health Assessment Along Gesture Recognition via Inertial Sensors

    Hammad Rustam1, Muhammad Muneeb1, Suliman A. Alsuhibany2, Yazeed Yasin Ghadi3, Tamara Al Shloul4, Ahmad Jalal1, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2331-2346, 2023, DOI:10.32604/cmc.2023.028712

    Abstract Hand gesture recognition (HGR) is used in a numerous applications, including medical health-care, industrial purpose and sports detection. We have developed a real-time hand gesture recognition system using inertial sensors for the smart home application. Developing such a model facilitates the medical health field (elders or disabled ones). Home automation has also been proven to be a tremendous benefit for the elderly and disabled. Residents are admitted to smart homes for comfort, luxury, improved quality of life, and protection against intrusion and burglars. This paper proposes a novel system that uses principal component analysis, linear discrimination analysis feature extraction, and… More >

  • Open Access

    ARTICLE

    Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing

    D. Jerusha*, T. Jaya

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1121-1132, 2022, DOI:10.32604/csse.2022.022997

    Abstract Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in… More >

Displaying 1-10 on page 1 of 2. Per Page