About
Add Discription
Skills
Add Skills
Peer-Reviewed Articles
DESIGN AND IMPLEMENTATION OF Wi-Fi DEAUTHENTICATION SYSTEM USING NODEMCU ESP8266
Network security is seriously threatened by Wi-Fi de-authentication attacks, which frequently lead to data interception, illegal access, and service interruption. The mechanics and ramifications of these assaults are explored in detail in this research study, which highlights how they could jeopardize network availability, secrecy, and integrity. To bridge theoretical understanding with actual experimentation, the paper presents a practical implementation of a Wi-Fi deauther utilizing the NodeMCU ESP8266 microcontroller platform. With the use of programs like the Arduino IDE and NodeMCU Flasher, the Wi-Fi deauther was created and put through testing to identify and stop de-authentication threats instantly. The system's high detection accuracy, quick response times, and little effect on network performance as a whole are demonstrated by the experimental findings. The NodeMCU ESP8266 platform demonstrated good resource management by managing the detection and countermeasures while keeping CPU use below 70% and guaranteeing less than 5% reduction in network performance and latency. This study advances wireless network security by demonstrating a scalable, affordable method of thwarting de-authentication attacks and by suggesting further improvements that would include machine learning integration and wider assault coverage. For network managers, cybersecurity experts, and researchers looking to strengthen wireless network defenses, the findings offer insightful information and useful recommendations.
Blockchain using Virtual TRY-ON
In today’s dynamic retail environment, the shift towards online shopping necessitates innovative solutions that enhance customer engagement and satisfaction. This project introduces a virtual try-on clothing platform designed to revolutionize the online shopping experience by merging cutting-edge augmented reality (AR) and machine learning technologies. The platform enables users to visualize how garments will fit and appear on their unique body shapes without the need to visit a physical store.
By offering a user-friendly interface, the website allows customers to upload personal images or utilize real-time video features, facilitating an interactive and personalized shopping experience. Key functionalities include accurate size recommendations tailored to individual measurements, as well as curated fashion suggestions that align with users' personal styles. These enhancements aim to minimize return rates—a significant challenge in e-commerce—while simultaneously boosting customer satisfaction and driving sales.
Additionally, the platform fosters social interaction through built-in sharing capabilities, allowing users to solicit feedback from friends and family, thus enriching the decision-making process. This aspect not only enhances the shopping experience but also builds a sense of community around fashion choices.
By integrating advanced technology with a seamless and engaging user experience, this virtual try-on website represents a substantial advancement in online fashion retail. It sets the stage for a more personalized and interactive shopping journey, ultimately redefining how consumers engage with fashion in the digital age. As we look to the future, this platform aims to become a cornerstone of online retail, reflecting the evolving needs and preferences of today’s consumers.
The Power of AI and Machine Learning in Cybersecurity: Innovations and Challenges
Networks and sensitive data are no longer adequately protected by traditional security methods due to the ongoing evolution and sophistication of cyber-attacks. Cybersecurity can be enhanced with the exploitation of machine learning and artificial intelligence techniques, which make threat detection more effective and efficient. This article, while giving an outline of the field's present position, discusses the difficulties in adapting machine learning and artificial intelligence (ML) to cybersecurity. The research discusses machine learning methods that are applied to tasks like malware classification, anomaly detection, and network intrusion detection. Lastly, the necessity for sizable labeled datasets, the adversarial attacks on machine learning models, and the adversity of deciphering models of black-box ML are some of the boundaries and challenges that are also covered.
Design of 4-bit ALU for low-power and High-speed Applications.
This paper presents a novel design and optimization of a 4-bit Arithmetic Logic Unit (ALU) utilizing 90nm CMOS technology, specifically addressing the longstanding carry-out issue prevalent in existing architectures. Notably, our proposed 4-bit ALU architecture successfully minimizes delay and power consumption by incorporating an optimized carry-out design employing AND gates. A comprehensive comparison of three logic styles - Pass Transistor Logic (PTL), Complementary Metal-Oxide-Semiconductor (CMOS), and Transmission Gate Logic (TGL) - is conducted, yielding significant improvements in power-delay tradeoffs. Simulation results validate the efficacy of our design in resolving the carry-out issue, making it an attractive solution for low-power, high-speed digital applications.
Deep Learning for Polymer Classification: Automating Categorization of Peptides, Plastics, and Oligosaccharides
Polymers represent a diverse and vital class of materials across numerous industries, each with unique structural characteristics and functional properties. Traditional methods of polymer classification rely heavily on labor-intensive techniques prone to subjectivity and human error. The emergence of deep learning has significantly transformed material science by enabling automated analysis and classification of complex polymers. In this study, we focus on leveraging deep learning models to classify three distinct classes of polymers: peptides, plastics, and oligosaccharides. Peptides, plastics, and oligosaccharides represent significant subsets of the polymer family, each with distinct structural features and applications. Our research explores the effectiveness of various deep learning architectures, including deep learning to classify peptides, plastics, and oligosaccharides, achieving perfect accuracy with neural networks, K-Nearest Neighbors, and Random Forest classifiers. Principal Component Analysis enabled visualization of sample distribution, demonstrating deep learning's potential to automate and enhance polymer classification, reducing reliance on traditional, labor-intensive methods.
Detecting Fake Reviews in E-Commerce: A Deep Learning-Based Review
E-commerce platforms are increasingly vulnerable to fake reviews, which can distort product ratings and mislead consumers. Detecting these fraudulent reviews is critical to maintaining trust and transparency in online marketplaces. This review provides a comprehensive analysis of deep learning techniques used for fake review detection. Key models such as Recurrent Neural Networks (RNNs), Long Short-Term Memory (LSTM) networks, and Transformer-based models like BERT are explored for their ability to analyze textual data and detect linguistic anomalies. Additionally, behavioral analysis using Convolutional Neural Networks (CNNs) and hybrid models combining textual and behavioral features are discussed. The review also highlights the role of Graph Neural Networks (GNNs) for network analysis and unsupervised learning methods like autoencoders for anomaly detection. Despite advances, challenges such as evolving fake review tactics, data imbalance, and cross-platform adaptability remain. The paper concludes by discussing future research directions, including enhancing model interpretability and combining deep learning with blockchain for more secure and verified review systems.
Harnessing Deep Learning for Precision Cotton Disease Detection: A Comprehensive Review
Cotton cultivation plays a critical role in global agriculture, yet its productivity is significantly hindered by various plant diseases that impact yield and quality. Conventional disease detection methods often fall short due to their reliance on manual inspection and limited accuracy. This comprehensive review explores the application of deep learning techniques beyond Convolutional Neural Networks (CNNs) in enhancing cotton disease detection. The paper covers a range of deep learning methodologies, including CNNs, Recurrent Neural Networks (RNNs), and hybrid models that combine different neural network architectures. It examines how these techniques can improve the precision and efficiency of disease diagnosis for common cotton ailments such as boll rot, leaf spot, cotton wilt, and bacterial blight. By reviewing current research and case studies, the paper provides insights into the effectiveness of various deep learning approaches and their integration into practical agricultural systems. It also addresses the challenges faced in implementing these technologies and suggests future directions for advancing disease management strategies through deep learning. This review aims to offer a holistic perspective on the potential of deep learning to transform cotton disease detection and contribute to more sustainable agricultural practices.
Face Recognition : Diversified
This paper presents a novel lightweight hybrid architecture for face recognition, combining the strengths of MobileNet and attention mechanisms to enhance performance under challenging conditions such as facial occlusions (e.g., masks), varied illumination, and diverse expressions. The proposed model is evaluated against popular baseline models, including MobileNetV2, EfficientNetB2, and VGG16, on the Yale Face Dataset and a Simulated Masked Yale Dataset. On the Yale Dataset, the hybrid model achieved superior results with an accuracy of 93.78%, precision of 94.45%, recall of 93.33%, and F1-score of 93.89%, outperforming the baseline models in all key metrics. Additionally, when tested on the Simulated Masked Yale Dataset, the hybrid model exhibited increased resilience to occlusion with an accuracy of 63.45% and F1-score of 64.22%, significantly surpassing the other architectures.
Blockchain in Cybersecurity: Enhancing Trust and Resilience in the Digital Age
Blockchain technology has emerged as a transformative tool in the field of cybersecurity, offering a decentralized, immutable, and transparent framework to enhance trust and resilience in digital systems. This review explores the various applications of blockchain in cybersecurity, focusing on its ability to mitigate key security challenges such as data tampering, unauthorized access, and identity fraud. By analyzing the integration of blockchain in areas like secure data sharing, IoT security, and identity management, this paper highlights the strengths and limitations of blockchain-based solutions. Furthermore, it examines consensus mechanisms and cryptographic techniques that ensure the integrity and confidentiality of information. Despite its potential, blockchain faces challenges such as scalability, regulatory hurdles, and susceptibility to attacks like 51% and Sybil attacks. This review aims to provide a comprehensive understanding of blockchain's role in enhancing cybersecurity, while also identifying future research directions to overcome current limitations.
Deep Fakes and Deep Learning: An Overview of Generation Techniques and Detection Approaches
The rapid evolution of deep learning has fueled the rise of deep fakes, artificially generated media that can convincingly mimic real human faces, voices, and actions. These fabricated images, videos, and audio clips are created using sophisticated neural networks, posing significant threats to privacy, security, and public trust in digital content. This paper presents a comprehensive review of the key deep learning techniques driving both the creation and detection of deep fakes. On the generation side, methods such as Generative Adversarial Networks (GANs), autoencoders, and Recurrent Neural Networks (RNNs) are examined for their role in producing realistic manipulated media. GANs, particularly, have revolutionized deep fake creation by enabling the development of highly convincing facial expressions and motion sequences. Autoencoders are widely employed for face swapping and video manipulation, while RNNs, including Long Short-Term Memory (LSTM) networks, are critical in voice cloning and generating realistic speech patterns.
In response to the escalating concerns over deep fakes, substantial research has focused on detection methodologies. This paper reviews the latest advancements in detection, particularly the use of Convolutional Neural Networks (CNNs) for image and video analysis, as well as hybrid models that combine CNNs with RNNs for more effective detection of spatial and temporal inconsistencies. Moreover, the paper explores emerging strategies such as adversarial training, transfer learning, and blockchain-based solutions that aim to strengthen detection robustness against increasingly sophisticated deep fakes.Finally, the paper addresses the broader ethical and societal challenges posed by deep fakes, including their use in disinformation campaigns, identity theft, and other malicious activities. The need for transparent, interpretable detection models and the importance of interdisciplinary collaboration to mitigate these risks are emphasized. By providing an in-depth analysis of both creation and detection techniques, this review aims to contribute to the development of more secure and reliable digital ecosystems in the face of this growing threat.
Voice Assistant System with Object Detection Technology for Visually Impaired
Navigation, object recognition, obstacle avoidance, and reading provide substantial obstacles for visually impaired people, impeding their independence and day-to-day functioning. Current solutions, including standard voice assistants and white canes, either offer little help or cause privacy issues since they rely too much on the cloud. In order to fully address these issues, we suggest an inventive offering an object detection system and voice assistant powered by Android to assist the blind with problems they face on a daily basis The system incorporates the Arduino Uno, YoloV7 for object detection, and Android for the camera module. The complete apparatus is small and light, making it easy to mount anywhere. The assessments are carried out in controlled settings that replicate situations that a blind person could face in the real world. The suggested device allows visually impaired people to be more accessible, comfortable, and able to navigate more easily than the white cane, according to the results. People with visual impairments sometimes struggle to traverse complicated situations effectively. It is also no easy assignment to assist them in becoming perceptive navigators. In ocular individuals, cognitive maps derived. The system finds potential obstructions in the user's path, calculates the user's trajectory, and provides navigational data. Two experimental scenarios have been used to assess the solution. While the data is currently insufficient to draw firm conclusions, it does show that the technology can effectively assist visually impaired individuals in navigating an unfamiliar built environment.
Quantum-Enhanced Machine Learning for Real-Time Ad Serving
This paper presents a groundbreaking approach to addressing the growing computational challenges in real-time ad serving by leveraging quantum computing to accelerate machine learning (ML) algorithms. We propose a hybrid framework, the Quantum AdServer, which utilizes quantum algorithms alongside classical computing to reduce the time complexity of critical ML tasks in programmatic advertising. We explore both Variational Quantum Circuits (VQC) for near-term implementation on noisy intermediate-scale quantum (NISQ) devices and the Harrow-Hassidim-Lloyd (HHL) algorithm for future scenarios where more advanced quantum hardware is available. Our approach demonstrates significant improvements in both speed and scalability of personalized ad delivery, potentially revolutionizing the field of computational advertising. Through comprehensive theoretical analysis, simulations, and a detailed comparison of quantum methods, we showcase the potential of quantum-enhanced ML in ad tech while discussing practical challenges, including current hardware limitations and integration with existing ad-serving systems.
VIDEO TO VIDEO TRANSLATION USING MBART MODEL
There are many languages are spoken in India due to different diversities and different regions,so it is difficult to understand the global languages such as English ,Spanish ,French ,German. so this paper aims to translation of one of the global language English to their regional languages such as Tamil.So what our project does is it takes the Youtube url as an input in which the video should be in English and then save the video and perform the Machine Learning libraries as gTTS and Whisper model,Mbart50 model etc.Through this we do Audio Extraction,Speech-To-Text-Conversion,Text-Translation,Text-To-Speech-Synthesis.
Through this we had Integrating language translation and audio synthesis and break down the the Linguistic barriers.
INTEGRATING ARTIFICIAL INTELLIGENCE INTO CYBERCRIME INVESTIGATION: CHALLENGES AND FUTURE DIRECTIONS
Computer and social networking whereby criminals use the Internet to propagate criminal activities are some of the major challenges faced by existing policing strategies. Modern-day crimes include hacking into computer systems and stealing money from consumers, ransomware, identity theft cases, and hacking, all of which use the dark web and encryption. In this regard, artificial intelligence (AI) is the most efficient solution for improving the manner of cybercrime investigation. This paper also analyses how AI technologies such as machine learning natural language processing, and deep learning can be incorporated in cybercrime investigations and how they can assist in dealing with difficulties concerning data volume, complexity, and encryption. The advantages of utilizing AI are numerous from pattern recognition to repetitive tasks cutting down the investigation time. However, the paper recognizes that applying AI in business brings legal, technical, and ethical concerns including; privacy, bias, and legal constrictions. This research analyses existing legal frameworks of India, the EU, and the United States while looking at how it would be possible to incorporate AI into cybercrime investigations without violating the rights of a citizen. Further, it reveals infringement and possible bias, as well as unlawful use for violations, and recounts drawbacks related to the lack of resources and expertise that police departments confront. In the final section of the paper, directions for future research focusing on the use of AI in the fight against cybercrime are given in addition to that, the practice of cooperation with different countries, legal regulation of such activities, protection of ethical issues, and training of personnel are described. They are useful in making sure that the levels of artificial intelligence benefits are achieved fully without compromising security and the basic rights of an individual.
Advanced Machine Learning Techniques for Water Quality Prediction and Management: A Comprehensive Review
The incorporation of IoT, machine learning, and geospatial technologies has rapidized pace in data-driven approaches in water quality monitoring. The approach calls for data-driven methods in water quality assessment that would ensure such a process makes it not only accurate but cost-efficient and within the constraints of applied growing environmental challenges. The IoT sensors allow for real-time data generation, and the machine learning models, such as support vector machines, neural networks, and regression techniques, have changed the index of water quality prediction and analysis. Applications of GIS provide spatial visualization and management of water resources. This collection of papers constitutes the constraints in classical measuring techniques, advanced solutions through automation technologies based on sensor powers, and hybrid algorithms. However, the integration of these technologies solves the complexities associated with water quality measurement apart from having a basis for the supportive suggestions for sustainable water management to provide actionable insights for decision-makers. Hence, this review underlines the potential of such future integration of IoT, AI, and GIS technologies to revolutionize the monitoring of water quality, ensuring clean water through global environmental changes.
Scholar9 Profile ID
S9-102024-0406200
Publication
(0)
Article Reviewed
(0)
Citations
(0)
Network
(0)
Conferences/Seminar
(0)