Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Library Philosophy and Practice (e-journal)

2021

Computer Engineering

Bibliometric analysis

Articles 1 - 4 of 4

Full-Text Articles in Social and Behavioral Sciences

A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr. May 2021

A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.

Library Philosophy and Practice (e-journal)

Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods.

Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Research articles consider between 2011-2021. Some research results, such as documents by year, documents by source, documents by funding agencies, countries, etc are obtained using Web of Science and Scopus Analyzers. The analysis is performed using Vos Viewer version 1.6.16 and various parameters such as keywords, co-authorship, co-occurrences, citation …


Analysis Of Recent Trends In Malware Attacks On Android Phone: A Survey Using Scopus Database, Sonali Kothari Tidke, Vijayshri Khedkar Mar 2021

Analysis Of Recent Trends In Malware Attacks On Android Phone: A Survey Using Scopus Database, Sonali Kothari Tidke, Vijayshri Khedkar

Library Philosophy and Practice (e-journal)

In past few years, smartphone use has shifted from professional access to personal need. Smartphone has now become an essential requirement to perform day to day activities. This has made smartphones unsecured and vulnerable to cyber threats and malware attacks. This study is also focused on finding intersection between malware attacks and Android OS considering Android as the most widely used mobile OS. A comprehensive search is conducted on Scopus Database for peer-reviewed articles. The study is carried out on bibliometric data of the considered articles to generate a highly useful concept map.


A Bibliometric Analysis Of Plant Disease Classification With Artificial Intelligence Based On Scopus And Wos, Shivali Amit Wagle, Harikrishnan R Feb 2021

A Bibliometric Analysis Of Plant Disease Classification With Artificial Intelligence Based On Scopus And Wos, Shivali Amit Wagle, Harikrishnan R

Library Philosophy and Practice (e-journal)

The maneuver of Artificial Intelligence (AI) techniques in the field of agriculture help in the classification of diseases. Early prediction of the disease benefits in taking relevant management steps. This is an important step towards controlling the disease growth that will yield good quality products to fulfill the global food demand. The main objective of this paper is to study the extent of research work done in this area of plant disease classification. The paper discusses the bibliometric analysis of plant disease classification with AI in Scopus and Web of Science core collection (WOS) database in analyzing the research by …


Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite Jan 2021

Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite

Library Philosophy and Practice (e-journal)

Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …