Author Guidelines
Publications
Editorial
About
Current Issue – Vol.6, Issue.1 (January-March 2026)
A Vision-Based AI Framework for Real-Time Fatigue and Workload Detection in IT Professionals Using MediaPipe and a Fusion Neural Network
Abstract
In the prevailing work setting of the modern technology sector, screen usage, static positions, and cognitive engagements of the brain contribute to physical and mental exhaustion. Existing solutions to fatigue monitoring and alerting are often computationally complex and wearable and invasive technology. This research work introduces the use of a vision-tracking AI model that is non-invasive and exclusive to the specific requirements of the technical professionals. The model considers the eye movements, body positions, and human interactions to provide an accurate level of physical and mental fatigue. Through the learning concept of fusion learning, the model differentiates between the drastic and short-lived work patterns and the continuous physical and mental states. The proposed model is validated to collectively work in a timely and expert manner with very low computational complexity, thereby imparting expert warning notifications related to physical and mental fatigue. The model adheres to the concepts and requirements of Industry 5.0.
Key-Words / Index Term: Computer Vision, Workload Detection, Mediapipe, Fusion Neural Network, Machine Learning, Artificial Intelligence, MentalFatigue
References
- G. D. Nousias, K. K. Delibasis, and G. Labiris, "Blink Detection Using 3D Convolutional Neural Architectures and Analysis of Accumulated Frame Predictions," Journal of Imaging, vol. 11, no. 1, p. 27, Jan. 2025.
- Y. Nie, T. Liu, and L. Han, "Eye Fatigue Detection System Design and Implementation," Computer Life, vol. 12, no. 2, pp. 326–329, 2024.
- W.-H. Chuah, S.-C. Chong, and L.-Y. Chong, "The Assistance of Eye Blink Detection for Two-Factor Authentication," Journal of Informatics and Web Engineering, vol. 2, no. 2, pp. 45–58, Sep. 2023.
- A. A. Abusharha, "Changes in Blink Rate and Ocular Symptoms During Different Reading Tasks," Clinical Optometry, vol. 9, pp. 133–138, 2017.
- J. Patil, S. Joshi, and R. Mulla, "Intelligent Posture Detection System for Improved Ergonomics," in Proc. 2025 International Conference on Intelligent Control, Computing and Communications (IC3), 2025, pp. 892–899.
- G. D. Goutham and S. Saravanasankar, "Real-Time AI-Driven Fatigue Monitoring & Ergonomic Risk Assessment," SSRN Preprint, Oct. 2025.
- M. Calzavara, M. Faccio, I. Granata, and A. Trevisani, "Achieving productivity and operator well-being: a dynamic task allocation strategy for collaborative assembly systems in Industry 5.0," The International Journal of Advanced Manufacturing Technology, vol. 134, pp. 3201–3216, 2024.
- Z. Cao, G. Hidalgo, T. Simon, S.-E. Wei, and Y. Sheikh, "OpenPose: Realtime Multi-Person 2D Pose Estimation using Part Affinity Fields," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 43, no. 1, pp. 172–186, Jan. 2021.
- J. Xiong, W. Dai, Q. Wang, X. Dong, B. Ye, and J. Yang, "A review of deep learning in blink detection," PeerJ Computer Science, vol. 11, p. e2594, Jan. 2025.
- R. Hagimoto, E. Kamioka, C. M. Tran, and P. X. Tan, "Fatigue Detection Using Computer Mouse Operation Patterns," in Proc. 2025 15th International Workshop on Computer Science and Engineering (WCSE), 2025, pp. 195–200.
- A. F. Campoya Morales, J. L. Hernández Arellano, E. L. González Muñoz, and A. Maldonado Macias, "Development of the NASA-TLX Multi Equation Tool to Assess Workload," International Journal of Combinatorial Optimization Problems and Informatics, vol. 11, no. 1, pp. 50–58, 2020.
- A. R. Gowda and S. Merikapudi M, "Keystroke Pattern Analysis for Cognitive Fatigue Prediction Using Machine Learning," Advanced International Journal for Research, vol. 6, no. 5, pp. 1–9, 2025.
- R. Lee, C. James, S. Edwards, and S. J. Snodgrass, "Differences in upper body posture between individuals with and without chronic idiopathic neck pain during computerised device use: A 3D motion analysis study," Gait & Posture, vol. 95, pp. 30–37, 2022.
- S. Karoria, S. Mishra, and P. Verma, "Driver Drowsiness Detection with Mediapipe and Deep Learning," International Research Journal of Modernization in Engineering Technology and Science, vol. 6, no. 4, pp. 1–5, Apr. 2024.
- M. Shah and R. Desai, "Prevalence of Neck Pain and Back Pain in Computer Users Working from Home during COVID-19 Pandemic: A Web-Based Survey," International Journal of Health Sciences and Research, vol. 11, no. 2, pp. 26–31, Feb. 2021.
- L. Gosain, I. Ahmad, M. R. Rizvi, A. Sharma, and S. Saxena, "Prevalence of musculoskeletal pain among computer users working from home during the COVID-19 pandemic: a cross-sectional survey," Bulletin of Faculty of Physical Therapy, vol. 27, no. 1, p. 51, 2022.
Citation
Yasha Goyal, Yuvraj Singh Rathore, Srashti Kawde, Vishal Chourasiya, Imran Ali Khan, "A Vision-Based AI Framework for Real-Time Fatigue and Workload Detection in IT Professionals Using MediaPipe and a Fusion Neural Network" International Journal of Scientific Research in Technology & Management, Vol.6, Issue.1, pp.01-07, 2026. DOI: 10.5281/zenodo.18149292
A Hybrid PQC + Multi-Source-Enhanced Entropy Key-Distribution and End-to-End Encrypted Email Client
Abstract
The threat of quantum computing to classical cryptographic systems rises the necessity for development of quantum resistant security framework for digital communication. Current email systems depend completely on these centralized architectures which are vulnerable to server breaches, while their cryptographic foundation and currently used encryption standards and protocols (RSA and ECC), will face existential crisis and risk from quantum algorithms like Shor's algorithm. To address these challenges, this paper presents a unified and intelligent quantum-resistant email security framework that integrates post-quantum cryptography with multi-source entropy-driven key generation for protecting emails and attachments. The proposed system employs lattice-based cryptographic schemes combined with AI-assisted randomness generation to enhance key unpredictability and resilience. Performance evaluation demonstrates a system efficiency of 90.32% with an effective 135-bit quantum-safe security strength, achieving a practical balance between performance and security with the framework ensuring true end-to-end encryption, guaranteeing that only authorized clients can access sensitive data even in the event of server compromise. Furthermore, the proposed approach provides a scalable foundation for future expansion into a comprehensive quantum-safe digital workspace incorporating secure collaboration tools, enhanced usability, and regulatory compliance.
Key-Words / Index Term: Post-Quantum Cryptography, Quantum-Safe Email, Multi-Source-Enhanced Security, Cryptographic Efficiency, Kyber Algorithm, Quantum Key Distribution, Entropy Generation, Secure Communication, Lattice-Based Cryptography, Quantum Resistance.
References
- G. Alagic, B. Alper, D. Apon, D. Cooper, J. Dang, J. Draughon, C. Dumas, R. Griffin, M. Gunn, L. Hernandez, R. Hughes, M. Jamil, S. Jeffries, R. Jones, J. Kampan, J. Kelsey, T. Kleinjung, D. Kuemper, C. Lim, C. McGrew, S. Moody, R. Perlner, R. Reeds, D. Rogaway, Y. Shen, and B. Westerbaan, “NIST Post-Quantum Cryptography Standardization Report,” NISTIR 8413, Nat. Inst. Standards Technol., 2022.
- D. J. Bernstein, “Introduction to post-quantum cryptography,” in Post-Quantum Cryptography, Springer, 2009, pp. 1–14.
- J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J. M. Schanck, P. Schwabe, and D. Stehle, “CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM,” in Proc. IEEE Eur. Symp. Security Privacy (EuroS&P), 2018.
- L. Chen, “Report on post-quantum cryptography,” NIST Tech. Ser., Nat. Inst. Standards Technol., 2016.
- L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D. Stehle, “CRYSTALS-Dilithium: A lattice-based digital signature scheme,” J. Cryptographic Eng., vol. 10, no. 1, pp. 57–68, 2020.
- L. K. Grover, “A fast quantum mechanical algorithm for database search,” in Proc. 28th Annu. ACM Symp. Theory Comput. (STOC), 1996, pp. 212–219.
- P. W. Shor, “Algorithms for quantum computation: Discrete logarithms and factoring,” in Proc. 35th Annu. Symp. Found. Comput. Sci. (FOCS), 1994, pp. 124–134.
- C. Gidney and M. Ekerå, “How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits,” Quantum, vol. 5, p. 433, 2021.
- Y. Dodis, R. Gennaro, J. Hastad, M. Rabin, and T. Ristenpart, “Entropy, extractors, and their cryptographic applications,” SIAM J. Comput., vol. 36, no. 5, pp. 1451–1493, 2004.
- C. Gutierrez, “Analysis of Linux random number generation,” IEEE Security Privacy, vol. 15, no. 6, pp. 64–71, Nov.–Dec. 2017.
- H. Krawczyk, “Cryptographic extraction and key derivation: The HKDF scheme,” in Proc. 30th Annu. Int. Cryptol. Conf. (CRYPTO), Santa Barbara, CA, USA, 2010, pp. 410–429.
- P. Zimmermann, The Official PGP User’s Guide. Cambridge, MA, USA: MIT Press, 1995.
- B. Ramsdell, “S/MIME version 3 message specification,” IETF RFC 2633, Jul. 1999.
- Proton Technologies AG, “ProtonMail security features technical white paper,” 2021. [Online]. Available: https://proton.me
- Tutanota GmbH, “Tutanota encryption whitepaper,” 2020. [Online]. Available: https://tutanota.com
- D. Cash, S. Jarecki, C. S. Jutla, C. S. Williamson, and D. X. Song, “Highly scalable searchable symmetric encryption with support for boolean queries,” in Proc. 34th Annu. Int. Cryptol. Conf. (CRYPTO), Santa Barbara, CA, USA, 2014, pp. 353–373.
- C. Fromknecht, J. P. Miller, and I. C. Smith, “A decentralized public key infrastructure with identity retention,” IACR Cryptol. ePrint Arch., Rep. 2014/089, 2014.
- P. Schwabe, D. Stehle, and K. G. Paterson, “Post-quantum TLS without handshake signatures,” in Proc. 2020 ACM SIGSAC Conf. Comput. Commun. Security (CCS), Virtual Event, 2020, pp. 1461–1477.
- K. Kwiatkowski and L. Valenta, “The TLS post-quantum experiment,” Cloudflare Blog, Jun. 2019. [Online]. Available: https://blog.cloudflare.com
- D. Cooper, S. Santesson, B. Farrell, S. Boeyen, R. Housley, and W. Polk, “Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile,” IETF RFC 5280, May 2008.
- M. Marlinspike and T. Perrin, “The double ratchet algorithm,” Signal Protocol Specification, Nov. 2016. [Online]. Available: https://signal.org
- D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. IEEE Symp. Security Privacy, Berkeley, CA, USA, 2000, pp. 44–55.
- M. W. Storer, K. Greenan, and E. L. Miller, “Secure data deduplication,” in Proc. 4th ACM Workshop Storage Security Privacy (StorageSS), Alexandria, VA, USA, 2008, pp. 1–10.
- Virtru Corporation, “Virtru technical overview: Data-centric security,” 2022. [Online]. Available: https://virtru.com
- S. Pirandola, U. L. Andersen, N. Berta, D. Bunn, R. Chillemi, A. Curci, S. Erdmann, A. G. Ferrari, C. Gabay, D. Grasselli, M. Gyongyosi, N. J. Islam, T. Laing, C. Lupo, G. L. Ottaviani, T. P. Spengler, G. Vimercati, J. F. Villasenor, and P. Wallden, “Advances in quantum cryptography,” IEEE Commun. Surveys Tuts., vol. 21, no. 3, pp. 2347–2390, 3rd Quart. 2020.
- V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys., vol. 81, no. 3, pp. 1301–1350, 2009.
Citation
Mansi Trivedi, Kashish Singh, Shivank Soni, "A Hybrid PQC + Multi-Source-Enhanced Entropy Key-Distribution and End-to-End Encrypted Email Client" International Journal of Scientific Research in Technology & Management, Vol.6, Issue.1, pp.08-14, 2026. DOI: 10.5281/zenodo.18149482
