Recent Articles

Open access

ISSN: 2666-6030

A method of vehicle networking environment information sharing based on distributed fountain code

The exchange of perceptual information between autonomous vehicles could significantly improve driving safety. In general, obtaining more information means driving more safely. However, Frequent information...

Share article

Introducing a high-throughput energy-efficient anti-collision (HT-EEAC) protocol for RFID systems

The utilization of radio frequency identification (RFID) technology has witnessed a substantial rise in recent years, and this upward trend is expected to continue in the coming years. It is often described...

Share article

A two-stage CNN model for the classification and severity analysis of retinal and choroidal diseases in OCT images

The advancements in medical imaging techniques have brought exponential increase in the quantity and complexity of data which often require human expertise for interpretation and decision making. However,...

Share article

Deep CNN based brain tumor detection in intelligent systems

The early detection of brain tumor is crucial for effective treatment and improved patient prognosis in Industrial Information Systems. This research introduces a novel computational model employing...

Share article

Tracing delay network in air transportation combining causal propagation and complex network

In air transportation, monitoring delays and making informed decisions at a system level is crucial for network managers. Causal selection methods have recently witnessed increased adoption for the...

Share article

Blockchain-based electronic voting systems: A case study in Morocco

This research examines the feasibility of implementing blockchain-based electronic voting systems in Morocco to enhance electoral transparency and integrity. The study employs a methodology that combines...

Share article

Secure Official Document Management and intelligent Information Retrieval System based on recommendation algorithm

Currently, servers store information from different sources and file types, which are then retrieved via electronic Information Management Systems (e-IMS), with Smart serving as an effective prototype...

Share article

A new intelligent controller based on integral sliding mode control and extended state observer for nonlinear MIMO drone quadrotor

Unmanned aerial vehicles (UAVs) control faces major challenges such as dynamic complexity, unknown external disturbances, parametric uncertainties, time-varying states and delays. The literature proposes...

Share article

Research on intelligent vehicle Traffic Flow control algorithm based on data mining

Traffic Congestion (TC) is increasing due to urban growth and vehicle numbers, rendering the development of cities and people's well-being difficult. Traffic Prediction (TP) and control systems have...

Share article

Personal internet of things networks: An overview of 3GPP architecture, applications, key technologies, and future trends

The use of the personal Internet of Things (PIoT) is rapidly expanding across a range of application areas. It is needed for real-time monitoring, wireless coverage, remote sensing, delivery, security,...

Share article

Research on the application of network security defence in database security services based on deep learning integrated with big data analytics

Every day, more people use the internet to send and receive sensitive information. A lot of confidential data is being transmitted electronically between people and businesses. Cyber-attacks, which...

Share article

Machine Learning-enhanced loT and Wireless Sensor Networks for predictive analysis and maintenance in wind turbine systems

Wind power (WP) represents a Renewable Energy Source (RES) that has noticed substantial development as people continuously search for green energy sources. Utilizing predominantly Predictive Maintenance...

Share article

Data structure and privacy protection analysis in big data environment based on blockchain technology

In today's digital world, the rapid advancement of Information Technology (IT) has made it crucial to prioritize the protection and management of data storage and retrieval. It is vital to challenge...

Share article

Face recognition technology for video surveillance integrated with particle swarm optimization algorithm

With the rapid development of video surveillance technology, face recognition has become an important security and surveillance tool. To improve the accuracy and applicability of face recognition in...

Share article

Markov enhanced I-LSTM approach for effective anomaly detection for time series sensor data

Users could engage and interact with their immediate surroundings without effort in smart settings. The emergence of intelligent technologies along with software-based services has made this possible....

Share article

Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain

Electronic Health Records (EHRs) have become an increasingly significant source of information for healthcare professionals and researchers. Two technical challenges are addressed: motivating federated...

Share article

FCMPR:A multi-path secure transmission method based on link security assessment and fountain coding

The security of network data transmission has always been a focus of attention. With the rapid development of quantum computers and the rise of intelligent algorithms such as semantic analysis, traditional...

Share article

A novel deep neural network heartbeats classifier for heart health monitoring

The electrocardiogram (ECG) is a very useful diagnostic tool to examine the functioning of the heart and to detect myocardial infarction (MI) and arrhythmias. It contains the records of the electrical...

Share article

An inception V3 approach for malware classification using machine learning and transfer learning

Malware instances have been extremely used for illegitimate purposes, and new variants of malware are observed every day. Machine learning in network security is one of the prime areas of research today...

Share article

Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks

Growth in technology has witnessed the comfort of an individual in domestic and professional life. Although, such existence was not able to meet the medical emergencies during the pandemic COVID-19...

Share article

Unsupervised machine learning technique for classifying production zones in unconventional reservoirs

Significant amounts of information are rapidly increasing in bulk as a consequence of the rapid development of unconventional tight reservoirs. The geomechanical and petrophysical characteristics of...

Share article

ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach

Distributed Denial of Service (DDoS) attack is one of the most destructive internet network attacks, denying legitimate users access to resources and networks by maliciously blocking available computing...

Share article

Efficient breast cancer detection via cascade deep learning network

Breast calcifications or irregular tissue growth are major health concerns that can lead to breast cancer. To enable early management, which significantly lowers death rates, it is crucial to perform...

Share article

HNTSumm: Hybrid text summarization of transliterated news articles

Data generated from social networking sites, blogs, digital magazines, and news websites is the largest human-generated data. Summarization is the process of extracting the crux of a document which...

Share article

Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique

In the current era, numerous products are accessible online from anywhere and every minute. This work used encryption with access management because authenticities, anonymity, and security over accessibility...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.