Recent Articles

Open access

ISSN: 2666-6030

HNTSumm: Hybrid text summarization of transliterated news articles

Data generated from social networking sites, blogs, digital magazines, and news websites is the largest human-generated data. Summarization is the process of extracting the crux of a document which...

Share article

Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique

In the current era, numerous products are accessible online from anywhere and every minute. This work used encryption with access management because authenticities, anonymity, and security over accessibility...

Share article

Classification of network slicing threats based on slicing enablers: A survey

One of the Main expectation of the 5G environment is supporting various services in many areas such as healthcare, education, energy, streaming, V2X (vehicle to everything) communication, etc. To implement...

Share article

Solar irradiance forecasting models using machine learning techniques and digital twin: A case study with comparison

The ever-increasing demand for energy and power consumption due to population growth, economic expansion, and evolving consumer choices has led to the need for renewable energy sources. Traditional...

Share article

PARouting: Prediction-supported adaptive routing protocol for FANETs with deep reinforcement learning

Flying Ad-hoc Networks (FANETs) are becoming increasingly popular for various applications. Effective routing protocols for FANETs are essential yet challenging due to the high dynamic nature of Unmanned...

Share article

Quadratic ensemble weighted emphasis boosting based energy and bandwidth efficient routing in Underwater Sensor Network

Underwater Sensor Network (UWSN) is a network that comprises a large number of independent underwater sensor nodes to perform monitoring tasks over a given area. UWSN minimized propagation delay, bandwidth,...

Share article

Conversational chat system using attention mechanism for COVID-19 inquiries

Conversational artificial intelligence (AI) is a type of artificial intelligence that uses machine learning techniques to understand and respond to user inputs. This paper presents a conversational...

Share article

Customer churning analysis using machine learning algorithms

Businesses must compete fiercely to win over new consumers from suppliers. Since it directly affects a company's revenue, client retention is a hot topic for analysis, and early detection of client...

Share article

Genetic algorithm with self adaptive immigrants for effective virtual machine placement in cloud environment

In cloud environments, optimization of resource utilizations is one among the predominant challenges. The two sub-research topics are cloud resource prediction and allocation. A few contributions to...

Share article

Fairness-driven link scheduling approach for heterogeneous gateways for digital twin enabled industry 4.0

The advent of Industry 4.0 has brought with it the integration of digital twin technology, which has enabled businesses to develop a virtual replica of their physical assets. This technology allows...

Share article

A systematic review of decentralized finance protocols

Decentralized finance (DeFi) has revolutionized the financial industry in recent years. Industries such as banking, insurance, and investment are experiencing a significant shift due to the growth of...

Share article

Research on the impact of artificial intelligence-based e-commerce personalization on traditional accounting methods

With the development of artificial intelligence technology in various fields, the traditional accounting method is no longer applicable to the personalized development of e-commerce industry; Therefore,...

Share article

Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset

The Internet plays a crucial role in our daily routines. Ensuring cybersecurity to Internet users will provide a safe online environment. Automatic network intrusion detection (NID) using machine learning...

Share article

Face expression image detection and recognition based on big data technology

This research addresses the deficiencies in current dynamic sequence facial expression recognition methods, which suffer from limited accuracy and effectiveness. The primary objective is to introduce...

Share article

Application of spatial data and 3S robotic technology in digital city planning

This article uses spatial data and 3S (Spatial, Surveying, and Remote Sensing) technology to enhance digital city planning. The methodology integrates WebGIS Big data, statistical feature extraction...

Share article

Enhancing vulnerability scoring for information security in intelligent computers

Rapid computer and internet technology advancements have catalyzed continuous breakthroughs and innovations in related fields, significantly impacting social production and individual lifestyles. A...

Share article

Priority based k-coverage hole restoration and m-connectivity using whale optimization scheme for underwater wireless sensor networks

Coverage hole restoration and connectivity is a typical problem for underwater wireless sensor networks. In underwater applications like underwater oilfield reservoirs, undersea minerals and monitoring...

Share article

Intelligent personalized content recommendations based on neural networks

To effectively assist users in discovering content tailored to their specific interests, this research aims to create an intelligent content recommendation system. The inadequacy of conventional recommendation...

Share article

Marketing data security and privacy protection based on federated gamma in cloud computing environment

This study aims to address the existing data security and user privacy vulnerabilities in the “cloud” environment, which is essential for ensuring the safety and integrity of data in the era of big...

Share article

An optimized framework for VANET routing: A multi-objective hybrid model for data synchronization with digital twin

The utilization of Digital Twin technology allows for the simulation of network behavior, anticipating traffic surges, and implementing efficient traffic routing strategies to prevent congestion. This...

Share article

Roadside sensor network deployment based on vehicle-infrastructure cooperative intelligent driving

The sensor network for intelligent roadways, comprised of devices like cameras, laser radars, millimeter-wave radars, and weather stations, is an integral part of the roadside digital infrastructure....

Share article

A novel heterogenous ensemble theory for symmetric 5G cells segmentation: Intelligent RAN analytics

MNOs are investing more in 5G, rolling out sites in urban and specific rural areas. Meanwhile, it remains imperative to consistently maintain the network performance above a certain threshold for optimal...

Share article

Covertvasion: Depicting threats through covert channels based novel evasive attacks in android

Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection...

Share article

Secure short-packet communications using a full-duplex receiver

In this work, we consider the physical layer security in short-packet communications, where a full-duplex (FD) receiver receives information signals from a source while generating artificial noise (AN)...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.