Recent Articles

Open access

ISSN: 2666-6030

Intelligent prediction method for power generation based on deep learning and cloud computing in big data networks

This paper aims to elevate the precision and efficiency of prevailing photovoltaic prediction algorithms by integrating deep learning and cloud computing techniques. The emphasis lies in leveraging...

Share article

Enhancing vulnerability scoring for information security in intelligent computers

Rapid computer and internet technology advancements have catalyzed continuous breakthroughs and innovations in related fields, significantly impacting social production and individual lifestyles. A...

Share article

Priority based k-coverage hole restoration and m-connectivity using whale optimization scheme for underwater wireless sensor networks

Coverage hole restoration and connectivity is a typical problem for underwater wireless sensor networks. In underwater applications like underwater oilfield reservoirs, undersea minerals and monitoring...

Share article

Intelligent personalized content recommendations based on neural networks

To effectively assist users in discovering content tailored to their specific interests, this research aims to create an intelligent content recommendation system. The inadequacy of conventional recommendation...

Share article

Marketing data security and privacy protection based on federated gamma in cloud computing environment

This study aims to address the existing data security and user privacy vulnerabilities in the “cloud” environment, which is essential for ensuring the safety and integrity of data in the era of big...

Share article

An optimized framework for VANET routing: A multi-objective hybrid model for data synchronization with digital twin

The utilization of Digital Twin technology allows for the simulation of network behavior, anticipating traffic surges, and implementing efficient traffic routing strategies to prevent congestion. This...

Share article

Roadside sensor network deployment based on vehicle-infrastructure cooperative intelligent driving

The sensor network for intelligent roadways, comprised of devices like cameras, laser radars, millimeter-wave radars, and weather stations, is an integral part of the roadside digital infrastructure....

Share article

Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud

Data deduplication is a crucial technique in the field of data compression that aims to eliminate redundant copies of recurring data. This technique has gained significant popularity in the realm of...

Share article

A novel heterogenous ensemble theory for symmetric 5G cells segmentation: Intelligent RAN analytics

MNOs are investing more in 5G, rolling out sites in urban and specific rural areas. Meanwhile, it remains imperative to consistently maintain the network performance above a certain threshold for optimal...

Share article

Secure short-packet communications using a full-duplex receiver

In this work, we consider the physical layer security in short-packet communications, where a full-duplex (FD) receiver receives information signals from a source while generating artificial noise (AN)...

Share article

Covertvasion: Depicting threats through covert channels based novel evasive attacks in android

Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection...

Share article

Multi-sensor based strategy learning with deep reinforcement learning for unmanned ground vehicle

As intelligent Unmanned Ground Vehicles (UGVs) find broader applications in areas such as transportation and logistics. The fusion of multiple sensors becomes crucial, since it not only amplifies UGV...

Share article

A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing

Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via the Internet without any need to know the infrastructure knowledge, experience,...

Share article

A new secure 2PL real-time concurrency control algorithm (ES2PL)

A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity. Current secure concurrency...

Share article

Significance of machine learning in healthcare: Features, pillars and applications

Machine Learning (ML) applications are making a considerable impact on healthcare. ML is a subtype of Artificial Intelligence (AI) technology that aims to improve the speed and accuracy of physicians'...

Share article

Improved constrained social network rating-based neural network technique for recommending products in E-commerce environment

In the modern world, the essentiality in the utilization of the e-commerce contents like movies, music and electronic goods becomes indispensable with diversified items searched over the internet. The...

Share article

Improved Henon Chaotic Map-based Progressive Block-based visual cryptography strategy for securing sensitive data in a cloud EHR system

The core objective of secret sharing concentrates on developing a novel technique that prevents the destruction and leakage of original data during the distribution and encoding processes. Progressive...

Share article

Artificial intelligence (AI) applications for marketing: A literature-based study

Artificial Intelligence (AI) has vast potential in marketing. It aids in proliferating information and data sources, improving software's data management capabilities, and designing intricate and advanced...

Share article

Rough set based on least dissimilarity normalized index for handling uncertainty during E-learners learning pattern recognition

The determination of e-learners' learning style in an online environment has raised the potential scope of interest as its exact estimation prompts a sensational improvement in the contents of the learning...

Share article

An optimal construction of smart aged homes based on SDLC using smart sensors and agent networks

With the increased growth of the added population group and advancements in health informatics, the smart aged home needs to be equipped with intelligent systems and various electronic devices. Industry...

Share article

Hybrid TABU search with SDS based feature selection for lung cancer prediction

Cancer falls under a group of diseases where abnormal growths of the cells are observed. Generally, lung cancer does not result in any type of obvious symptoms in its early stages. Among the people...

Share article

PE-DeepNet: A deep neural network model for pulmonary embolism detection

Machine learning in medical image processing has shown to be a useful way for discovering patterns in both poorly labelled and unlabeled datasets. Venous thromboembolism, which includes deep vein thrombosis...

Share article

Security behavior analysis in web of things smart environments using deep belief networks

The advancements in modern wireless communications enhances the Internet of Things (IoT) which in turns the extensive variety of applications which covers smart home, healthcare, smart energy, and Industrial...

Share article

Enhancing investigations in data migration and security using sequence cover cat and cover particle swarm optimization in the fog paradigm

In recent years, fog and mobile edge computing have grown rapidly due to the large amount of data generated by the Internet of Thing (IoT) devices. It provides a variety of services within the end user...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.