Recent Articles

Open access

ISSN: 2666-6030

Enhancing road safety in internet of vehicles using deep learning approach for real-time accident prediction and prevention

The paper proposes an Internet of Vehicles (IoV)-based Accident Prediction and Prevention System that leverages the Internet of Things (IoT) to tackle the road safety challenges arising from the increased...

Share article

Generalized hybrid LiFi-WiFi UniPHY learning framework towards intelligent UAV-based indoor networks

Advancements in unmanned aerial vehicle (UAV) technology, along with indoor hybrid LiFi-WiFi networks (HLWN), promise the development of cost-effective, energy-efficient, adaptable, reliable, rapid,...

Share article

Revolutionizing prostate cancer diagnosis: Unleashing the potential of an optimized deep belief network for accurate Gleason grading in histological images

PC (Prostate Cancer) is the second highest cause of death due to cancer in men globally. Proper detection and treatment are critical for halting or controlling the growth and spread of cancer cells...

Share article

Covertvasion: Depicting threats through covert channels based novel evasive attacks in android

Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection...

Share article

Genetic algorithm with self adaptive immigrants for effective virtual machine placement in cloud environment

In cloud environments, optimization of resource utilizations is one among the predominant challenges. The two sub-research topics are cloud resource prediction and allocation. A few contributions to...

Share article

Conversational chat system using attention mechanism for COVID-19 inquiries

Conversational artificial intelligence (AI) is a type of artificial intelligence that uses machine learning techniques to understand and respond to user inputs. This paper presents a conversational...

Share article

Solar irradiance forecasting models using machine learning techniques and digital twin: A case study with comparison

The ever-increasing demand for energy and power consumption due to population growth, economic expansion, and evolving consumer choices has led to the need for renewable energy sources. Traditional...

Share article

An optimized framework for VANET routing: A multi-objective hybrid model for data synchronization with digital twin

The utilization of Digital Twin technology allows for the simulation of network behavior, anticipating traffic surges, and implementing efficient traffic routing strategies to prevent congestion. This...

Share article

Face expression image detection and recognition based on big data technology

This research addresses the deficiencies in current dynamic sequence facial expression recognition methods, which suffer from limited accuracy and effectiveness. The primary objective is to introduce...

Share article

A novel deep neural network heartbeats classifier for heart health monitoring

The electrocardiogram (ECG) is a very useful diagnostic tool to examine the functioning of the heart and to detect myocardial infarction (MI) and arrhythmias. It contains the records of the electrical...

Share article

Classification of network slicing threats based on slicing enablers: A survey

One of the Main expectation of the 5G environment is supporting various services in many areas such as healthcare, education, energy, streaming, V2X (vehicle to everything) communication, etc. To implement...

Share article

Efficient breast cancer detection via cascade deep learning network

Breast calcifications or irregular tissue growth are major health concerns that can lead to breast cancer. To enable early management, which significantly lowers death rates, it is crucial to perform...

Share article

HNTSumm: Hybrid text summarization of transliterated news articles

Data generated from social networking sites, blogs, digital magazines, and news websites is the largest human-generated data. Summarization is the process of extracting the crux of a document which...

Share article

Secure short-packet communications using a full-duplex receiver

In this work, we consider the physical layer security in short-packet communications, where a full-duplex (FD) receiver receives information signals from a source while generating artificial noise (AN)...

Share article

Fairness-driven link scheduling approach for heterogeneous gateways for digital twin enabled industry 4.0

The advent of Industry 4.0 has brought with it the integration of digital twin technology, which has enabled businesses to develop a virtual replica of their physical assets. This technology allows...

Share article

Application of spatial data and 3S robotic technology in digital city planning

This article uses spatial data and 3S (Spatial, Surveying, and Remote Sensing) technology to enhance digital city planning. The methodology integrates WebGIS Big data, statistical feature extraction...

Share article

Enhancing vulnerability scoring for information security in intelligent computers

Rapid computer and internet technology advancements have catalyzed continuous breakthroughs and innovations in related fields, significantly impacting social production and individual lifestyles. A...

Share article

Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks

Growth in technology has witnessed the comfort of an individual in domestic and professional life. Although, such existence was not able to meet the medical emergencies during the pandemic COVID-19...

Share article

Unsupervised machine learning technique for classifying production zones in unconventional reservoirs

Significant amounts of information are rapidly increasing in bulk as a consequence of the rapid development of unconventional tight reservoirs. The geomechanical and petrophysical characteristics of...

Share article

ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach

Distributed Denial of Service (DDoS) attack is one of the most destructive internet network attacks, denying legitimate users access to resources and networks by maliciously blocking available computing...

Share article

An inception V3 approach for malware classification using machine learning and transfer learning

Malware instances have been extremely used for illegitimate purposes, and new variants of malware are observed every day. Machine learning in network security is one of the prime areas of research today...

Share article

Customer churning analysis using machine learning algorithms

Businesses must compete fiercely to win over new consumers from suppliers. Since it directly affects a company's revenue, client retention is a hot topic for analysis, and early detection of client...

Share article

A systematic review of decentralized finance protocols

Decentralized finance (DeFi) has revolutionized the financial industry in recent years. Industries such as banking, insurance, and investment are experiencing a significant shift due to the growth of...

Share article

Quadratic ensemble weighted emphasis boosting based energy and bandwidth efficient routing in Underwater Sensor Network

Underwater Sensor Network (UWSN) is a network that comprises a large number of independent underwater sensor nodes to perform monitoring tasks over a given area. UWSN minimized propagation delay, bandwidth,...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.