Recent Articles

Open access

ISSN: 2666-6030

NVS-GAN: Benefit of generative adversarial network on novel view synthesis

The methodology to generate new views for an object from provided input object view is called Novel View Synthesis (NVS). Humans imagine novel views through prior knowledge gathered through their lifetime....

Share article

Adaptive switching and routing protocol design and optimization in internet of things based on probabilistic models

Through smart cities, Intelligent Transportation Systems (ITS), the agricultural sector, and wearable devices, the Internet of Things (IoT) has revolutionized several human interests. Through the development...

Share article

Interference-assisted energy harvesting short packet communications with hardware impairments

Radio frequency energy harvesting offers a promising solution to provide low power Internet of Things (IoT) devices with convenient and perpetual energy supply. In this work, we investigate the reliable...

Share article

FCMPR:A multi-path secure transmission method based on link security assessment and fountain coding

The security of network data transmission has always been a focus of attention. With the rapid development of quantum computers and the rise of intelligent algorithms such as semantic analysis, traditional...

Share article

Generative artificial intelligence for distributed learning to enhance smart grid communication

Machine learning models are the backbone of smart grid optimization, but their effectiveness hinges on access to vast amounts of training data. However, smart grids face critical communication bottlenecks...

Share article

A two-stage CNN model for the classification and severity analysis of retinal and choroidal diseases in OCT images

The advancements in medical imaging techniques have brought exponential increase in the quantity and complexity of data which often require human expertise for interpretation and decision making. However,...

Share article

Research on intelligent vehicle Traffic Flow control algorithm based on data mining

Traffic Congestion (TC) is increasing due to urban growth and vehicle numbers, rendering the development of cities and people's well-being difficult. Traffic Prediction (TP) and control systems have...

Share article

Research on the application of network security defence in database security services based on deep learning integrated with big data analytics

Every day, more people use the internet to send and receive sensitive information. A lot of confidential data is being transmitted electronically between people and businesses. Cyber-attacks, which...

Share article

Personal internet of things networks: An overview of 3GPP architecture, applications, key technologies, and future trends

The use of the personal Internet of Things (PIoT) is rapidly expanding across a range of application areas. It is needed for real-time monitoring, wireless coverage, remote sensing, delivery, security,...

Share article

Secure Official Document Management and intelligent Information Retrieval System based on recommendation algorithm

Currently, servers store information from different sources and file types, which are then retrieved via electronic Information Management Systems (e-IMS), with Smart serving as an effective prototype...

Share article

Data structure and privacy protection analysis in big data environment based on blockchain technology

In today's digital world, the rapid advancement of Information Technology (IT) has made it crucial to prioritize the protection and management of data storage and retrieval. It is vital to challenge...

Share article

Face recognition technology for video surveillance integrated with particle swarm optimization algorithm

With the rapid development of video surveillance technology, face recognition has become an important security and surveillance tool. To improve the accuracy and applicability of face recognition in...

Share article

Markov enhanced I-LSTM approach for effective anomaly detection for time series sensor data

Users could engage and interact with their immediate surroundings without effort in smart settings. The emergence of intelligent technologies along with software-based services has made this possible....

Share article

Variable rate power-controlled batch-based channel assignment for enhanced throughput in cognitive radio networks

The number of users in wireless networks, such as mobile and Internet-of-Things networks, is witnessing a tremendous increase, turning the available frequency spectrum into a scarce resource that needs...

Share article

Enhancing road safety in internet of vehicles using deep learning approach for real-time accident prediction and prevention

The paper proposes an Internet of Vehicles (IoV)-based Accident Prediction and Prevention System that leverages the Internet of Things (IoT) to tackle the road safety challenges arising from the increased...

Share article

Generalized hybrid LiFi-WiFi UniPHY learning framework towards intelligent UAV-based indoor networks

Advancements in unmanned aerial vehicle (UAV) technology, along with indoor hybrid LiFi-WiFi networks (HLWN), promise the development of cost-effective, energy-efficient, adaptable, reliable, rapid,...

Share article

Revolutionizing prostate cancer diagnosis: Unleashing the potential of an optimized deep belief network for accurate Gleason grading in histological images

PC (Prostate Cancer) is the second highest cause of death due to cancer in men globally. Proper detection and treatment are critical for halting or controlling the growth and spread of cancer cells...

Share article

A swarm intelligence and deep learning strategy for wind power and energy storage scheduling in smart grid

In today's world, rising energy demands are a significant challenge, and the smart grid emerges as a solution for sustainable energy management. An essential view of advancing the Smart Grid (SG) capabilities...

Share article

Heterogeneity-aware device selection for efficient federated edge learning

Federated learning (FL) combined with mobile edge computing (FEEL) provides an end-to-edge synergetic learning approach to allow end devices to participate in machine learning model training parallelly...

Share article

Security experimental framework of trajectory planning for autonomous vehicles

In the contemporary landscape, autonomous vehicles (AVs) have emerged as a prominent technological advancement globally. Despite their widespread adoption, significant hurdles remain, with security...

Share article

Optimizing land mine detection across diverse mining environments: A hyperspectral data approach with regression models

The detection of landmines, namely anti-tank mines, explosive devices, and unexploded ordnance, is a formidable obstacle for the global community. The visible consequences of unobserved explosives in...

Share article

AOF: An adaptive algorithm for enhancing RPL objective function in smart agricultural IoT networks

Within the Internet of Things (IoT) ecosystem, the Routing Protocol for Low-Power and Lossy Networks (RPL) serves as a foundational element for network communication. The protocol's effectiveness depends...

Share article

Multimodal spatio-temporal framework for real-world affect recognition

Deep learning models show great potential in applications involving video-based affect recognition, including human-computer interaction, robotic interfaces, stress and depression assessment, and Alzheimer's...

Share article

Enhancing aspect category detection in imbalanced online reviews: An integrated approach using Select-SMOTE and LightGBM

Aspect category detection (ACD) is a pivotal subtask within the field of sentiment analysis in natural language processing, aiming to identify implicit aspect category information in online review texts....

Share article

Covertvasion: Depicting threats through covert channels based novel evasive attacks in android

Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.