-
Article
RETRACTED ARTICLE: Analysing the User Actions and Location for Identifying Online Scam in Internet Banking on Cloud
-
Article
Predicting image credibility in fake news over social media using multi-modal approach
Social media are the main contributors to spreading fake images. Fake images are manipulated images altered through software or by other means to change the information they convey. Fake images propagated over...
-
Article
Encrypted Network Traffic Classification and Resource Allocation with Deep Learning in Software Defined Network
The climate has changed absolutely in every area in just a few years as digitized, making high-speed internet service a significant need in the future. Future Internet is supposed to face exponential growth in...
-
Article
Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT
Privacy is a significant problem in communications networks. As a factor, trustworthy knowledge sharing in computer networks is essential. Intrusion Detection Systems consist of security tools frequently used ...
-
Article
An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks
Wireless Sensor Networks are generally employed for observing and monitoring specific environments. WSNs are made from a huge amount of low-cost sensor nodes separated and distributed in different environments...
-
Article
A contemporary combined approach for query expansion
The use of an automatic query expansion technique is to enhance the performance of the Information Retrieval System. Selecting the candidate terms for query expansion is an essential task to make query more pr...
-
Article
IoT Based Virtual E-Learning System for Sustainable Development of Smart Cities
Globally, cities are emerging into Smart Cities (SC) as a result of sustainable cities and the adaption of recent Internet of Things (IoT) technology. It is becoming essential to involve students in sustainabi...
-
Chapter and Conference Paper
Advanced Smart Gloves for Physically Disabled Persons Using LABVIEW
People with disabilities like deaf and dumb will find it challenging to communicate with ordinary people; there are various causes for these disabilities, we aim to overcome this issue. The proposed system con...
-
Chapter and Conference Paper
The Role of Artificial Intelligence and Data Science Against COVID-19
Today, a massive outbreak of a deadly virus has challenged humanity in each aspect; we deemed ourselves powerful. Millions of people are at risk, and in some cases, even if the person has reported negative, it...
-
Chapter and Conference Paper
Design of Automotive Accident-Avoidance System at Speed Limit Zone Using GPS
The majority of accidents are happening due to a lack of prior information about the driver. Sometimes, drivers are distracted inherently, which causes significant road accidents on the highway speed limit zon...
-
Chapter and Conference Paper
Detecting Image Forgery Over Social Media Using Residual Neural Network
Social media have earned fame for consuming the news due to their quick proliferation and availability. However, they are also the main contributor in spreading fake news. Fake images spread over microblogging...
-
Chapter and Conference Paper
FFV: Facial Feature Vector Image Dataset with Facial Feature Analysis and Feature Ranking
Thousands of faces can be remembered by a single individual. Faces with diverse shapes, sizes, and colors might be recalled. People are distinguished from one another by their face form and color, which makes ...
-
Chapter and Conference Paper
Content-Based Image Retrieval (CBIR): A Review
This paper gives an overview of various CBIR (Content-Based Image Retrieval) Techniques. CBIR is a system that utilizes different image features, like texture, color, and shape information, to fetch different ...
-
Chapter and Conference Paper
Survey on Sentiment Analysis for Mix Code Text
Sentiment analysis is difficult nowadays when we collect data from social media sites as people from every walk of life come there and write their opinion about various things. Social media is very powerful, b...
-
Chapter and Conference Paper
Novel Approximation Booths Multipliers for Error Recovery of Data-Driven Using Machine Learning
The multiplier is a primary function of the circuit that is frequently used in Digital Signal Processing. Estimated circuits were investigated for better efficiency/lower power consumption but are still troubl...
-
Chapter and Conference Paper
Hybrid Feature Selection Method for Binary and Multi-class High Dimension Data
We have proposed a hybrid feature selection method that combines the filter-based feature selection and ensemble learning-based wrapper feature selection method. The proposed method extracts the strengths of b...
-
Chapter and Conference Paper
Design of Dual-Stack, Tunneling, and Translation Approaches for Blockchain-IPv6
The most current edition of the Internet protocol is IPv6 (IP). Because once compared to IPv4 and IPv6 has a series of benefits of more efficient packet processing. With each day, IPv4 addresses should become ...
-
Chapter and Conference Paper
Comparative Analysis of Term Extraction and Selection Techniques for Query Reformulation Using PRF
Query reformulation (QR) is the process to make initial query exact by generating more significant terms. Term extraction and selection are one of the techniques of it. QR eliminates irrelevant and repetitive ...
-
Article
Securing data in transit using data-in-transit defender architecture for cloud communication
The advent of cloud infrastructure in which third-party cloud services may retain sensitive consumer and company data in storage environments underlines the need to advocate for encryption and multi-tenant sha...
-
Article
Multilabel land cover aerial image classification using convolutional neural networks
Classifying the remote sensing images requires a deeper understanding of remote sensing imagery, machine learning classification algorithms, and a profound insight into satellite images’ know-how properties. I...