Search
Search Results
-
Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm
In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...
-
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification
With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to...
-
A novel approach to detect, analyze and block adversarial web pages
The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with...
-
Detecting review fraud using metaheuristic graph neural networks
Although online reviews play a critical role in sha** consumer behavior and establishing institutional trust, this reliance on online reviews has...
-
Analysis of channel capacity for UWB antenna for improvements in the data rates and low Power transmission over wireless application
Multiple input- Multiple output- Ultra-wideband (MIMO-UWB) is a wireless communication approach that combines multiple antennas at the transmitter...
-
A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...
-
REDQT: a method for automated mobile application GUI testing based on deep reinforcement learning algorithms
As mobile applications become increasingly prevalent in daily life, the demand for their functionality and reliability continues to grow. Traditional...
-
Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis
Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending the widely used Oyente tool is the main objective of this...
-
An enhanced QoS approach for multi-objective optimization using social spider optimization 5G enable IoMT network
Social Spider Optimization (SSO) is a swarm algorithm, based on the mating and cooperating behaviour of social spiders. This approach is basically...
-
Advancing personal identity verification by integrating facial recognition through deep learning algorithms
This research delves into the realm of facial recognition technology, leveraging the power of convolutional neural network (CNN) to enhance personal...
-
An optimal feature subset selection technique to improve accounting information security for intrusion detection systems
The goal of an intrusion detection system (IDS) is to secure data on the network by monitoring the flow of traffic and identifying malicious users....
-
Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles
The autonomous task success of an unmanned aerial vehiclel (UAV) or its military specialization called the unmanned combat aerial vehicle (UCAV) has...
-
A novel IMW-mrmr feature selection approach for early detection of hypertension with HRV analysis
In the absence of control measures, hypertension poses a major threat to the world’s population’s health and can quickly develop into vascular...
-
An empirical cryptocurrency price forecasting model
The goal of this manuscript is to use deep learning based multi-modal hybrid model to forecast the value of bitcoins by analyzing the influence of...
-
Automated generation of smart contract code from legal contract specifications with Symboleo2SC
Smart contracts (SCs) are software systems that monitor and partially control the execution of legal contracts to ensure compliance with the...
-
Analyzing psychological information using lattice hydrodynamic model coupled with electronic throttle control
Electronic throttle control (ETC), a mechanism for precise regulation of engine power and torque production, is a typical component in modern...
-
Secure SSI framework using the optimized Orkey identity schema
In the era of digital transformation and increasing concerns regarding data privacy, the concept of Self-Sovereign Identity (SSI) has attained...
-
Human factors in model-driven engineering: future research goals and initiatives for MDE
Software modelling and model-driven engineering (MDE) is traditionally studied from a technical perspective. However, one of the core motivations...
-
A novel and optimized IoT –ML based plant classification, monitoring and prediction system
With the increasing demand for modern technologies and automation, there is a need to maintain plants by adopting such modern automated technologies....
-
Sustainable augmented framework using smart sensors with ATM inspired 5G technologies for enterprise networks
The primary driving force behind the development of fifth-generation (5G) applications is the necessity of Concurrent Multipath Transfer (CMT)....