Search
Search Results
-
A Critical Review of Distributed Generations Planning in Distribution Networks for Improved System Performances
With the help of a range of load models including static, dynamic, composite, and realistic load models, the planning of distributed generations...
-
Review of Deep Learning Techniques for Neurological Disorders Detection
Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its...
-
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of...
-
Energy Efficient Routing in Cluster Based Heterogeneous Wireless Sensor Network Using Hybrid GWO and Firefly Algorithm
Object tracking application is one of the important as well as challenging application of energy constrained Wireless Sensor Network (WSN).Timely and...
-
Techniques for Generating Sign Language a Comprehensive Review
Sign verbal is an important communication medium regarding the community of Deaf and Hard of Hearing, and advances in sign language generation...
-
EFTVG: An Energy Efficient Fuzzy–Timer Clustering Approach in an Adaptive Virtual Grid Cluster Based WSN
Clustering is an effective way that improves WSN lifetime. In this paper, unlike the other approaches, an adaptive virtual grid is conducted to form...
-
Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs
In Underwater Acoustic Sensor Networks (UASNs), optimizing energy efficiency and minimizing void occurrences in routing is paramount. Due to the...
-
Load Balancing in Cloud Environment Using Opposition Based Spider Monkey Optimization
Using cloud computing, user can pool resources in a distributed environment. These resources can be accessed wherever and whenever the provider...
-
Implementing Blockchain Technology in the Indian Context to Enable the Secure Exchange of Patients’ Information with Government Agencies
The healthcare sector has endured significant challenges due to its incapacity to exchange sensitive patient information. Throughout the battle...
-
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme
Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is...
-
A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation
Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between...
-
Appropriate Mother Wavelet Selection with Optimum Level of Disintegration for Analyzing Various Faults of Induction Motor Under Variation in Motor Loading
Current signature analysis is used successfully for induction motor fault detection. A common mathematical tool for assessing fault signals is the...
-
Discreet: distributed delivery service with context-aware cooperation
End-to-end encrypted messaging applications such as Signal became widely popular thanks to their capability to ensure the confidentiality and...
-
A Novel Method for Design and Implementation of Systolic Associative Cascaded Variable Leaky Least Mean Square Adaptive Filter for Denoising of ECG Signals
Electrocardiogram is the most essential diagnostic test for heart disease detection in this era, where it has low frequency and small amplitude,...
-
All Things will be Dominated/Controlled by Humans’ Imaginations in the Next Generation of Internet of Brains
Fifty years ago, an intriguing concept was proposed that relied on Internet technology, known as the Internet of Things. Over time, this idea has...
-
Efficient Hotel Rating Prediction from Reviews Using Ensemble Learning Technique
Predicting hotel ratings from reviews involves natural language processing techniques to extract sentiment and features from text data, then applying...
-
Multi-user directional modulation with reconfigurable holographic surfaces
Large intelligent surfaces arise as an emerging technology and critical building block for sixth-generation (6G) wireless networks. Reconfigurable...
-
An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things
At present Internet of Things is widely used in various products and parts in our daily life. In the future, its uses and requirements will increase....
-
Performance Analysis of Computational Intelligence Correction
Kalman filter (KF) is a widely used navigation algorithm, especially for precise positioning applications. However, the exact filter parameters must...
-
A revocable attribute-based access control with non-monotonic access structure
Internet of Things (IoT) has revolutionized data manipulation across various applications, particularly in online healthcare paradigm, where medical...