Search
Search Results
-
A robust ECC based authentication protocol for satellite-to-satellite communication network
Harnessing satellite resources to designate a communication network has felicitous the flexibility to bounteous applications, including broadcasting,...
-
Distributed neuro-fuzzy routing for energy-efficient IoT smart city applications in WSN
Wireless sensor networks (WSNs) enable seamless data gathering and communication, facilitating efficient and real-time decision-making in IoT...
-
A Review of Anonymization Algorithms and Methods in Big Data
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of...
-
Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing
In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams,...
-
An enhanced energy and distance based optimized clustering and dynamic adaptive cluster-based routing in software defined vehicular network
Software-Defined Vehicular Networks (SDVN) have been established to facilitate secure and adaptable vehicle communication within the dynamic...
-
Apple Leaf Disease Detection Using Transfer Learning
Automated detection of plant diseases is crucial as it simplifies the task of monitoring large farms and identifies diseases at their early stages to...
-
Production scheduling decision-making technology for multiple CNC machining centers with constraints on serviceable time
The tool’s life statistics module in CNC machining centers typically associates tool’s usage time with the program’s running duration, leading to the...
-
A novel PLS technique for secure ESM based MIMO systems
Multiple-input multiple-output systems with spatial modulation has evolved into an energy efficient and less complex wireless transmission system due...
-
Analyzing Insurance Data with an Alpha Power Transformed Exponential Poisson Model
In this paper, we propose a new model by adding an additional parameter to the baseline distributions for modeling claim and risk data used in...
-
DOCA: a UAV-assisted multi-hop D2D resource allocation scheme for 5G and beyond using machine learning
Device-to-Device (D2D) relayed communication helps in extending the coverage range of cellular networks. Relay devices support multi-hop D2D...
-
Unlocking Online Insights: LSTM Exploration and Transfer Learning Prospects
Machine learning algorithms can improve the time series data analysis as compared to the traditional methods such as moving averages or...
-
Drinkers Voice Recognition Intelligent System: An Ensemble Stacking Machine Learning Approach
Alcohol's dehydrating effects can cause vocal cords to dry out, potentially causing temporary voice changes and increasing the risk of vocal strain...
-
An anonymous broadcasting system with accountability based on group signatures
Advanced anonymous communication schemes have been proposed to protect the privacy of network users, enabling them to communicate anonymously on the...
-
A New Kernel Density Estimation-Based Entropic Isometric Feature Map** for Unsupervised Metric Learning
Metric learning consists of designing adaptive distance functions that are well-suited to a specific dataset. Such tailored distance functions aim to...
-
Statistical analysis and characterization of signaling and user traffic of a commercial multi-band LTE system
The fourth-generation (4 G) cellular network is currently the dominant mobile technology used worldwide. The analysis of the network behavior can...
-
Power Evaluation of Some Tests for Inverse Rayleigh Distribution
The Inverse Rayleigh distribution has many applications in the area of reliability studies. It is regarded as a model for a lifetime random variable....
-
IoT traffic management using deep learning based on osmotic cloud to edge computing
IoT is critical in many application areas, such as smart cities, health care, and surveillance systems. Each application has its own QoS...
-
LoRa interference issues and solution approaches in dense IoT networks: a review
Low Power Wide Area Networks (LPWAN) are prominent option of wireless communication technology for dense Internet of Things (IoT) applications. With...
-
Post-quantum framework for authorized and secure communication in multi-server networking
Multi-server authentication, called single sign-on, enables users to easily access the necessary services from multiple servers with a single...
-
Optimization of LDPC-coded power series MIMO/FSO link with hybrid-SIM based on machine learning in satellite downlink for 5G and beyond applications
This study presents a thorough evaluation of satellite downlink performance in a Free Space Optics (FSO) system with a Low-Density-Parity-Check...