Search
Search Results
-
An enhanced QoS approach for multi-objective optimization using social spider optimization 5G enable IoMT network
Social Spider Optimization (SSO) is a swarm algorithm, based on the mating and cooperating behaviour of social spiders. This approach is basically...
-
Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis
Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending the widely used Oyente tool is the main objective of this...
-
Advancing personal identity verification by integrating facial recognition through deep learning algorithms
This research delves into the realm of facial recognition technology, leveraging the power of convolutional neural network (CNN) to enhance personal...
-
An optimal feature subset selection technique to improve accounting information security for intrusion detection systems
The goal of an intrusion detection system (IDS) is to secure data on the network by monitoring the flow of traffic and identifying malicious users....
-
Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles
The autonomous task success of an unmanned aerial vehiclel (UAV) or its military specialization called the unmanned combat aerial vehicle (UCAV) has...
-
A novel IMW-mrmr feature selection approach for early detection of hypertension with HRV analysis
In the absence of control measures, hypertension poses a major threat to the world’s population’s health and can quickly develop into vascular...
-
An empirical cryptocurrency price forecasting model
The goal of this manuscript is to use deep learning based multi-modal hybrid model to forecast the value of bitcoins by analyzing the influence of...
-
Automated generation of smart contract code from legal contract specifications with Symboleo2SC
Smart contracts (SCs) are software systems that monitor and partially control the execution of legal contracts to ensure compliance with the...
-
Analyzing psychological information using lattice hydrodynamic model coupled with electronic throttle control
Electronic throttle control (ETC), a mechanism for precise regulation of engine power and torque production, is a typical component in modern...
-
Cognitive Intelligent Decisions for Big Data and Cloud Computing in Industrial Applications using Trifold Algorithms
In contemporary real-time applications, diminutive devices are increasingly employing a greater portion of the spectrum to transmit data despite the...
-
Secure SSI framework using the optimized Orkey identity schema
In the era of digital transformation and increasing concerns regarding data privacy, the concept of Self-Sovereign Identity (SSI) has attained...
-
Human factors in model-driven engineering: future research goals and initiatives for MDE
Software modelling and model-driven engineering (MDE) is traditionally studied from a technical perspective. However, one of the core motivations...
-
A novel and optimized IoT –ML based plant classification, monitoring and prediction system
With the increasing demand for modern technologies and automation, there is a need to maintain plants by adopting such modern automated technologies....
-
Sustainable augmented framework using smart sensors with ATM inspired 5G technologies for enterprise networks
The primary driving force behind the development of fifth-generation (5G) applications is the necessity of Concurrent Multipath Transfer (CMT)....
-
Grey wolf optimization-based fractional MPPT for enhancing performance and efficiency of photovoltaic systems
The photovoltaic (PV) cell is used to transform solar energy into electrical energy which is utilized by us. However, the amount of received solar...
-
Learning from Failure: Towards Develo** a Disease Diagnosis Assistant That Also Learns from Unsuccessful Diagnoses
In recent years, automatic disease diagnosis has gained immense popularity in research and industry communities. Humans learn a task through both...
-
Assessing radiographic findings on finger X-rays using an enhanced deep learning approach
The human upper extremity, which includes the shoulder, humerus, elbow, forearm, wrist, hand, and fingers, demonstrates incredible biological...
-
THC-DFECC-based privacy preserved smart contract creation for cloud data security
Currently, cloud services have become a novel business model for information services owing to the rapid development of Cloud Computing (CC)...
-
AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor
In recent years, the significance of millimeter wave sensors has achieved a paramount role, especially in the non-invasive and ubiquitous analysis of...