Search
Search Results
-
Delineation of ECG waveform components using encoder-decoder architecture with Postprocess algorithm
With the exponential increase in heart disease cases, it is essential to construct models (algorithms) that can be used to delineate...
-
Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics
Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...
-
Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies
Deploying virtual machines poses a significant challenge for cloud data centers, requiring careful consideration of various objectives such as...
-
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification
With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to...
-
Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm
In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...
-
A novel approach to detect, analyze and block adversarial web pages
The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with...
-
Detecting review fraud using metaheuristic graph neural networks
Although online reviews play a critical role in sha** consumer behavior and establishing institutional trust, this reliance on online reviews has...
-
Analysis of channel capacity for UWB antenna for improvements in the data rates and low Power transmission over wireless application
Multiple input- Multiple output- Ultra-wideband (MIMO-UWB) is a wireless communication approach that combines multiple antennas at the transmitter...
-
Heuristic approaches for non-exhaustive pattern-based change detection in dynamic networks
Dynamic networks are ubiquitous in many domains for modelling evolving graph-structured data and detecting changes allows us to understand the...
-
A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...
-
New custom rating for improving recommendation system performance
Recommendation system is currently attracting the interest of many explorers. Various new businesses have surfaced with the rise of online marketing...
-
Creating a representative archive of performance practice at the National Theatre of Great Britain
In my experience as an in-house archivist for the National Theatre (NT) of Great Britain, I have discovered that what the NT Archive staff have...
-
An enhanced QoS approach for multi-objective optimization using social spider optimization 5G enable IoMT network
Social Spider Optimization (SSO) is a swarm algorithm, based on the mating and cooperating behaviour of social spiders. This approach is basically...
-
Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis
Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending the widely used Oyente tool is the main objective of this...
-
Advancing personal identity verification by integrating facial recognition through deep learning algorithms
This research delves into the realm of facial recognition technology, leveraging the power of convolutional neural network (CNN) to enhance personal...
-
The digital transformation of jurisprudence: an evaluation of ChatGPT-4’s applicability to solve cases in business law
In the evolving landscape of legal information systems, ChatGPT-4 and other advanced conversational agents (CAs) offer the potential to disruptively...
-
Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles
The autonomous task success of an unmanned aerial vehiclel (UAV) or its military specialization called the unmanned combat aerial vehicle (UCAV) has...
-
A novel IMW-mrmr feature selection approach for early detection of hypertension with HRV analysis
In the absence of control measures, hypertension poses a major threat to the world’s population’s health and can quickly develop into vascular...
-
An optimal feature subset selection technique to improve accounting information security for intrusion detection systems
The goal of an intrusion detection system (IDS) is to secure data on the network by monitoring the flow of traffic and identifying malicious users....