Search
Search Results
-
Loss Function with Memory for Trustworthiness Threshold Learning: Case of Face and Facial Expression Recognition
We compare accuracy metrics of the supervisor meta-learning artificial neural networks (ANN) that learn the trustworthiness of the Inception v.3... -
Optimal path planning of multi-robot in dynamic environment using hybridization of meta-heuristic algorithm
This paper investigates an innovative strategy for generating a collision and deadlock-free optimal position for the individual robots by satisfying...
-
Path Planning in UAV-Assisted Wireless Networks: A Comprehensive Survey and Open Research Issues
UAV-assisted wireless networks are becoming more and more used and are invading many fields thanks to their performance and efficiency. However,... -
A Block Chain Dynamic Key Sharing and Updating Scheme Based on the (t, n) Threshold
Key sharing and updating is the core problem in key management. In order to solve the centralization, security and secret share loss in the process... -
SybilSort algorithm - a friend request decision tracking recommender system in online social networks
Sybils are detected and prevented from making friends on Online Social Networks (OSN) by the proposed SybilSort algorithm. SybilSort operates in the...
-
A Secure Electronic Voting System Using Multifactor Authentication and Blockchain Technologies
This chapter presents a distributed e-voting system that solves the problems of vote-rigging, voter impersonation, and vote falsification, all of... -
Proactive approach for preamble detection in 5G-NR PRACH using supervised machine learning and ensemble model
The physical random access channel (PRACH) is used in the uplink of cellular systems for initial access requests from the users. It is very hard to...
-
Storing and Retrieving Secrets on a Blockchain
A secret sharing scheme enables one party to distribute shares of a secret to n parties and ensures that an adversary in control of t out of n... -
Efficient detection and partitioning of overlapped red blood cells using image processing approach
Detecting the abnormality of Red Blood Cells automatically aids hematologists in diagnosing sickness and minimizes time, money. The complicated...
-
A Review on Design and Performance Evaluation of Privacy Preservation Techniques in Data Mining
As the world is moving toward digitization in all sectors like education, banking, voting, education, transportation, etc. There are possible chances... -
Privacy-Preserving Cross-Domain Authentication in Internet of Things
This chapter introduces a unified blockchain-assisted framework for secure cross-domain authorization and authentication in smart city IoT... -
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain
The application of blockchain technology to the field of e-commerce has solved many dilemmas, such as low transparency of transactions, hidden risks...
-
Between Rebirth and Decline
The vote on April 9 and 10, 2006 inaugurates the legislature, marking a further step in the long march toward a hard to achieve stability. The... -
Optimal Multi-robot Path Planning Using Particle Swarm Optimization Algorithm Improved by Sine and Cosine Algorithms
This paper highlights a new approach to generate an optimal collision-free trajectory path for each robot in a cluttered and unknown workspace using...
-
Enabling personalized VR experiences: a framework for real-time adaptation and recommendations in VR environments
The personalization of user experiences through recommendation systems has been extensively explored in Internet applications, but this has yet to be...
-
A survey on cognitive radio network attack mitigation using machine learning and blockchain
Cognitive radio network is a promising technology to enhance the spectrum utilization and to resolve the spectrum scarcity issues. But the malicious...
-
On-chain repairing for multi-party data migration
Blockchain can be used to solve the problem of mutual trust between different institutions. However, when migrating data from a traditional system to...
-
Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain
The security and transparency provided to the data in blockchain are unmatchable, with the least instances of system hack or failure reported. With a... -
Hybrid energy efficient deep learning and redactable consortium blockchain-based secure framework for smart parking in smart cities
Management of vehicular parking in the crowded environment is the indispensable requirement for the smart city scenario. The advent and potential...
-
Utilizing Blockchain for Safeguarding IoT-Based Robotic Networks from Spoofing Attacks
In the dynamic realm of IoT-based robotic networks, autonomous robots, with their intricate integration of sensors and data-driven functionalities,...