All Stories

  1. Lightweight Homomorphic Encryption Algorithm for Secure Cloud Storage in Bibliographic Control Systems
  2. A Swarm Intelligence-Driven Framework for Detecting Insider Trading in Stock Markets
  3. Federated Learning with Secure Aggregation for Distributed Malware Detection in IoT Networks
  4. Game- Theoretic Modeling of Cybersecurity Insurance Pricing in Global Financial Markets
  5. Graph Neural Networks for Insider Threat Detection in Corporate Networks
  6. Metaheuristic-Based Secure Forecasting of Cryptocurrency Volatility in Adversarial Environments
  7. Trust-Aware Federated Learning for Secure Loan Approval in Peer-to-Peer Lending Platforms
  8. Intrusion Detection System in IoT 5G Networks Based on LSSVM and Harmony Search Optimization
  9. Optimized fractional-order PID controller for temperature control of CSTH: a comparative study with PID cascade controller
  10. Deep Learning Framework for Predicting Human Characteristics with Improved Illumination and Angle Detection
  11. Introducing UOM-Dataset : Object Detection Dataset with Performance Evaluation of YOLOv10–v12
  12. Optimizing Dual-Slot Antenna Performance for 6G Frequencies Using Digital Transformation and Machine Learning Techniques
  13. The Role of Deep Learning in Enhancing Solar Panel Efficiency: A Review of Models and Metrics
  14. Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
  15. Enhancing Cybersecurity Against Side-Channel Attacks: an Improved Cnn-Based Threat Detection Model Using Nadam Optimizer
  16. Optimising Deep Learning Approaches for Orthopedic Imaging Disease Diagnosis: Comparative Analysis for Disease Classification
  17. The AI Teaching Revolution: Reshaping the Future of University Education
  18. Tuning Adaptive Gamma Correction (TAGC) for Enhancing Images in Low Light
  19. Adaptive Machine Learning Frameworks for Real-Time Threat Detection in Cloud Environments
  20. A Review of Key Elements for Underwater Wireless Sensor Networks
  21. Assessing the Effects of Blackhole Attacks on MANET Reliability and Security
  22. Efficient UAV Routing Strategies for Wireless Sensor Network Data Retrieval
  23. Enhancing Wireless Sensor Network Data Collection through Aerial Unmanned Vehicles
  24. Improving VANET Localization Performance with Data Verification: Challenges and Solutions
  25. Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
  26. Smart Water-Powered Renewable Energy System with IoT Integration
  27. Implementation of Cyber Network’s Attacks Detection System with Deep Learning Designing Algorithms
  28. Design of Time-Delay Convolutional Neural Networks(TDCNN) Model for Feature Extraction for Side-Channel Attacks
  29. Exploring Quantum Computing: Potential Applications and Current Challenges in Algorithm Design
  30. Lung Cancer Detection Using Machine Learning and Deep Learning Models
  31. Adaptive Optimization of Deep Learning Models on AES based Large Side Channel Attack Data
  32. Secure AI for 6G Mobile Devices: Deep Learning Optimization Against Side-Channel Attacks
  33. Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks
  34. Opinion Mining in Arabic Extremism Texts: A Systematic Literature Review
  35. Deep Learning Method for Power Side-Channel Analysis on Chip Leakages
  36. Efficient Convolutional Neural Network Based Side Channel Attacks Based on AES Cryptography
  37. Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks
  38. Detection of Crucial Power Side Channel Data Leakage in Neural Networks
  39. Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks
  40. A Hybrid Technique for Detecting Extremism in Arabic Social Media Texts
  41. Design of Convolutional Neural Networks Architecture for Non-Profiled Side-Channel Attack Detection
  42. Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
  43. Multi-Layer Perceptrons and Convolutional Neural Networks Based Side-Channel Attacks on AES Encryption
  44. Deep Learning for the Recognition of Skin Cancer
  45. The role of quintin polynomial and firefly algorithm in mobile root path planning optimization
  46. Arabic Text Detection using Rough Set Theory: Designing a Novel Approach
  47. Healthcare assessment for beauty centers using hybrid sentiment analysis
  48. Mobile Robot Path Planning Optimization Based on Integration of Firefly Algorithm and Cubic Polynomial Equation
  49. Arguments extraction for e-health services based on text mining tools
  50. Ad Hoc Wireless Networks as Technology of Support for Ubiquitous Computation
  51. Future Effects and Impacts of Biometrics Integrations on Everyday Living
  52. Harmonizing Some Solutions For E-Learning And Online Learning