All Stories

  1. Introduction to Cloud Computing
  2. Overcoming Copyright Protection Difficulties in Cloud Settings
  3. Security Challenges in Cloud-Based Watermarking
  4. LungDxNet: AI-Powered Low-Dose CT Analysis for Early Lung Cancer Detection
  5. Network Anomaly Detection using Autoencoder on Various Datasets: A Comprehensive Review
  6. Flamingo-Optimization-Based Deep Convolutional Neural Network for IoT-Based Arrhythmia Classification
  7. Healthcare Internet of Things (H-IoT): Current Trends, Future Prospects, Applications, Challenges, and Security Issues
  8. ANAF-IoMT: A Novel Architectural Framework for IoMT-Enabled Smart Healthcare System by Enhancing Security Based on RECC-VC
  9. Vbswp-CeaH: Vigorous Buyer-Seller Watermarking Protocol without Trusted Certificate Authority for Copyright Protection in Cloud Environment through Additive Homomorphism
  10. Feature Extraction Approach for Speaker Verification to Support Healthcare System Using Blockchain Security for Data Privacy
  11. SmHeSol (IoT-BC): Smart Healthcare Solution for Future Development Using Speech Feature Extraction Integration Approach with IoT and Blockchain
  12. An Artificial Intelligence-Based Reactive Health Care System for Emotion Detections
  13. CoySvM-(GeD): Coyote Optimization-Based Support Vector Machine Classifier for Cancer Classification Using Gene Expression Data
  14. Smart Healthcare: Disease Prediction Using the Cuckoo-Enabled Deep Classifier in IoT Framework
  15. A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving
  16. Current Trends and Future Prospects: Detection of Breast Cancer Using Machine Learning Techniques
  17. Detecting Simpson’s Paradox: A Step Towards Fairness in Machine Learning
  18. EVBlocks: A Blockchain-Based Secure Energy Trading Scheme for Electric Vehicles underlying 5G-V2X Ecosystems
  19. AnSMart: A SVM-based anomaly detection scheme via system profiling in Smart Grids
  20. Security & Privacy in Digital Image Watermarking: Recent Trends and Scope
  21. Efficient Machine Learning Model for Intrusion Detection—A Comparative Study
  22. Resume Screening Using Natural Language Processing and Machine Learning: A Systematic Review
  23. Addressing Transparency Vis-a-Vis Privacy in Portability of Health Insurance Through Blockchain
  24. Analyzing the Need of Edge Computing for Internet of Things (IoT)
  25. Prediction of Loan Scoring Strategies Using Deep Learning Algorithm for Banking System
  26. BaY cP: A novel Bayesian customer Churn prediction scheme for Telecom sector
  27. Object detection in real time based on improved single shot multi-box detector algorithm
  28. Agile Approach as a Universal Remedy for the Usual Failure in the Development of Software Projects
  29. Edge Detection and Enhancement of Color Images Based on Bilateral Filtering Method Using K-Means Clustering Algorithm
  30. Object Detection System Based on Convolution Neural Networks Using Single Shot Multi-Box Detector
  31. Object Recognition and Detection in Remote Sensing Images: A Comparative Study
  32. A Novel Data Security Framework in Distributed Cloud Computing
  33. An Object Detection Technique For Blind People in Real-Time Using Deep Neural Network
  34. Secret Image Digitization Over Public Cloud Through Cbtv Based Image Fusion
  35. Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection
  36. A Review on Implementation of Digital Image Watermarking Techniques Using LSB and DWT
  37. RSA Using Montgomery Powering Ladder on Dual Core
  38. Digital Image Forgery Detection Techniques: A Comprehensive Review
  39. A Secure Technique of Image Fusion Using Cloud Based Copyright Protection for Data Distribution
  40. A lightweight buyer-seller watermarking protocol based on time-stamping and composite signal representation
  41. Modified Buyer Seller Watermarking Protocol based on Discrete Wavelet Transform and Principal Component Analysis
  42. A new and efficient buyer-seller digital Watermarking protocol using identity based technique for copyright protection
  43. A Comparison of Buyer-Seller Watermarking Protocol (BSWP) Based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT)
  44. A Practical BuyerSeller Watermarking Protocol based on Discrete Wavelet Transform
  45. A New Buyer-Seller Watermarking Protocol with Discrete Cosine Transform
  46. An Efficient Way of Flooding for Multimedia Content Delivery by using Passive Clustering and RRDBFSF