All Stories

  1. Surveying Technology Fusion in IoT Networks for IDS: Exploring Datasets, Tools, Challenges, and Research Prospects
  2. Clustering Irregular Data Streams With Fuzzy Induction
  3. Hazardous Object Detection for Visually Impaired People Using Edge Device
  4. Rediscovering Minutiae Matching Through One Shot Learning’s Siamese Framework in Poor Quality Footprint Images
  5. A New QoS Optimization in IoT-Smart Agriculture Using Rapid-Adaption-Based Nature-Inspired Approach
  6. Efficient Heart Disease Prediction Using Hybrid Deep Learning Classification Models
  7. Aqua Clear: Efficient Water Management for home water supply
  8. Optimization using Internet of Agent based Stacked Sparse Autoencoder Model for Heart Disease Prediction
  9. Thresholding based Smart Home Automation System using K-means
  10. Design of Energy Efficient IoT-Based Smart Street Light System
  11. Fuzzy-MAC: An FIS based MAC protocol for a multi-constrained traffic in wireless body area networks
  12. Machine Learning approach to Predict net radiation over crop surfaces from global solar radiation and canopy temperature data
  13. De-Fence: LoRa based Hop-to-Hop Communication
  14. A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things
  15. Heart rate and blood pressure measurement based on photoplethysmogram signal using fast Fourier transform
  16. QAOVDetect: A Novel Syllogistic Model with Quantized and Anchor Optimized Approach to Assist Visually Impaired for Animal Detection using 3D Vision
  17. Ascertain the efficient machine learning approach to detect different ARP attacks
  18. QEST: Quantized and Efficient Scene Text Detector using Deep Learning
  19. QoS–aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges
  20. RoadWay
  21. IoT Network Traffic Classification Using Machine Learning Algorithms: An Experimental Analysis
  22. Recognition of Gurmukhi Handwritten City Names Using Deep Learning and Cloud Computing
  23. State of art on: Features extraction, recognition and detection of currency notes
  24. Data Breach in Social Networks Using Machine Learning
  25. RSAC: A Robust Deep Reinforcement Learning Strategy for Dimensionality Perturbation
  26. Short-term electric power load forecasting using random forest and gated recurrent unit
  27. Automated DDOS attack detection in software defined networking
  28. Edge device based Military Vehicle Detection and Classification from UAV
  29. Precise Control for Deep Driving using Dual Critic based DRL Approaches
  30. Short Term Active Power Load Prediction on A 33/11 kV Substation Using Regression Models
  31. INTERVENOR: Intelligent Border Surveillance using Sensors and Drones
  32. Deep Reinforcement Learning Techniques in Diversified Domains: A Survey
  33. DLSDN: Deep Learning for DDOS attack detection in Software Defined Networking
  34. Maze Solving with humanoid robot NAO using Real-Time object detection
  35. Leading Athlete Following UAV Using Transfer Learning Approach
  36. MaskNet: Detecting Different Kinds of Face Mask for Indian Ethnicity
  37. PIN Inference Attack: A Threat to Mobile Security and Smartphone-controlled Robots
  38. QC_SANE: Robust Control in DRL Using Quantile Critic With Spiking Actor and Normalized Ensemble
  39. Surveillance System for Monitoring Social Distance
  40. A Novel Approach for Detection of Counterfeit Indian Currency Notes Using Deep Convolutional Neural Network
  41. A survey on Assistive Technology for visually impaired
  42. Corridor segmentation for automatic robot navigation in indoor environment using edge devices
  43. A texture feature based approach for person verification using footprint bio-metric
  44. Coinnet: platform independent application to recognize Indian currency notes using deep learning techniques
  45. DDOS Attack Detection & Prevention in SDN using OpenFlow Statistics
  46. Identification of Dog Breeds Using Deep Learning
  47. CREATION: Computational ConstRained Travel Aid for Object Detection in Outdoor eNvironment
  48. SecureDorm: Sensor-Based Girls Hostel Surveillance System
  49. Person Identification using Autonomous Drone through Resource Constraint Devices
  50. UAVs Reliable Transmission for Multicast Protocols in FANETs
  51. FCNN-LDA: A Faster Convolution Neural Network model for Leaf Disease identification on Apple's leaf dataset
  52. A Travel Aid for Visually Impaired: R-Cane
  53. Automatic Parallelization of C Code Using OpenMP
  54. MIRA : Moment Invariability Analysis of Footprint Features
  55. Pitfree: Pot-holes detection on Indian Roads using Mobile Sensors
  56. Detailed Analysis of Footprint Geometry for Person Identification
  57. Multi-constraints link stable multicast routing protocol in MANETs
  58. Improved multicast routing in MANETs using link stability and route stability
  59. MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks
  60. Moralism: mobility prediction with link stability based multicast routing protocol in MANETs
  61. SSLSM: Signal Strength Based Link Stability Estimation in MANETs
  62. Impact analysis of attacks in multicast routing algorithms in MANETs
  63. LSMRP: Link stability based multicast routing protocol in MANETs