All Stories

  1. A Hybrid Trust Management Strategy for Reliable Cyber-Physical System in Intelligent Transportation
  2. IoT based Data-Driven Methodology for Real Time Production Optimization and Supply Chain Visibility in Smart Manufacturing and Logistics
  3. Integration of Consumer Electronics in Precision Agriculture Using Low-Carbon Wheat Lodging Drone Images
  4. Understanding Sidecars in Cloud Orchestration
  5. IOT and NLP based Voice Assistant for Visual Impaired People
  6. Machine Learning for Optimal Matching Management Techniques With Vehicular Network Communication Models
  7. Multi-Criteria Approaches in Selecting Optimal Vehicle-to-Vehicle Communication Protocols
  8. Designing a Secure Campus Area Network with an Advanced DNS System
  9. AI Implementation for Smart Wearable
  10. Attacks in IoT Healthcare Wearable Sensors
  11. Investigating the Dynamics of NFT Marketplaces
  12. Deep Learning for Fraud Detection in Bitcoin Transactions: An AI Approach
  13. Exploring blockchain solutions: Integrating cryptocurrency with IoT for enhanced security
  14. Using Machine Learning to Enhance Cybersecurity Threat Detection
  15. Empirical Examination of Mobile Ad Hoc Routing Protocol on Wireless Sensor Network
  16. A Novel Health Monitoring System Utilizing IoT and Machine Learning Techniques for Elderly Patient Care
  17. Cross-Platform Acceleration of Holographic Rendering in IOT Devices Using Open CL-Based Heterogeneous Computing
  18. Edge-Enabled Cloud IoT System for Multi-Disease Health Care: Predictive Approach for Elderly Patients
  19. Enhancing Banking Security: An Integrated Approach to IoT Threat Mitigation with Artificial Intelligence
  20. Enhancing Weed Recognition in Cotton Fields Through Advanced Imaging and Learning Techniques
  21. Forecasting Breast Cancer with Integrated Pre-trained CNN and Machine Learning Framework from CT Images
  22. Measuring AI′s Impact on HR Strategies and Operational Effectiveness in the Era of Industry 4.0
  23. Optimizing Software Demands Using Fuzzy-Based Evaluation Techniques
  24. Security Evaluation and Oversight in Stock Trading Using Artificial Intelligence
  25. Data Reduction Techniques in Wireless Sensor Networks With Internet of Things
  26. Design of Blockchain Models for the Identification of Harmful Attack Activities in Industrial Internet of Things (IIoT)
  27. Evaluating the Role of Blockchain to Secure Identity in Big Data for Industry 5.0
  28. Exploring the Use of the Internet of Things in Cybersecurity and Data Science
  29. Machine Learning-Based Multi-Layer Security Network Authentication System for Uncertain Attack in the Wireless Communication System
  30. Role of Neural Network, Fuzzy, and IoT in Integrating Artificial Intelligence as a Cybersecurity System
  31. Scalability and Performance of Blockchain-Based Solutions for IoT Applications
  32. Smart Security System Using Hybrid System With IoT and Machine Learning
  33. The Blockchain Technology to Protect Data Access Using Machine Learning
  34. The Development of the Multi-Layer Security Network Authentication System Using Machine Learning
  35. The Empirical Evaluation of Internet of Things-Based Techniques for Improving Cyber Security
  36. The Impact of Cloud Computing on Organisational Agility and Competitive Advantage in Management Information Systems
  37. Enhancing Scalability in Blockchain Networks: An Improved Sharding Protocol Using Verifiable Random Function (VRF) for Shard Assignment
  38. A Novel Approach to Optimized Cluster Head Selection in Heterogeneous WSNs for IoT Deployments
  39. Advanced Feature Extraction from Retinal Color Fundus Images for Accurate Macular Disease Diagnosis
  40. Blockchain-Based IoT Device Authentication and Cost-Effective Key Management Framework
  41. Cyber-Physical Systems Security Verification Utilising SAT-based Model Checking
  42. Hybrid Optimization Algorithms for Dynamic and Static Power Reduction in Low-Power VLSI Circuits
  43. Implementing the Particle Swarm Optimization Algorithm to enhance the positioning of sensors in an indoor CO2 monitoring system using wireless sensor networks
  44. Optimizing the Performance of Generative Artificial Intelligence ,Recent Approaches to Engineering Large Language Models
  45. SoK Paper: Power Side-Channel Malware Detection
  46. Exploring Synergies, Differences, and Impacts of Agile and DevOps on Software Development Efficiency
  47. Understanding the Strengths and Limitations of AI for Data Access Optimization
  48. IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security
  49. A Deep Learning Approach for Personalized Precision Medicine for Cancer Treatment
  50. A Hybrid Approach Integrating Deep Fuzzy Dual Support Vector Regression with Evolutionary Computation and Ensemble Learning
  51. Exploring The Impact Of Artificial Intelligence On Visual Communication In Unmasking Deep Fake And Ensuring Public Trust
  52. Price Recommendation For E-Commerce Using ML Techniques
  53. Multi-objective Cluster-head-based Energy-aware Routing using a Separable Convolution Neural Network in a Wireless Sensor Network
  54. Fuzzy Decision-Making on Strategies for Maximizing the Utility of Electric Vehicles
  55. Empowering Human-Machine Communication in Code Generation with NLP
  56. AI-Driven Horticulture: Interactive Hyperspectral Data Visualization
  57. Creating Resilient Digital Asset Management Frameworks in Financial Operations Using Blockchain Technology
  58. Using Blockchain technology for transparent and secure Financial Transactions in the Contemporary Business Landscape
  59. Utilising the Internet of Things to Enhance Customer Relationship Management in the field of Digital Marketing
  60. Analyse and Predict the Detection of the Cyber - Attack Process by Using a Machine-Learning Approach
  61. Oligopolistic Markets Employing an Intelligent Physarum Solution for Supply Chain Networks
  62. The Financial Dynamics of AI-Enhanced Supply Chain Management
  63. Deep Learning for Automatic Diagnosis of Skin Cancer Using Dermoscopic Images
  64. Utilization of Tree-Based Ensemble Models for Predicting the Shear Strength of Soil
  65. Advancements in Plant Pests Detection: Leveraging Convolutional Neural Networks for Smart Agriculture
  66. A Novel Deep Learning Based Approach for Detecting and Localization of Pulmonary Cancer
  67. Real-time Health Monitoring of Patients in Emergencies Through Machine Learning And IoT Integrated With Edge Computing
  68. Smart Contract-Enabled Blockchain Framework for Electronic Medical Health Records
  69. Comparative Analysis of Teacher Professional Development Models in Indian Higher Education: Implications for NEP Implementation
  70. A Study on Interval Valued Temporal Neutrosophic Fuzzy Sets
  71. Deep Learning-Based Intrusion Detection System for Internet of Things Networks for Enhancing Security Against Cyber Attacks
  72. Integration of Secure Data Communication with Wireless Sensor Network Using Cryptographic Technique
  73. Neutrosophic Topological Vector Spaces and its Properties
  74. Sorting Out Interval Valued Neutrosophic Fuzzy Shortest Cycle Route Problem by Reduced Matrix Method
  75. Empowering Next-Generation Energy Infrastructure Through IoT for Climate Resilience
  76. Enhancing Inventory Management through Advanced Technologies and Mathematical Methods: Utilizing Neutrosophic Fuzzy Logic
  77. Fuzzy Inventory Implementation of Minimum Value Unused Storing Profitable by Python Execution
  78. Quantum Target Recognition Enhancement Algorithm for UAV Consumer Applications
  79. Topologized Graphical Method in Solving Fuzzy Transportation Problem with Computational Techniques
  80. Adaptive Bandwidth Optimization Techniques for Underwater Fiber Optic Networks
  81. Exploring the Potential of Underwater Fibre Optic Networks for Bandwidth Optimization
  82. Sustainable healthcare AI-enhanced materials discovery and design for eco-friendly and biocompatible medical applications
  83. Predicting Employee Turnover: A Systematic Machine Learning Approach for Resource Conservation and Workforce Stability
  84. Optimistic Boosting Internet Connection Throughput by Incorporating Blockchain Filters into Network Infrastructure
  85. A Linear Differentiation Scheme for Camouflaged Target Detection using Convolution Neural Networks
  86. Implementation and Enabling Internet of Things (IoT) in Wireless communication Networks
  87. A Cross-Cultural Assessment of the Actual Application of Cloud-Based Computing in Higher Education Using Data Management Variables
  88. Cybersecurity Risk Management: A Complete Framework for IT Enterprises
  89. Efficiency of Wireless Communication in Cybersecurity for Data Security
  90. Security and Privacy Challenges in Distributed Database Management Systems
  91. Alzheimer Disease Detection using AI with Deep Learning based Features with Development and Validation based on Data Science
  92. Automatic Kidney Stone Detection Using Deep learning Method
  93. How Cloud Security Techniques Protect Your Data and Overcome Challenges     
  94. Multilevel Cloud resource Scheduling approach based on imagebased signature system
  95. Blockchain Technology to Improve Cybersecurity: Opportunities and Challenges
  96. Investigating the Use of Artificial Intelligence for Secure and Transparent Record Keeping in Education
  97. Machine Learning-Based Solutions for Internet of Things (IoT) and Cybersecurity
  98. The Impact of Artificial Intelligence as Advanced Technologies on Bitcoin Industries
  99. An Innovative Method for Detection of Insect Based on Mask-R-CNN Approach
  100. Automatic Detection and Epidemiologic Trends in Head and Neck Cancer Using Fast-R-CNN and SVM Methods
  101. Optimization of an Artificial Neural Network Using Three Novel Meta-heuristic Algorithms for Predicting the Shear Strength of Soil
  102. Improved tweets in English text classification by LSTM neural network
  103. An Empirical Investigation of the Use of Artificial Neural Networks (ANN) for Lung Cancer Disease Diagnosis
  104. Fuzzy C-Means Clustering with MAIRCA -MCDM Method in Classifying Feasible Logistic Suppliers of Electrical Products
  105. Application of Soft Computing Techniques for Predictive Analytics in Financial Markets
  106. Cognitive Defense Cyber Attack Prediction and Security Design in Machine Learning Model
  107. Design and Implementation of Block Chain with Cybersecurity Scheme for Fog Based Internet of Things
  108. Enhancing Image Quality through Deep Learning-based Super-Resolution Techniques
  109. Enhancing IoT Security Through AI-Based Anomaly Detection and Intrusion Prevention
  110. The Empirical Analysis of Machine Learning-Based Techniques for Improving Cyber Security
  111. Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks
  112. Introduction and Development of Cyber Physical Systems in Smart Grid with Blockchain Technology to Enhance Sustainability
  113. Recognition and Integration of AI with IoT for Innovative Decision Making Techniques in Cyber Physical Systems
  114. Efficient classification of kidney disease detection using Heterogeneous Modified Artificial Neural Network and Fruit Fly Optimization Algorithm
  115. An Optimized DDoS Attack Detection Using Deep Convolutional Generative Adversarial Networks
  116. Artificial Intelligence Integrated with Machine Learning for Enhancing Business in E-World
  117. Challenges in cybersecurity: Lessons from biological defense systems
  118. A Secure Authenticated Message Transfer in Vehicle to Grid Networks
  119. Revolutionizing IoT Network Security with Deep Learning-Anomaly Detection Model
  120. Artificial Intelligence and Nanotechnology in Biosensors
  121. Bio-Inspired Optimization with Transfer Learning Based Crowd Density Detection on Sparse Environment
  122. MACHINE LEARNING AND BLOCK CHAIN MODEL FOR SUPPLYING FOOD PRODUCTS AND MAINTAIN FOOD QUALITY
  123. Analysis of Digital Twins Implementation in Smart City using Big Data and Deep Learning
  124. A Cloud-Based Healthcare Diagnosis Support Network for Smart IoT for Predicting Chronic Kidney Failure
  125. A Roadmap for AI-Enabled System Design for 5G, 6G, And Beyond Communication: Issues And Challenges
  126. A Study on the Potential Role of Blockchain in Future Wireless Mobile Networks
  127. An Algorithm for Extracting Image Features Using a Random Deep Neural Network
  128. An Intense Systematic Review of Mobile Agent Based Harmful Threats And Attack Detection Systems in IOT Networks
  129. Analysis of Cyber Security Threats in Payment Gateway Technology
  130. Cyber Security Fraud Detection Using Machine Learning Approach
  131. Development of a sleep monitoring system using cloud computing and big data techniques
  132. Exploring New Approaches for Resource Allocation in distributed Networks with –NOMA-
  133. Investigating Low & High Transfers Training for Multi-task Face Identification Using a Semi-supervised Neuronal Networks
  134. IoT Implementation in Various Applications: A Detailed Review of Cyber Security Issues and Challenges
  135. Role of Cyber security in Gaming technology
  136. Systems For Identifying And Segmenting Facial Labels
  137. The Use of Images Analysis for IoT-Based Smart Traffic Densities Management
  138. The Use of Virtual Private Networks to Facilitate Remote Working: A Critical Review of Cyber Security Implications to Develop Successful VPN Systems
  139. Using Artificial Intelligence to Integrate Machine Learning, Fuzzy Logic, and The IOT as A Cybersecurity System
  140. Integration of Blockchain Technology for Enhanced Wireless Networks
  141. Routing Protocols of Wireless Sensor Networks in Smart Cities
  142. Intelligent Optimization Algorithm based Data Storage and Management: An Empirical Study
  143. Hybrid Evolutionary Algorithm with Energy Efficient Cluster Head to Improve Performance Metrics on the IoT
  144. Hybrid Deep Learning based Attack Detection and Classification Model on IoT Environment
  145. A Detection of Intrusions Based on Deep Learning
  146. Hybrid Artificial Ecosystem Optimization Algorithm based on Search Manager Framework for Big Data Environment
  147. A Comprehensive review on Data Mining Techniques in managing the Medical Data cloud and its security constraints with the maintained of the communication networks
  148. A design of dynamic rate aware classified key for network security in wireless sensor network through optimized distributed secure routing protocol
  149. Enhanced Anomaly Detection System for IOT Based on Improved Dynamic SBPSO
  150. Incorporating Deep Learning Methodologies into the Creation of Healthcare Systems
  151. An Intrusion Detection Approach using Hierarchical Deep Learning-based Butterfly Optimization Algorithm in Big Data Platform
  152. Challenges in Cybersecurity: Lessons from Biological Defense Systems
  153. Artificial Intelligence-based cloud computing for Industry 5.0
  154. Blockchain based Security Solution for Internet of Drones
  155. A Novel PSO-Based Channel Allocation System for Interference in 5G and Higher-Level Wireless Communication Systems
  156. A Comparative Study of Cyber Security Awareness, Competence and Behavior
  157. Agile Technology and Artificial Intelligent Systems in Business Development
  158. Analysis of blockchain technology based on digital management systems and data mining technology
  159. Loan Eligibility Prediction using Machine Learning based on Personal Information
  160. A Framework of Artificial Intelligence for the Manufacturing and Image Classification system
  161. Hybrid Particle Swarm Optimization with Deep Learning Driven Sarcasm Detection on Social Media
  162. Towards Internet of Things: Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing
  163. LCIPA: Lightweight clustering protocol for industry 4.0 enabled precision agriculture
  164. Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
  165. Preface
  166. Arrangement and Accomplishment of Interconnected Networks with the Virtual Reality Twinning with the Inner Light of Cybernetics
  167. Revisiting Browser Performance Benchmarking From an Architectural Perspective
  168. The Future Impact of Technological Developments on Digital Marketing Through Artificial Intelligence
  169. Back to the future: N-Versioning of Microservices
  170. Power-based Attacks on Spatial DNN Accelerators
  171. A Comparative Understanding in Applying Various Artificial Neural Networks in Creating Wireless Sensor Networks for Better Tracking and Movement of Packages in the Logistics Industry
  172. A Review of Bio-Cell Culture Processes in Real-Time Monitoring Approach with Cloud Computing Techniques
  173. Empirical Analysis of Deep Learning for Big Data and Its Applications using CNN
  174. Heart Attack Anxiety Disorder using Machine Learning and Artificial Neural Networks (ANN) Approaches
  175. Machine Learning as a Predictive Technology And Its Impact on Digital Pricing and Cryptocurrency Markets
  176. Medical Image Classification for Disease Prediction with the Aid of Deep Learning Approaches
  177. Systematic Healthcare Smart Systems with the Integration of the Sensor Using Cloud Computing Techniques
  178. The Role of Implementing Cloud Computing Technology for Addressing Critical Security Issues and Overcoming the Challenges Effectively
  179. A Comparative Study on Subtractive Manufacturing and Additive Manufacturing
  180. Implementing Critical Machine Learning (ML) Approaches for Generating Robust Discriminative Neuroimaging Representations Using Structural Equation Model (SEM)
  181. Modelling and analysis of artificial intelligence approaches in enhancing the speech recognition for effective multi-functional machine learning platform – A multi regression modelling approach
  182. A topical design of circularly polarized fractal boundary antenna for RF harvesting
  183. Design and analysis of triangular patch antenna with enhanced bandwidth for RF energy harvesting
  184. E-Commerce product comparison portal for classification of customer data based on data mining
  185. Real time analysis of Intelligent placing system for vehicles using IOT with Deep learning
  186. Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware
  187. Implementation of Data Mining Tools to Classify Protein Structural Class from Residue Based Averaged NMR Chemical Shifts
  188. Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware
  189. ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilities
  190. Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses
  191. An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion
  192. Corporate social responsibility and supply chain: A study for evaluating corporate hypocrisy with special focus on stakeholders
  193. WITHDRAWN: Design and development of IoT based home computerization using Raspberry pi
  194. CURRENT ECONOMIC SLOWDOWN AND OPPORTUNITIES FOR COST EFFECTIVE SERVICES AND PRODUCTS USING TECHNOLOGICAL INVENTIONS: AN EMPIRICAL STUDY
  195. Need for sustainable event management in the Indian context
  196. A continuous mitigation of kVAR-voltage problem of hybrid isolated power system using UPFC
  197. Reliability analysis of a novel IEC 61850-9-2 process-bus based substation automation system architecture
  198. Using Forward Stepwise Multiple Regression to Predict Impact of “Word of Mouth (WOM)” on “Consumer Purchase Intention (CPI)” for Consumer Goods
  199. Cyclone
  200. Secure Architectures
  201. Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems
  202. Morpheus
  203. ρ
  204. Vulnerability-tolerant secure architectures
  205. Horizontal side-channel vulnerabilities of post-quantum key exchange protocols
  206. DATS - Data Containers for Web Applications
  207. Binary Ring-LWE hardware with power side-channel countermeasures
  208. Secure DIMM: Moving ORAM Primitives Closer to Memory
  209. BUSINESS INTELLIGENCE: FROM WHAT IT IS TO HOW IS IT MAKING CITIES SAFER TO LIVE.
  210. Quantifying and improving the efficiency of hardware-based mobile malware detectors
  211. On Architectural Support for Systems Security
  212. Invited - Who is the major threat to tomorrow's security?
  213. Avoiding information leakage in the memory controller with fixed service policies
  214. GhostRider
  215. Understanding contention-based channels and using them for defense
  216. Gate-Level Information Flow Tracking for Security Lattices
  217. Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller
  218. Morpheus
  219. Sapper
  220. Position paper
  221. PHANTOM
  222. Language without words: A pointillist model for natural language processing
  223. Opportunities and Challenges of Using Plasmonic Components in Nanophotonic Architectures
  224. On the Complexity of Generating Gate Level Information Flow Tracking Logic
  225. Dataflow Tomography
  226. Theoretical Fundamentals of Gate Level Information Flow Tracking
  227. Information flow isolation in I2C and USB
  228. Caisson
  229. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
  230. Fighting fire with fire
  231. Your Desktop or Mine: Extending the Reach of Writing Instruction
  232. Hardware assistance for trustworthy systems through 3-D integration
  233. Hardware trust implications of 3-D integration
  234. Function flattening for lease-based, information-leak-free systems
  235. Theoretical analysis of gate level information flow tracking
  236. Secure information flow analysis for hardware design
  237. Gate-Level Information-Flow Tracking for Secure Architectures
  238. Execution leases
  239. Quantifying the Potential of Program Analysis Peripherals
  240. Complete information flow tracking from the gates up
  241. Complete information flow tracking from the gates up
  242. A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags
  243. MadMAC: Building a Reconfiguration Radio Testbed using Commodity 802.11 Hardware