All Stories

  1. Adoption of Machine Learning Techniques in Smart Applications based on Blockchain Technology
  2. Deep Learning-based Intrusion Detection System for IoT-based Blockchain System
  3. A Hybrid Trust Management Strategy for Reliable Cyber-Physical System in Intelligent Transportation
  4. IoT based Data-Driven Methodology for Real Time Production Optimization and Supply Chain Visibility in Smart Manufacturing and Logistics
  5. Integration of Consumer Electronics in Precision Agriculture Using Low-Carbon Wheat Lodging Drone Images
  6. Understanding Sidecars in Cloud Orchestration
  7. IOT and NLP based Voice Assistant for Visual Impaired People
  8. Machine Learning for Optimal Matching Management Techniques With Vehicular Network Communication Models
  9. Multi-Criteria Approaches in Selecting Optimal Vehicle-to-Vehicle Communication Protocols
  10. Designing a Secure Campus Area Network with an Advanced DNS System
  11. AI Implementation for Smart Wearable
  12. Attacks in IoT Healthcare Wearable Sensors
  13. Investigating the Dynamics of NFT Marketplaces
  14. Deep Learning for Fraud Detection in Bitcoin Transactions: An AI Approach
  15. Exploring blockchain solutions: Integrating cryptocurrency with IoT for enhanced security
  16. Using Machine Learning to Enhance Cybersecurity Threat Detection
  17. Empirical Examination of Mobile Ad Hoc Routing Protocol on Wireless Sensor Network
  18. A Novel Health Monitoring System Utilizing IoT and Machine Learning Techniques for Elderly Patient Care
  19. Cross-Platform Acceleration of Holographic Rendering in IOT Devices Using Open CL-Based Heterogeneous Computing
  20. Edge-Enabled Cloud IoT System for Multi-Disease Health Care: Predictive Approach for Elderly Patients
  21. Enhancing Banking Security: An Integrated Approach to IoT Threat Mitigation with Artificial Intelligence
  22. Enhancing Weed Recognition in Cotton Fields Through Advanced Imaging and Learning Techniques
  23. Forecasting Breast Cancer with Integrated Pre-trained CNN and Machine Learning Framework from CT Images
  24. Measuring AI′s Impact on HR Strategies and Operational Effectiveness in the Era of Industry 4.0
  25. Optimizing Software Demands Using Fuzzy-Based Evaluation Techniques
  26. Security Evaluation and Oversight in Stock Trading Using Artificial Intelligence
  27. Data Reduction Techniques in Wireless Sensor Networks With Internet of Things
  28. Design of Blockchain Models for the Identification of Harmful Attack Activities in Industrial Internet of Things (IIoT)
  29. Evaluating the Role of Blockchain to Secure Identity in Big Data for Industry 5.0
  30. Exploring the Use of the Internet of Things in Cybersecurity and Data Science
  31. Machine Learning-Based Multi-Layer Security Network Authentication System for Uncertain Attack in the Wireless Communication System
  32. Role of Neural Network, Fuzzy, and IoT in Integrating Artificial Intelligence as a Cybersecurity System
  33. Scalability and Performance of Blockchain-Based Solutions for IoT Applications
  34. Smart Security System Using Hybrid System With IoT and Machine Learning
  35. The Blockchain Technology to Protect Data Access Using Machine Learning
  36. The Development of the Multi-Layer Security Network Authentication System Using Machine Learning
  37. The Empirical Evaluation of Internet of Things-Based Techniques for Improving Cyber Security
  38. The Impact of Cloud Computing on Organisational Agility and Competitive Advantage in Management Information Systems
  39. Enhancing Scalability in Blockchain Networks: An Improved Sharding Protocol Using Verifiable Random Function (VRF) for Shard Assignment
  40. A Novel Approach to Optimized Cluster Head Selection in Heterogeneous WSNs for IoT Deployments
  41. Advanced Feature Extraction from Retinal Color Fundus Images for Accurate Macular Disease Diagnosis
  42. Blockchain-Based IoT Device Authentication and Cost-Effective Key Management Framework
  43. Cyber-Physical Systems Security Verification Utilising SAT-based Model Checking
  44. Hybrid Optimization Algorithms for Dynamic and Static Power Reduction in Low-Power VLSI Circuits
  45. Implementing the Particle Swarm Optimization Algorithm to enhance the positioning of sensors in an indoor CO2 monitoring system using wireless sensor networks
  46. Optimizing the Performance of Generative Artificial Intelligence ,Recent Approaches to Engineering Large Language Models
  47. SoK Paper: Power Side-Channel Malware Detection
  48. Exploring Synergies, Differences, and Impacts of Agile and DevOps on Software Development Efficiency
  49. Understanding the Strengths and Limitations of AI for Data Access Optimization
  50. IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security
  51. A Deep Learning Approach for Personalized Precision Medicine for Cancer Treatment
  52. A Hybrid Approach Integrating Deep Fuzzy Dual Support Vector Regression with Evolutionary Computation and Ensemble Learning
  53. Exploring The Impact Of Artificial Intelligence On Visual Communication In Unmasking Deep Fake And Ensuring Public Trust
  54. Price Recommendation For E-Commerce Using ML Techniques
  55. Multi-objective Cluster-head-based Energy-aware Routing using a Separable Convolution Neural Network in a Wireless Sensor Network
  56. Fuzzy Decision-Making on Strategies for Maximizing the Utility of Electric Vehicles
  57. Empowering Human-Machine Communication in Code Generation with NLP
  58. AI-Driven Horticulture: Interactive Hyperspectral Data Visualization
  59. Creating Resilient Digital Asset Management Frameworks in Financial Operations Using Blockchain Technology
  60. Using Blockchain technology for transparent and secure Financial Transactions in the Contemporary Business Landscape
  61. Utilising the Internet of Things to Enhance Customer Relationship Management in the field of Digital Marketing
  62. Analyse and Predict the Detection of the Cyber - Attack Process by Using a Machine-Learning Approach
  63. Oligopolistic Markets Employing an Intelligent Physarum Solution for Supply Chain Networks
  64. The Financial Dynamics of AI-Enhanced Supply Chain Management
  65. Deep Learning for Automatic Diagnosis of Skin Cancer Using Dermoscopic Images
  66. Utilization of Tree-Based Ensemble Models for Predicting the Shear Strength of Soil
  67. Advancements in Plant Pests Detection: Leveraging Convolutional Neural Networks for Smart Agriculture
  68. A Novel Deep Learning Based Approach for Detecting and Localization of Pulmonary Cancer
  69. Real-time Health Monitoring of Patients in Emergencies Through Machine Learning And IoT Integrated With Edge Computing
  70. Smart Contract-Enabled Blockchain Framework for Electronic Medical Health Records
  71. Comparative Analysis of Teacher Professional Development Models in Indian Higher Education: Implications for NEP Implementation
  72. A Study on Interval Valued Temporal Neutrosophic Fuzzy Sets
  73. Deep Learning-Based Intrusion Detection System for Internet of Things Networks for Enhancing Security Against Cyber Attacks
  74. Integration of Secure Data Communication with Wireless Sensor Network Using Cryptographic Technique
  75. Neutrosophic Topological Vector Spaces and its Properties
  76. Sorting Out Interval Valued Neutrosophic Fuzzy Shortest Cycle Route Problem by Reduced Matrix Method
  77. Empowering Next-Generation Energy Infrastructure Through IoT for Climate Resilience
  78. Enhancing Inventory Management through Advanced Technologies and Mathematical Methods: Utilizing Neutrosophic Fuzzy Logic
  79. Fuzzy Inventory Implementation of Minimum Value Unused Storing Profitable by Python Execution
  80. Quantum Target Recognition Enhancement Algorithm for UAV Consumer Applications
  81. Topologized Graphical Method in Solving Fuzzy Transportation Problem with Computational Techniques
  82. Adaptive Bandwidth Optimization Techniques for Underwater Fiber Optic Networks
  83. Exploring the Potential of Underwater Fibre Optic Networks for Bandwidth Optimization
  84. Sustainable healthcare AI-enhanced materials discovery and design for eco-friendly and biocompatible medical applications
  85. Predicting Employee Turnover: A Systematic Machine Learning Approach for Resource Conservation and Workforce Stability
  86. Optimistic Boosting Internet Connection Throughput by Incorporating Blockchain Filters into Network Infrastructure
  87. A Linear Differentiation Scheme for Camouflaged Target Detection using Convolution Neural Networks
  88. Implementation and Enabling Internet of Things (IoT) in Wireless communication Networks
  89. A Cross-Cultural Assessment of the Actual Application of Cloud-Based Computing in Higher Education Using Data Management Variables
  90. Cybersecurity Risk Management: A Complete Framework for IT Enterprises
  91. Efficiency of Wireless Communication in Cybersecurity for Data Security
  92. Security and Privacy Challenges in Distributed Database Management Systems
  93. Alzheimer Disease Detection using AI with Deep Learning based Features with Development and Validation based on Data Science
  94. Automatic Kidney Stone Detection Using Deep learning Method
  95. How Cloud Security Techniques Protect Your Data and Overcome Challenges     
  96. Multilevel Cloud resource Scheduling approach based on imagebased signature system
  97. Blockchain Technology to Improve Cybersecurity: Opportunities and Challenges
  98. Investigating the Use of Artificial Intelligence for Secure and Transparent Record Keeping in Education
  99. Machine Learning-Based Solutions for Internet of Things (IoT) and Cybersecurity
  100. The Impact of Artificial Intelligence as Advanced Technologies on Bitcoin Industries
  101. An Innovative Method for Detection of Insect Based on Mask-R-CNN Approach
  102. Automatic Detection and Epidemiologic Trends in Head and Neck Cancer Using Fast-R-CNN and SVM Methods
  103. Optimization of an Artificial Neural Network Using Three Novel Meta-heuristic Algorithms for Predicting the Shear Strength of Soil
  104. Improved tweets in English text classification by LSTM neural network
  105. An Empirical Investigation of the Use of Artificial Neural Networks (ANN) for Lung Cancer Disease Diagnosis
  106. Fuzzy C-Means Clustering with MAIRCA -MCDM Method in Classifying Feasible Logistic Suppliers of Electrical Products
  107. Application of Soft Computing Techniques for Predictive Analytics in Financial Markets
  108. Cognitive Defense Cyber Attack Prediction and Security Design in Machine Learning Model
  109. Design and Implementation of Block Chain with Cybersecurity Scheme for Fog Based Internet of Things
  110. Enhancing Image Quality through Deep Learning-based Super-Resolution Techniques
  111. Enhancing IoT Security Through AI-Based Anomaly Detection and Intrusion Prevention
  112. The Empirical Analysis of Machine Learning-Based Techniques for Improving Cyber Security
  113. Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks
  114. Introduction and Development of Cyber Physical Systems in Smart Grid with Blockchain Technology to Enhance Sustainability
  115. Recognition and Integration of AI with IoT for Innovative Decision Making Techniques in Cyber Physical Systems
  116. Efficient classification of kidney disease detection using Heterogeneous Modified Artificial Neural Network and Fruit Fly Optimization Algorithm
  117. An Optimized DDoS Attack Detection Using Deep Convolutional Generative Adversarial Networks
  118. Artificial Intelligence Integrated with Machine Learning for Enhancing Business in E-World
  119. Challenges in cybersecurity: Lessons from biological defense systems
  120. A Secure Authenticated Message Transfer in Vehicle to Grid Networks
  121. Revolutionizing IoT Network Security with Deep Learning-Anomaly Detection Model
  122. Artificial Intelligence and Nanotechnology in Biosensors
  123. Bio-Inspired Optimization with Transfer Learning Based Crowd Density Detection on Sparse Environment
  124. MACHINE LEARNING AND BLOCK CHAIN MODEL FOR SUPPLYING FOOD PRODUCTS AND MAINTAIN FOOD QUALITY
  125. Analysis of Digital Twins Implementation in Smart City using Big Data and Deep Learning
  126. A Cloud-Based Healthcare Diagnosis Support Network for Smart IoT for Predicting Chronic Kidney Failure
  127. A Roadmap for AI-Enabled System Design for 5G, 6G, And Beyond Communication: Issues And Challenges
  128. A Study on the Potential Role of Blockchain in Future Wireless Mobile Networks
  129. An Algorithm for Extracting Image Features Using a Random Deep Neural Network
  130. An Intense Systematic Review of Mobile Agent Based Harmful Threats And Attack Detection Systems in IOT Networks
  131. Analysis of Cyber Security Threats in Payment Gateway Technology
  132. Cyber Security Fraud Detection Using Machine Learning Approach
  133. Development of a sleep monitoring system using cloud computing and big data techniques
  134. Exploring New Approaches for Resource Allocation in distributed Networks with –NOMA-
  135. Investigating Low & High Transfers Training for Multi-task Face Identification Using a Semi-supervised Neuronal Networks
  136. IoT Implementation in Various Applications: A Detailed Review of Cyber Security Issues and Challenges
  137. Role of Cyber security in Gaming technology
  138. Systems For Identifying And Segmenting Facial Labels
  139. The Use of Images Analysis for IoT-Based Smart Traffic Densities Management
  140. The Use of Virtual Private Networks to Facilitate Remote Working: A Critical Review of Cyber Security Implications to Develop Successful VPN Systems
  141. Using Artificial Intelligence to Integrate Machine Learning, Fuzzy Logic, and The IOT as A Cybersecurity System
  142. Integration of Blockchain Technology for Enhanced Wireless Networks
  143. Routing Protocols of Wireless Sensor Networks in Smart Cities
  144. Intelligent Optimization Algorithm based Data Storage and Management: An Empirical Study
  145. Hybrid Evolutionary Algorithm with Energy Efficient Cluster Head to Improve Performance Metrics on the IoT
  146. Hybrid Deep Learning based Attack Detection and Classification Model on IoT Environment
  147. A Detection of Intrusions Based on Deep Learning
  148. Hybrid Artificial Ecosystem Optimization Algorithm based on Search Manager Framework for Big Data Environment
  149. A Comprehensive review on Data Mining Techniques in managing the Medical Data cloud and its security constraints with the maintained of the communication networks
  150. A design of dynamic rate aware classified key for network security in wireless sensor network through optimized distributed secure routing protocol
  151. Enhanced Anomaly Detection System for IOT Based on Improved Dynamic SBPSO
  152. Incorporating Deep Learning Methodologies into the Creation of Healthcare Systems
  153. An Intrusion Detection Approach using Hierarchical Deep Learning-based Butterfly Optimization Algorithm in Big Data Platform
  154. Challenges in Cybersecurity: Lessons from Biological Defense Systems
  155. Artificial Intelligence-based cloud computing for Industry 5.0
  156. Blockchain based Security Solution for Internet of Drones
  157. A Novel PSO-Based Channel Allocation System for Interference in 5G and Higher-Level Wireless Communication Systems
  158. A Comparative Study of Cyber Security Awareness, Competence and Behavior
  159. Agile Technology and Artificial Intelligent Systems in Business Development
  160. Analysis of blockchain technology based on digital management systems and data mining technology
  161. Loan Eligibility Prediction using Machine Learning based on Personal Information
  162. A Framework of Artificial Intelligence for the Manufacturing and Image Classification system
  163. Hybrid Particle Swarm Optimization with Deep Learning Driven Sarcasm Detection on Social Media
  164. Towards Internet of Things: Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing
  165. LCIPA: Lightweight clustering protocol for industry 4.0 enabled precision agriculture
  166. Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
  167. Preface
  168. Arrangement and Accomplishment of Interconnected Networks with the Virtual Reality Twinning with the Inner Light of Cybernetics
  169. Revisiting Browser Performance Benchmarking From an Architectural Perspective
  170. The Future Impact of Technological Developments on Digital Marketing Through Artificial Intelligence
  171. Back to the future: N-Versioning of Microservices
  172. Power-based Attacks on Spatial DNN Accelerators
  173. A Comparative Understanding in Applying Various Artificial Neural Networks in Creating Wireless Sensor Networks for Better Tracking and Movement of Packages in the Logistics Industry
  174. A Review of Bio-Cell Culture Processes in Real-Time Monitoring Approach with Cloud Computing Techniques
  175. Empirical Analysis of Deep Learning for Big Data and Its Applications using CNN
  176. Heart Attack Anxiety Disorder using Machine Learning and Artificial Neural Networks (ANN) Approaches
  177. Machine Learning as a Predictive Technology And Its Impact on Digital Pricing and Cryptocurrency Markets
  178. Medical Image Classification for Disease Prediction with the Aid of Deep Learning Approaches
  179. Systematic Healthcare Smart Systems with the Integration of the Sensor Using Cloud Computing Techniques
  180. The Role of Implementing Cloud Computing Technology for Addressing Critical Security Issues and Overcoming the Challenges Effectively
  181. A Comparative Study on Subtractive Manufacturing and Additive Manufacturing
  182. Implementing Critical Machine Learning (ML) Approaches for Generating Robust Discriminative Neuroimaging Representations Using Structural Equation Model (SEM)
  183. Modelling and analysis of artificial intelligence approaches in enhancing the speech recognition for effective multi-functional machine learning platform – A multi regression modelling approach
  184. A topical design of circularly polarized fractal boundary antenna for RF harvesting
  185. Design and analysis of triangular patch antenna with enhanced bandwidth for RF energy harvesting
  186. E-Commerce product comparison portal for classification of customer data based on data mining
  187. Real time analysis of Intelligent placing system for vehicles using IOT with Deep learning
  188. Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware
  189. Implementation of Data Mining Tools to Classify Protein Structural Class from Residue Based Averaged NMR Chemical Shifts
  190. Morpheus II: A RISC-V Security Extension for Protecting Vulnerable Software and Hardware
  191. ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilities
  192. Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses
  193. An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion
  194. Corporate social responsibility and supply chain: A study for evaluating corporate hypocrisy with special focus on stakeholders
  195. WITHDRAWN: Design and development of IoT based home computerization using Raspberry pi
  196. CURRENT ECONOMIC SLOWDOWN AND OPPORTUNITIES FOR COST EFFECTIVE SERVICES AND PRODUCTS USING TECHNOLOGICAL INVENTIONS: AN EMPIRICAL STUDY
  197. Need for sustainable event management in the Indian context
  198. A continuous mitigation of kVAR-voltage problem of hybrid isolated power system using UPFC
  199. Reliability analysis of a novel IEC 61850-9-2 process-bus based substation automation system architecture
  200. Using Forward Stepwise Multiple Regression to Predict Impact of “Word of Mouth (WOM)” on “Consumer Purchase Intention (CPI)” for Consumer Goods
  201. Cyclone
  202. Secure Architectures
  203. Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems
  204. Morpheus
  205. ρ
  206. Vulnerability-tolerant secure architectures
  207. Horizontal side-channel vulnerabilities of post-quantum key exchange protocols
  208. DATS - Data Containers for Web Applications
  209. Binary Ring-LWE hardware with power side-channel countermeasures
  210. Secure DIMM: Moving ORAM Primitives Closer to Memory
  211. BUSINESS INTELLIGENCE: FROM WHAT IT IS TO HOW IS IT MAKING CITIES SAFER TO LIVE.
  212. Quantifying and improving the efficiency of hardware-based mobile malware detectors
  213. On Architectural Support for Systems Security
  214. Invited - Who is the major threat to tomorrow's security?
  215. Avoiding information leakage in the memory controller with fixed service policies
  216. GhostRider
  217. Understanding contention-based channels and using them for defense
  218. Gate-Level Information Flow Tracking for Security Lattices
  219. Memory bandwidth reservation in the cloud to avoid information leakage in the memory controller
  220. Morpheus
  221. Sapper
  222. Position paper
  223. PHANTOM
  224. Language without words: A pointillist model for natural language processing
  225. Opportunities and Challenges of Using Plasmonic Components in Nanophotonic Architectures
  226. On the Complexity of Generating Gate Level Information Flow Tracking Logic
  227. Dataflow Tomography
  228. Theoretical Fundamentals of Gate Level Information Flow Tracking
  229. Information flow isolation in I2C and USB
  230. Caisson
  231. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
  232. Fighting fire with fire
  233. Your Desktop or Mine: Extending the Reach of Writing Instruction
  234. Hardware assistance for trustworthy systems through 3-D integration
  235. Hardware trust implications of 3-D integration
  236. Function flattening for lease-based, information-leak-free systems
  237. Theoretical analysis of gate level information flow tracking
  238. Secure information flow analysis for hardware design
  239. Gate-Level Information-Flow Tracking for Secure Architectures
  240. Execution leases
  241. Quantifying the Potential of Program Analysis Peripherals
  242. Complete information flow tracking from the gates up
  243. Complete information flow tracking from the gates up
  244. A small cache of large ranges: Hardware methods for efficiently searching, storing, and updating big dataflow tags
  245. MadMAC: Building a Reconfiguration Radio Testbed using Commodity 802.11 Hardware