All Stories

  1. Cybersecurity Foundations: Understanding Computer, Network, and Internet Security
  2. Intelligent dynamic bandwidth allocation for real-time IoT in fog-based optical networks
  3. Enhanced IoT cybersecurity through Machine Learning - based penetration testing
  4. Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
  5. NEW APPROACH FOR BREAST CANCER DETECTION- BASED MACHINE LEARNING TECHNIQUE
  6. A novel chaotic map partially blind signature scheme based on quadratic residue problems
  7. Analytical Approach for Data Encryption Standard Algorithm
  8. Vehicle To Vehicle and Vehicle To Ground Communication - Speech Encryption Algorithm
  9. Swin Transformer-Based Segmentation and Multi-Scale Feature Pyramid Fusion Module for Alzheimer’s Disease with Machine Learning
  10. Analysis of the current state of deepfake techniques-creation and detection methods
  11. Combining Artificial Intelligence and Image Processing for Diagnosing Diabetic Retinopathy in Retinal Fundus Images
  12. A signature algorithm based on chaotic maps and factoring problems
  13. Chaotic based multimedia encryption: a survey for network and internet security
  14. Chaotic elliptic map for speech encryption
  15. Image encryption using anti-synchronisation and Bogdanov transformation map
  16. A Hybrid SVM NAÏVE-BAYES Classifier for Bright Lesions Recognition in Eye Fundus Images
  17. A new speech encryption algorithm based on dual shuffling Hénon chaotic map
  18. A split and merge video cryptosystem technique based on dual hash functions and Lorenz system
  19. A New Image Encryption Scheme Using Dual Chaotic Map Synchronization
  20. Phonocardiogram Classification Based on Machine Learning with Multiple Sound Features
  21. A new dynamic speech encryption algorithm based on lorenz chaotic map over internet protocol
  22. An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem
  23. A new RSA public key encryption scheme with chaotic maps
  24. Automated Pedestrian Recognition Based on Deep Convolutional Neural Networks
  25. An Efficient Identity-Based Cryptographic Model for Chebyhev Chaotic Map and Integer Factoring Based Cryptosystem
  26. Geometrical-based approach for robust human image detection
  27. An effective image processing method for detection of diabetic retinopathy diseases from retinal fundus images
  28. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys
  29. A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments
  30. High Quality - Low Computational Cost Technique for Automated Principal Object Segmentation Applied in Solar and Medical Imaging
  31. A Topic Modeling Based Solution for Confirming Software Documentation Quality
  32. Combining Audio Samples and Image Frames for Enhancing Video Security
  33. Spam E-mail Filtering using ECOS Algorithms
  34. A novel video encryption algorithm-based on speaker voice as the public key
  35. A Novel Encryption Scheme for Digital Image - Based on One Dimensional Logistic Map
  36. A Dual Curvature Shell Phased Array Simulation for Delivery of High Intensity Focused Ultrasound
  37. Across correlation - new based technique for speaker recognition
  38. A New Approach for Complex Encrypting and Decrypting Data
  39. A Pair-Wise Key Establishment Scheme for AD HOC Networks