All Stories

  1. Symmetry-Driven Multi-Objective Dream Optimization for Intelligent Healthcare Resource Management and Emergency Response
  2. Securing IoT Systems Using Artificial Intelligence-Driven Approaches
  3. Cybersecurity Foundations: Understanding Computer, Network, and Internet Security
  4. Intelligent dynamic bandwidth allocation for real-time IoT in fog-based optical networks
  5. Enhanced IoT cybersecurity through Machine Learning - based penetration testing
  6. Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
  7. NEW APPROACH FOR BREAST CANCER DETECTION- BASED MACHINE LEARNING TECHNIQUE
  8. A novel chaotic map partially blind signature scheme based on quadratic residue problems
  9. Analytical Approach for Data Encryption Standard Algorithm
  10. Vehicle To Vehicle and Vehicle To Ground Communication - Speech Encryption Algorithm
  11. Swin Transformer-Based Segmentation and Multi-Scale Feature Pyramid Fusion Module for Alzheimer’s Disease with Machine Learning
  12. Analysis of the current state of deepfake techniques-creation and detection methods
  13. Combining Artificial Intelligence and Image Processing for Diagnosing Diabetic Retinopathy in Retinal Fundus Images
  14. A signature algorithm based on chaotic maps and factoring problems
  15. Chaotic based multimedia encryption: a survey for network and internet security
  16. Chaotic elliptic map for speech encryption
  17. Image encryption using anti-synchronisation and Bogdanov transformation map
  18. A Hybrid SVM NAÏVE-BAYES Classifier for Bright Lesions Recognition in Eye Fundus Images
  19. A new speech encryption algorithm based on dual shuffling Hénon chaotic map
  20. A split and merge video cryptosystem technique based on dual hash functions and Lorenz system
  21. A New Image Encryption Scheme Using Dual Chaotic Map Synchronization
  22. Phonocardiogram Classification Based on Machine Learning with Multiple Sound Features
  23. A new dynamic speech encryption algorithm based on lorenz chaotic map over internet protocol
  24. An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem
  25. A new RSA public key encryption scheme with chaotic maps
  26. Automated Pedestrian Recognition Based on Deep Convolutional Neural Networks
  27. An Efficient Identity-Based Cryptographic Model for Chebyhev Chaotic Map and Integer Factoring Based Cryptosystem
  28. Geometrical-based approach for robust human image detection
  29. An effective image processing method for detection of diabetic retinopathy diseases from retinal fundus images
  30. Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys
  31. A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments
  32. High Quality - Low Computational Cost Technique for Automated Principal Object Segmentation Applied in Solar and Medical Imaging
  33. A Topic Modeling Based Solution for Confirming Software Documentation Quality
  34. Combining Audio Samples and Image Frames for Enhancing Video Security
  35. Spam E-mail Filtering using ECOS Algorithms
  36. A novel video encryption algorithm-based on speaker voice as the public key
  37. A Novel Encryption Scheme for Digital Image - Based on One Dimensional Logistic Map
  38. A Dual Curvature Shell Phased Array Simulation for Delivery of High Intensity Focused Ultrasound
  39. Across correlation - new based technique for speaker recognition
  40. A New Approach for Complex Encrypting and Decrypting Data
  41. A Pair-Wise Key Establishment Scheme for AD HOC Networks