All Stories

  1. Sustainable Inventory Control and Management
  2. Routing attack induced anomaly detection in IoT network using RBM-LSTM
  3. Felis or Canis: Image Classification Using Deep Learning
  4. Identifying Spam Accounts on Instagram: An Analysis of User Activity Data Using Machine Learning
  5. Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage
  6. Enhancing explainability in predicting mental health disorders using human–machine interaction
  7. A Directed Graph and GRUs-Based Trajectory Forecasting of Intelligent and Automated Transportation System for Consumer Electronics
  8. Robust Facial Biometric Authentication System Using Pupillary Light Reflex for Liveness Detection of Facial Images
  9. Leveraging Big Data Analytics for Organizational Intelligence - Empowering Companies with Actionable Insights
  10. Dynamic Price Management System in a Distributed Cloud Environment
  11. NURTURE An Analytical Model that Supports Healthy Relationship Between Parents And Children Using Machine Learning
  12. Evaluating and mitigating gender bias in machine learning based resume filtering
  13. Internet of Things (IoT) Enabled Image Segmentation Model For Lung Disease Classification: An Approach Based On Particle Swarm Optimization
  14. Task Scheduling in Fog computing using hybrid GA and Success rate based PSO (GASPSO)
  15. Implementation of drone technology for farm monitoring & pesticide spraying: A review
  16. Health Management System Based on Blockchain Technology
  17. Fog computing security using token-based authentication system
  18. DoS Defense Using Modified Naive Bayes
  19. Generative Adversarial Network for Hand-Writing Detection
  20. Heartbeat Classification Using Sequential Method
  21. Machine Learning Models for Alzheimer’s Disease Detection Using OASIS Data
  22. Whale Optimization Based Approach to Compress and Fasten CNN for Crop Disease and Species Identification
  23. Efficient Question Answering in Chatbot Using TF-IDF and Cosine Similarity
  24. Effective load balancing strategy using fuzzy golden eagle optimization in fog computing environment
  25. Securing Internet of Things devices against code tampering attacks using Return Oriented Programming
  26. Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing
  27. Simulation and Emulation Tools for Fog Computing
  28. Optimization Procedure for Intelligent Internet of Things Applications
  29. Code Tamper-Proofing Using Return Oriented Programming in IoT Devices
  30. Commercial or Pilot-Scale Pyrolysis Units for Conversion of Biomass to Bio-Oils: State of the Art
  31. A Survey of Load Balancing and Implementation of Clustering-Based Approach for Clouds
  32. Green Smart Building
  33. Implementation and Performance Analysis of Cognitive Radio with Frequency Updating Algorithm on Software-defined Radio Platform
  34. Designing of fog based FBCMI2E Model using machine learning approaches for intelligent communication systems
  35. Integrated frame work for identifying sustainable manufacturing layouts based on big data, machine learning, meta-heuristic and data envelopment analysis
  36. Leveraging energy‐efficient load balancing algorithms in fog computing
  37. Design and exploration of load balancers for fog computing using fuzzy logic
  38. Green Smart Building
  39. Efficient content retrieval in fog zone using Nano‐Caches
  40. Dynamic Task Scheduling using Balanced VM Allocation Policy for Fog Computing Platforms
  41. Fog computing: from architecture to edge computing and big data processing
  42. An improved data classification technique for data security in cloud computing
  43. An improved node selection algorithm for routing protocols in VANET
  44. Analysis of Load Balancing Algorithms using Cloud Analyst
  45. Multicasting Technique to Enhance the Performance of DSR Routing Protocol Using Various Performance Metrics under Different Traffic Conditions in Mobile Ad hoc Networks
  46. Cloud Security Algorithms
  47. Proposed Method to Enhance the Performance of AOMDV under DDOS Attack