Recent Articles

Open access

ISSN: 2666-6030

Designing a novel network anomaly detection framework using multi-serial stacked network with optimal feature selection procedures over DDOS attacks

- Distributed denial-of-service (DDoS) attacks are the major threat that disrupts the services in the computer system and networks using traffic and targeted sources. So, real-world attack detection...

Share article

A method of vehicle networking environment information sharing based on distributed fountain code

The exchange of perceptual information between autonomous vehicles could significantly improve driving safety. In general, obtaining more information means driving more safely. However, Frequent information...

Share article

Introducing a high-throughput energy-efficient anti-collision (HT-EEAC) protocol for RFID systems

The utilization of radio frequency identification (RFID) technology has witnessed a substantial rise in recent years, and this upward trend is expected to continue in the coming years. It is often described...

Share article

Blockchain-based electronic voting systems: A case study in Morocco

This research examines the feasibility of implementing blockchain-based electronic voting systems in Morocco to enhance electoral transparency and integrity. The study employs a methodology that combines...

Share article

Tracing delay network in air transportation combining causal propagation and complex network

In air transportation, monitoring delays and making informed decisions at a system level is crucial for network managers. Causal selection methods have recently witnessed increased adoption for the...

Share article

A macroscopic traffic flow modelling and collision avoidance using B-spline and Physics-Informed Neural Network approaches

The macroscopic model, such as the Lighthill-Whitham-Richards (LWR), has been extensively studied and applied to various homogeneous traffic problems. However, numerical methods have been widely used...

Share article

Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain

Electronic Health Records (EHRs) have become an increasingly significant source of information for healthcare professionals and researchers. Two technical challenges are addressed: motivating federated...

Share article

Modelling and analysis of fiber Bragg grating temperature sensor for Internet of things applications (FBG-4-IoT)

The integration of Fiber Bragg Grating (FBG) sensors into the Internet of Things (IoT) has garnered significant attention in recent years because of their immunity to electromagnetic and radio frequency...

Share article

Deep CNN based brain tumor detection in intelligent systems

The early detection of brain tumor is crucial for effective treatment and improved patient prognosis in Industrial Information Systems. This research introduces a novel computational model employing...

Share article

Improved spectrum prediction model for cognitive radio networks using hybrid deep learning technique

Cognitive Radio (CR) technology has been highlighted as one of the most likely answers to the issue of spectrum shortage with the rise of fifth generation and beyond communication. Secondary users (SUs)...

Share article

A new intelligent controller based on integral sliding mode control and extended state observer for nonlinear MIMO drone quadrotor

Unmanned aerial vehicles (UAVs) control faces major challenges such as dynamic complexity, unknown external disturbances, parametric uncertainties, time-varying states and delays. The literature proposes...

Share article

Machine Learning-enhanced loT and Wireless Sensor Networks for predictive analysis and maintenance in wind turbine systems

Wind power (WP) represents a Renewable Energy Source (RES) that has noticed substantial development as people continuously search for green energy sources. Utilizing predominantly Predictive Maintenance...

Share article

NVS-GAN: Benefit of generative adversarial network on novel view synthesis

The methodology to generate new views for an object from provided input object view is called Novel View Synthesis (NVS). Humans imagine novel views through prior knowledge gathered through their lifetime....

Share article

Adaptive switching and routing protocol design and optimization in internet of things based on probabilistic models

Through smart cities, Intelligent Transportation Systems (ITS), the agricultural sector, and wearable devices, the Internet of Things (IoT) has revolutionized several human interests. Through the development...

Share article

Interference-assisted energy harvesting short packet communications with hardware impairments

Radio frequency energy harvesting offers a promising solution to provide low power Internet of Things (IoT) devices with convenient and perpetual energy supply. In this work, we investigate the reliable...

Share article

FCMPR:A multi-path secure transmission method based on link security assessment and fountain coding

The security of network data transmission has always been a focus of attention. With the rapid development of quantum computers and the rise of intelligent algorithms such as semantic analysis, traditional...

Share article

Generative artificial intelligence for distributed learning to enhance smart grid communication

Machine learning models are the backbone of smart grid optimization, but their effectiveness hinges on access to vast amounts of training data. However, smart grids face critical communication bottlenecks...

Share article

A two-stage CNN model for the classification and severity analysis of retinal and choroidal diseases in OCT images

The advancements in medical imaging techniques have brought exponential increase in the quantity and complexity of data which often require human expertise for interpretation and decision making. However,...

Share article

Research on intelligent vehicle Traffic Flow control algorithm based on data mining

Traffic Congestion (TC) is increasing due to urban growth and vehicle numbers, rendering the development of cities and people's well-being difficult. Traffic Prediction (TP) and control systems have...

Share article

Research on the application of network security defence in database security services based on deep learning integrated with big data analytics

Every day, more people use the internet to send and receive sensitive information. A lot of confidential data is being transmitted electronically between people and businesses. Cyber-attacks, which...

Share article

Personal internet of things networks: An overview of 3GPP architecture, applications, key technologies, and future trends

The use of the personal Internet of Things (PIoT) is rapidly expanding across a range of application areas. It is needed for real-time monitoring, wireless coverage, remote sensing, delivery, security,...

Share article

Secure Official Document Management and intelligent Information Retrieval System based on recommendation algorithm

Currently, servers store information from different sources and file types, which are then retrieved via electronic Information Management Systems (e-IMS), with Smart serving as an effective prototype...

Share article

Data structure and privacy protection analysis in big data environment based on blockchain technology

In today's digital world, the rapid advancement of Information Technology (IT) has made it crucial to prioritize the protection and management of data storage and retrieval. It is vital to challenge...

Share article

Face recognition technology for video surveillance integrated with particle swarm optimization algorithm

With the rapid development of video surveillance technology, face recognition has become an important security and surveillance tool. To improve the accuracy and applicability of face recognition in...

Share article

Markov enhanced I-LSTM approach for effective anomaly detection for time series sensor data

Users could engage and interact with their immediate surroundings without effort in smart settings. The emergence of intelligent technologies along with software-based services has made this possible....

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.