skip to main content
Volume 30, Issue 9Dec 2024Current Issue
Reflects downloads up to 05 Jan 2025Bibliometrics
research-article
Tiny ML-based reconfigurable IoT platform design for brackish water aquaculture monitoring
Abstract

An important sector of India's fishing industry is prawn farming. Gross prawn exports came to 5,90,275 MT (metric tonnes) and were worth $4,426.19 million. White-leg prawn exports decreased from 5,12,204 MT to 4,92,271 MT in 2020–21. To show the ...

research-article
Cooperative parking search strategy through V2X communications: an agent-based decision
Abstract

Finding parking spots in urban areas poses significant challenges due to the ever increasing complexities of the transportation endeavor, resulting in issues like traffic jams, higher fuel consumption, and environmental pollution. In this regard, ...

research-article
An efficient algorithm for optimal route node sensing in smart tourism Urban traffic based on priority constraints
Abstract

The public transportation system is now dealing with a number of problems brought on by the sharp increase in automobile ownership in cities as well as the buildup of vehicles as a result of events and accidents. However, the city’s limited road ...

research-article
Enhancing IOT based software defect prediction in analytical data management using war strategy optimization and Kernel ELM
Abstract

The existence of software problems in IoT applications caused by insufficient source code, poor design, mistakes, and insufficient testing poses a serious risk to functioning and user expectations. Prior to software deployment, thorough testing ...

research-article
Clustering routing algorithm of wireless sensor network based on swarm intelligence
Abstract

This study aims to explore the clustering routing algorithm of a wireless sensor network (WSN) based on swarm intelligence (SI) and improve the energy efficiency and transmission efficiency of WSN, thus optimizing the network performance. To ...

research-article
An advanced actor critic deep reinforcement learning technique for gamification of WiFi environment
Abstract

The Open System Interconnection Model’s physical layer implementation contains several networks including the wireless networks working system over radio waves. Since any device with wireless capabilities enabled can access the wireless network, ...

research-article
Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm
Abstract

Malware cyberattacks have increased rapidly with the rise of Internet users, IoT devices, smart cities, etc. Attackers are constantly trying to evolve their methods and attack techniques to exploit human vulnerabilities and non-existing system ...

research-article
Deep reinforcement learning based computation offloading for xURLLC services with UAV-assisted IoT-based multi-access edge computing system
Abstract

New Internet of Things (IoT) based applications with stricter key performance indicators (KPI) such as round-trip delay, network availability, energy efficiency, spectral efficiency, security, age of information, throughput, and jitter present ...

research-article
ImprovedRain removal network clarity and object detection performance in heavy rain images using complementary structure
Abstract

In heavy rain situations, the clarity of both human vision and computer vision is significantly reduced. Rain removal GAN-based networks have been proposed as a means of resolving this problem. However, such methods have only a limited ...

research-article
Accuracy-enhanced E-commerce recommendation based on deep learning and locality-sensitive hashing
Abstract

Recommender systems facilitate the discovery of relevant content in several online communities by analyzing users' past interactions and preferences. With the expansion of data-intensive online activities and online content, cybersecurity risks ...

research-article
Empowered edge intelligent aquaculture with lightweight Kubernetes and GPU-embedded
Abstract

Edge computing is a new paradigm for processing data at the edge of networks. There are a variety of edge computing scenarios, depending on the situation. In this paper, we investigate an architecture with heterogenous devices for intelligence ...

research-article
A positioning method based on map and single base station towards 6G networks
Abstract

Positioning based on wireless communication networks has great application potential. In this paper, we propose a positioning method for the 5G-Advanced (5GA) or 6G network. Firstly, we establish the communication link and generate the map-based ...

research-article
Energy efficient multi-carrier NOMA and power controlled resource allocation for B5G/6G networks
Abstract

Unmanned aerial vehicles, sometimes known as drones, are becoming increasingly common in communications networks, drawing interest from both business and academia. Their adaptable capacities and characteristics, which may enable various ...

research-article
Genetic electro-search optimization for optimum energy consumption in edge computing-based internet of healthcare things
Abstract

Energy consumption is a vital issue when optimum usage and carbon footprint are all considered in today’s Internet of Things (IoT) environments. Considering edge computing, that becomes too critical in terms of wireless devices with limited ...

research-article
Packing stretched convex polygons in an optimized rectangle
Abstract

A nonstandard optimized packing convex polygons in a rectangular container is considered. The shapes of the polygons are not fixed: the polygons can be compressed/stretched in certain limits along the principal axes, but their areas remain ...

research-article
On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
Abstract

Software-Defined Networking (SDN) offers a global view over the network and the ability of centrally and dynamically managing network flows, making them ideal for creating security threat detection and mitigation solutions. Industrial networks ...

research-article
Impact of neural cyberattacks on a realistic neuronal topology from the primary visual cortex of mice
Abstract

Brain-computer interfaces (BCIs) are widely used in medical scenarios to treat neurological conditions, such as Parkinson’s disease or epilepsy, when a pharmacological approach is ineffective. Despite their advantages, these BCIs target relatively ...

research-article
Mitigating communications threats in decentralized federated learning through moving target defense
Abstract

The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces ...

research-article
Transfer and online learning for IP maliciousness prediction in a concept drift scenario
Abstract

Determining the maliciousness of a cybersecurity incident is essential to establish effective measures against it. To process large volumes of data in an automated way, machine learning techniques are commonly applied to the problem. One of the ...

research-article
Novel energy consumption and reduces number of transmission attempts (ECRTA) model for heterogeneous wireless muti-hop network
Abstract

Energy utilization is increasingly significant for heterogeneous wireless multi-hop systems. Energy utilization models are progressively powerful in giving the usefulness of convention. The ECRTA model offers the chance to look at the effect of ...

research-article
A machine learning-based analytical intelligence system for forecasting demand of new products based on chlorophyll: a hybrid approach
Abstract

This manuscript addresses the problem of forecasting the demand for innovative products with limited and inhomogeneous sales data over time. The main objective of the study is to use the information available from a group of innovative chlorophyll-...

research-article
A high-capacity slicing PBFT protocol based on reputation evaluation model
Abstract

Consortium blockchains, characterized by regulated blockchain technologies with limited authorization management, have gained popularity in various domains, including supply chain, Internet of Things (IoT), justice, and education, and have now ...

research-article
Edge-enabled anomaly detection and information completion for social network knowledge graphs
Abstract

In the rapidly advancing information era, various human behaviors are being precisely recorded in the form of data, including identity information, criminal records, and communication data. Law enforcement agencies can effectively maintain social ...

research-article
MF-Informer for long-term QoS prediction in edge-cloud collaboration environments
Abstract

In Service-Oriented Architecture (SOA) systems, continuously stabilizing web services’ quality of service (QoS) is critical to maintaining system performance. Dynamic changes in edge-cloud collaborative computing environments lead to fluctuations ...

research-article
Beam prediction and tracking mechanism with enhanced LSTM for mmWave aerial base station
Abstract

By combining millimeter wave (mmWave) with abundant spectral resources and advanced directional beamforming technology, mmWave aerial base stations (mAeBSs) can provide high-speed services to users on the ground while reducing interference to ...

research-article
Updated exploration of the Tor network: advertising, availability and protocols of onion services
Abstract

The Tor network is known for its opaque characteristics and involvement in illicit activities, motivating to shed light on the exposure, lifetime, and functionalities of onion services. This study focuses on the appearance of Tor links in online ...

research-article
Detection of malicious URLs using machine learning
Abstract

The detection of fraudulent URLs that lead to malicious websites using addresses similar to those of legitimate websites is a key form of defense against phishing attacks. Currently, in the case of Internet of Things devices is especially relevant,...

research-article
Infrared and visible image fusion in a rolling guided filtering framework based on deep feature extraction
Abstract

To preserve rich detail information and high contrast, a novel image fusion algorithm is proposed based on rolling-guided filtering combined with deep feature extraction. Firstly, input images are filtered to acquire various scales decomposed ...

research-article
Bag of tricks for backdoor learning
Abstract

Deep learning models are vulnerable to backdoor attacks, where an adversary aims to fool the model via data poisoning, such that the victim models perform well on clean samples but behave wrongly on poisoned samples. While researchers have studied ...

research-article
Genetically optimized TD3 algorithm for efficient access control in the internet of vehicles
Abstract

The Internet of Vehicles (IoV) is currently experiencing significant development, which has involved the introduction of an efficient Access Control Mechanism (ACM). Reliable access control is evolving into mandatory in order to provide security ...

Comments