- Artificial Intelligence in Healthcare
- Artificial Intelligence in Education
- Cloud Data Security Solutions
- Technology and Human Factors in Education and Health
- Quantum Computing Algorithms and Architecture
- Software Reliability and Analysis Research
- Network Security and Intrusion Detection
- Digital Transformation in Industry
- Privacy, Security, and Data Protection
- Reliability and Maintenance Optimization
- Innovative Teaching Methods
- Radiation Shielding Materials Analysis
- Advanced Scientific Research Methods
- Quantum Mechanics and Applications
- Technology and Data Analysis
- Advanced Steganography and Watermarking Techniques
- Corporate Social Responsibility Reporting
- Online Learning and Analytics
- Cloud Computing and Resource Management
- Opportunistic and Delay-Tolerant Networks
- Education and Professional Development
- Autonomous Vehicle Technology and Safety
- Innovation in Digital Healthcare Systems
- Advanced Manufacturing and Logistics Optimization
- Advanced Research in Systems and Signal Processing
University of Arkansas at Little Rock
2024-2025
Siksha O Anusandhan University
2025
Parker Hannifin (United States)
2023-2024
Infotech Soft (United States)
2024
Suez University
2024
National College of Business Administration and Economics
2024
Capitol Technology University
2023
This research proposes a successful technique for identifying individuals using feature extraction methods and signal processing approaches. The novelty of this study is in the use conjunction with other signal-processing While working sensors, an artificial neural network (ANN) employed to identify scent patterns that are present persons. numerous gases released by human body measured ten different kinds all which metal oxide semiconductors. Before ANN generate from sensor data, it...
In distributed computing, data trading mechanisms are essential for ensuring the sharing of across multiple computing nodes. Nevertheless, they currently encounter considerable obstacles, including low accuracy in matching parties, fairness transactions, and safeguarding privacy throughout process. To address these issues, we put forward a security scheme based on zero-knowledge proofs smart contracts. phase preparing parameters, objective is to reduce complexity generating non-interactive...
A fundamental and computationally challenging task in the development of dynamic software is organizing optimization resource consumption to complete work within a given time limit. Certain robust approaches are essential meet users' requirements for preventing or repairing defects, particularly when object communications expected inherit variety environments. In this study, technique anticipating run-time issues creation demonstrated large number objects must communicate with each other,...
A disaster is an event that obstructs the regular course of events. Communication between nodes severely hindered during disasters. As a result, ad-hoc network method was necessary to manage global emergency circumstances. During management, role information technology in terms communication critical. mobile one self-organizes and controls itself without aid centralized management unpredictably changing Mobile ad hoc (MANET) can be highly helpful emergencies. In crisis, route discovery MANET...
This paper presents the best outcome of Quantum communication use case industrial manufacturing, using quantum theory to achieve secure data transfer between production facilities and units, especially in most restricted manufacturing (i.e., Air Defense units). computing has several features support units within defense products. Users must validate their user credentials other essential information access critical from source target system. We introduce Rawal Liang Peter's (RLP) sequence...
Currently, autonomous vehicles, non-autonomous and VIP (emergency) cars are using intelligent road management techniques to interact with one another enhance the effectiveness of traffic system. All sorts vehicles managed under control intersection unit approach. This study focuses on transportation networks where a major disruption, accounting for 40% accidents 80% delays. Intelligent Mobility (IM) is strategy promoted in this that proposes setting up channels all vehicle communication. As...
The increased usage of digital technologies across businesses has led to an increase in cybercrime. It is difficult for existing intrusion detection systems detect highly skilled hacking attempts; however, machine learning been suggested as a way around these drawbacks. purpose this study evaluate how well various algorithms identify and stop cyberattacks diverse network, system, application environments. goal the provide designers with thorough grasp benefits drawbacks using cyber...
Being overweight may be caused by eating too many calories. It is a curable medical condition defined abnormal fat accumulation in the body. Diabetes, excessive cholesterol, and heart attacks are most common, although high blood pressure, colon cancer, prostate cancer also common. Computer techniques often utilized to address such difficulties. In this work, we develop system that detects identifies food allergies using photographs. To summaries, powerful computer algorithms as transfer...
<title>Abstract</title> Cloud computing is a cutting-edge technology that rapidly gaining traction in the information (IT) sector. Although it has many benefits, there are also disadvantages, most notably difficulties and vulnerability security. This study describes multiple architectures for secure communication over private cloud. We developed unique custom approach incorporates steganography to provide an additional degree of security cloud data transport. Our suggested technique...
<title>Abstract</title> The full text of this preprint has been withdrawn by the authors due to author disagreement with posting preprint. Therefore, do not wish work be cited as a reference. Questions should directed corresponding author.