- Anomaly Detection Techniques and Applications
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
- Energy Efficient Wireless Sensor Networks
- Big Data and Business Intelligence
- Smart Grid Energy Management
- COVID-19 diagnosis using AI
- Advanced Image Fusion Techniques
- Data Stream Mining Techniques
- IPv6, Mobility, Handover, Networks, Security
- Cloud Computing and Resource Management
- Internet of Things and AI
- Advanced MIMO Systems Optimization
- Time Series Analysis and Forecasting
- Currency Recognition and Detection
- Artificial Intelligence in Healthcare and Education
- Sentiment Analysis and Opinion Mining
- Energy Harvesting in Wireless Networks
- Big Data Technologies and Applications
- Artificial Intelligence in Healthcare
- Smart Agriculture and AI
- Telecommunications and Broadcasting Technologies
International Institute of Information Technology
2022-2024
Aditya Birla (India)
2024
University of Wasit
2024
Symbiosis International University
2023
Air pollution consists of harmful gases and fine Particulate Matter (PM 2.5 ) which affect the quality air. This has not only become key issues in scientific research but also turned to be an important social public’s life. Therefore, many experts scholars at different R&Ds, universities, abroad are involved lot on PM pollutant predictions. In this scenario, authors proposed various machine learning models such as linear regression, random forest, KNN, ridge lasso, XGBoost, AdaBoost...
Machine learning algorithms have quickly risen to the top of several fields' decision-making processes in recent years. However, it is simple for these confirm already present prejudices data, leading biassed and unfair choices. In this work, we examine bias machine great detail offer strategies promoting fair moral algorithm design. The paper then emphasises value fairnessaware algorithms, which aim lessen by including fairness constraints into training evaluation procedures. Reweighting,...
Several advanced features exist in fifth-generation (5G) correspondence than fourth-generation (4G) correspondence. Centric cloud-computing architecture achieves resource sharing and effectively handles big data explosion. For security problems, researchers had developed many methods to protect against cyber-attacks. Only a few solutions are based on blockchain (BC), but affected by expensive storage costs, network latency, confidence, capacity. Things represented digital form the virtual...
Environmental safety is a significant feature necessary for the healthy life style. Any abnormality in environment changes atmospheric parameters such as humidity, temperature, smoke, level of carbon monoxide and sound. Fatal health issues loss or weakening immunity & infertility occurs due to different activities occurring nuclear power plants recycling fuel leakage radiation that add low levels atmosphere. Leakage gets mixed with fresh air atmosphere results into increase In this work,...
The unpredictable noise in received signal strength indicator (RSSI) measurements indoor environments practically causes very high estimation errors target localization. Dealing with RSSI and ensuring target-localization accuracy RSSI-based localization systems is a popular research trend nowadays. This paper proposed two range-free schemes wireless sensor networks (WSN) for an setup: first plain support vector regression (SVR)-based model second the fusion of SVR kalman filter (KF)....
Examination and evaluation of sentiment The most popular area for dissecting extracting knowledge from communication data many sources, such as Facebook, Instagram, Twitter, Amazon, so on, is known mining. It plays a fundamental role in enabling the organizations to work productively on advancing business system gaining comprehensive understanding buyer's feedback their product. entails calculating person's behavior terms his buying preferences then placing yourself shoes about commercial...
Studies combining machine learning with the Internet of Things are now under process. The procedures for detecting fires also described in depth. In order to be any help, has able identify and track development events that equivalent fires. number photos must analyzed by before a pattern may found is decreased when data captured processed frame frame. This information been gathered express purpose tracking particular incident. Recent research given substantial treatment this journal. Some...
Alzheimer's disease (AD) is a neurological disorder that gets worse over time and has big effect on brain function. It important to get correct diagnosis as soon possible so treatment can be effective. EEG, which records activity without touching the brain, non-invasive, cheap, show in real time. become hopeful way find AD. By exploiting their spatial temporal characteristics, this paper proposes hybrid deep learning technique combining Convolutional Neural Networks (CNNs) Long Short-Term...
Blockchain is a new distributed ledger system that enables for safe online transactions without need trusted third party. As blockchain technology continues to advance at dizzying pace, the question of smart contracts and how they should evolve has risen forefront academic business discussions. With this paper, we want shed light on built really function. To better grasp whole picture, researchers are taking into account scholarly works have been vetted their quality presenting comprehensive...
Wireless Underground Sensor Networks (WUGSNs) transmit data collected from underground objects such as water substances, oil soil contents, and others. In addition, the sensor nodes to surface regarding irregularities, earthquake, landslides, military border surveillance, other issues. The channel difficulties of WUGSNs create uncertain communication barriers. Recent research works have proposed different types assessment techniques security approaches. Moreover, existing are inadequate...