- Network Security and Intrusion Detection
- Information and Cyber Security
- Advanced Malware Detection Techniques
- Chaos-based Image/Signal Encryption
- Blockchain Technology Applications and Security
- Cryptography and Data Security
- IoT and Edge/Fog Computing
- Advanced Steganography and Watermarking Techniques
- Energy Efficient Wireless Sensor Networks
- Smart Grid Security and Resilience
- Internet Traffic Analysis and Secure E-voting
- Innovation in Digital Healthcare Systems
- Mobile Ad Hoc Networks
- Technology and Data Analysis
- Digital Media Forensic Detection
- Privacy-Preserving Technologies in Data
- Security in Wireless Sensor Networks
- Vehicular Ad Hoc Networks (VANETs)
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Cloud Data Security Solutions
- Opportunistic and Delay-Tolerant Networks
- Advanced Image and Video Retrieval Techniques
- Image Retrieval and Classification Techniques
- Spam and Phishing Detection
Chonnam National University
2023-2025
University of Tasmania
2013-2023
Konkuk University
2013-2023
Beijing Jiaotong University
2019-2023
Innovation Cluster (Canada)
2023
Sungshin Women's University
2013-2021
Lovely Professional University
2021
Universidade Federal do Piauí
2021
Charles Darwin University
2021
Edinburgh Napier University
2021
Transparent electronic materials are increasingly in demand for a variety of optoelectronic applications, ranging from passive transparent conductive windows to active thin-film transistors. BaSnO${}_{3}$ is semiconducting oxide with large band gap more than 3.1 eV. Recently, we discovered that doped few percent La exhibits an unusually high electrical mobility...
An edge detection is important for its reliability and security which delivers a better understanding of object recognition in the applications computer vision, such as pedestrian detection, face video surveillance. This paper introduced two fundamental limitations encountered detection: connectivity thickness, those have been used by various developments state-of-the-art. optimal selection threshold effectual has constantly key challenge vision. Therefore, robust algorithm using multiple...
The Shipboard Automatic Identification System (AIS) is crucial for navigation safety and maritime surveillance, data mining pattern analysis of AIS information have attracted considerable attention in terms both basic research practical applications. Clustering spatio-temporal trajectories can be used to identify abnormal patterns mine customary route transportation safety. Thus, the capacities traffic monitoring could enhanced correspondingly. However, trajectory clustering often sensitive...
In this paper, we discussed an efficient statistical method with proof-of-work consensus approach for cloud and fog computing. With method, solution precise probability in minimal time is realized. We have used the expectation maximization algorithm polynomial matrix factorization. The advantages of are less iteration to converge easiness configure complete mathematical model as per requirement. Moreover, energy memory consumption also which make appealing experimental results show that...
This paper proposes a new deep learning method, the greedy weighted dictionary for mobile multimedia medical diseases analysis. Based on traditional methods, which neglects relationship between sample and atom, we propose mechanism to connect with atom in this paper. Meanwhile, method is prone cause over-fitting patient classification of limited training data set. Therefore, adopts l <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> -norm...
In this research paper, blockchain-based trust management model is proposed to enhance relationship among beacon nodes and eradicate malicious in Wireless Sensor Networks (WSNs). This composite evaluation involves behavioral-based as well data-based trust. Various metrics such closeness, honesty, intimacy frequency of interaction are taken into account compute nodes. Further, the (behavior data) value each broadcast Base Stations (BS) generate a blockchain values. Subsequently, discards node...
The increasing number of connected devices in the era Internet Thing (IoT) has also increased intrusions. Intrusion Detection System (IDS) is a secondary intelligent system to monitor, detect, and alert about malicious activities; an Prevention (IPS) extension detection that triggers relevant action when attack suspected futuristic aspect. Both IDS IPS systems are significant useful for developing security model. Several studies exist review prevention models; however, coherence...
Industrial Internet of Things (IIoTs) are the extensions (IoTs) and have paved way towards industry revolution 4.0. IIoT accelerates automation internal external working process including transport, manufacturing, marketing units with a number connected devices. Being extension IoT, it inherits insecurities technology; however, this sensor-configured infrastructure needs some extra effort to customize existing security solutions. In spite reconstructions models, scope improved developments...
Abstract White blood cells (WBCs) play a vital role in immune responses against infections and foreign agents. Different WBC types exist, anomalies within them can indicate diseases like leukemia. Previous research suffers from limited accuracy inflated performance due to the usage of less important features. Moreover, these studies often focus on fewer types, exaggerating accuracy. This study addresses crucial task classifying using microscopic images. introduces novel approach extensive...
This research explores an innovative approach to segment hyperspectral images. Aclass-aware feature-based attention is combined with enhanced attention-based network, FAttNet proposed the images semantically. It introduced address challenges associated inaccurate edge segmentation, diverse forms of target inconsistency, and suboptimal predictive efficacy encountered in traditional segmentation networks when applied semantic tasks First, class-aware feature procedure used improve extraction...
We studied the relationship between mobility and dislocation density for recently discovered high-mobility Ba0.96La0.04SnO3 thin-films found that carrier of film, as high 4.0×1020 cm−3 70 cm2 V−1s−1, respectively, decreased increased. determined values using transmission electron microscopy atomic force after surface etching. effect dislocations on was large, when compared with GaN a similar density. The importance scattering in perovskite structure is emphasized, especially...
We studied the conduction mechanism in Sb-doped BaSnO3 epitaxial films, and compared its behavior with that of counterpart, La-doped BaSnO3. found electron mobility films was reduced by almost 7 times when dopant changed from La to Sb, despite little change effective mass carriers. This indicates scattering rate electrons system is strongly affected site at which dopants are located. More importantly, we threading dislocations also depends critically on site. propose large enhancement caused...
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially recent years. In some cases, AI learns alone from scratch and performs human tasks faster better than humans. With the advances AI, it is natural to wonder whether Neural Networks will be used successfully create or break cryptographic algorithms. Bibliographic review shows main approach this problem been addressed throughout complex Networks, but without understanding proving security of...