Search
Now showing items 1-10 of 407
Exploring the effect of image enhancement techniques on COVID-19 detection using chest X-ray images
(
Elsevier
, 2021 , Article)
Computer-aided diagnosis for the reliable and fast detection of coronavirus disease (COVID-19) has become a necessity to prevent the spread of the virus during the pandemic to ease the burden on the healthcare system. Chest ...
An incentive mechanism for data sharing based on blockchain with smart contracts
(
Elsevier
, 2020 , Article)
© 2020 Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process of data sharing, the challenges regarding formation of mutual-trust ...
A graph convolutional network-based deep reinforcement learning approach for resource allocation in a cognitive radio network
(
MDPI
, 2020 , Article)
Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing ...
Energy load forecasting using a dual-stage attention-based recurrent neural network
(
MDPI
, 2021 , Article)
Providing a stable, low-price, and safe supply of energy to end-users is a challenging task. The energy service providers are affected by several events such as weather, volatility, and special events. As such, the prediction ...
Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The massive increase in computing and network capabilities has resulted in a paradigm shift from vehicular networks to the Internet of Vehicles (IoV). Owing to the dynamic and heterogeneous nature of IoV, it requires ...
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ...
Edge Intelligence for Empowering IoT-Based Healthcare Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The demand for real-time, affordable, and efficient smart healthcare services is increasing exponentially due to the technological revolution and burst of population. To meet the increasing demands on this critical ...
Analysis of cyber security knowledge gaps based on cyber security body of knowledge
(
Springer
, 2022 , Article)
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is ...
A blockchain and deep neural networks-based secure framework for enhanced crop protection
(
Elsevier B.V.
, 2021 , Article)
The problem faced by one farmer can also be the problem of some other farmer in other regions. Providing information to farmers and connecting them has always been a challenge. Crowdsourcing and community building are ...
A feature-based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
(
John Wiley and Sons Ltd
, 2021 , Article)
Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires ...