- Home
- A-Z Publications
- Recent Advances in Electrical & Electronic Engineering
- Previous Issues
- Volume 18, Issue 2, 2025
Recent Advances in Electrical & Electronic Engineering - Volume 18, Issue 2, 2025
Volume 18, Issue 2, 2025
- Thematic Issue: Artificial Intelligence Models, Tools, and Applications Using Machine Learning Techniques
-
-
-
Blockchain Security Attacks, Difficulty, and Prevention
Authors: Amrita Jyoti, Vikash Yadav and Mayur RahulBlockchain technology is increasingly attracting young people because it is so well adapted to the digital age. A decentralised data management system is necessary for the blockchain idea in order to store and share data and transactions throughout the network. This study investigates various types of risks associated with blockchain technology. The research covers different aspects of blockchain, including the architect Read More
-
-
-
An Evolutionary Review on Resource Scheduling Algorithms Used for Cloud Computing with IoT Network
Authors: Santosh Shakya and Priyanka TripathiThe goal of the distributed computing paradigm known as “cloud computing,” which necessitates a large number of resources and demands, is to share the resources as services delivered over the internet. Task scheduling is a very significant stage in today's cloud computing. While lowering the makespan and cost, the task scheduling method must schedule the tasks to the virtual machines. Various academics have proposed Read More
-
-
-
Inherent Insights using Systematic Analytics of Developments Tools in Ethereum Blockchain Smart Contract
Authors: Amrita Jyoti, Pradeep Gupta, Sonam Gupta, Harsh Khatter and Anurag MishraEthereum is an open-source, public, blockchain-based distributed computing platform and operating system that allows the development and execution of distributed applications without the risk of downtime, fraud, control, or intervention from a third party. Along with serving as a platform, Ethereum also offers a Turing-complete Blockchain programming language that aids in the publication of distributed applicatio Read More
-
-
-
An Efficient Image Captioning Method Based on Beam Search
Authors: Tarun Jaiswal, Manju Pandey and Priyanka TripathiBackgroundAn image captioning system is a crucial component in the domains of computer vision and natural language processing. Deep neural networks have been an increasingly popular tool for the generation of descriptive captions for photos in recent years.ObjectiveOn the other hand, these models frequently have the issue of providing captions that are unoriginal and repetitious. Beam search is a well-known search te Read More
-
-
-
An Approach to Forecast Quality of Water Effectively Using Machine Learning Algorithms
Authors: Manjusha Nambiar P.V. and Giridhar UrkudeBackgroundThe quality of water directly or indirectly impacts the health and environmental well-being. Data about water quality can be evaluated using a Water Quality Index (WQI). Computing WQI is a quick and affordable technique to accurately summarise the quality of water.ObjectiveThe objective of this study is to find strategies for data preparation to categorize a dataset on the water quality in two remote Indian villages Read More
-
-
-
An Approach of Privacy Preservation and Data Security in Cloud Computing for Secured Data Sharing
Authors: Revati Raman Dewangan, Sunita Soni and Ashish MishalIntroductionCloud computing has revolutionized how individuals and businesses engage with data and software, turning the internet into a powerful computing platform by centralizing resources. Despite its benefits, there's a challenge in safeguarding sensitive information stored externally. Cryptography faces threats, particularly chosen-ciphertext attacks aiming for secret keys or system information. While more common in Read More
-
-
-
Improved DevOps Lifecycle by Integrating a Novel Tool V-Git Lab
Authors: Anurag Mishra and Ashish SharmaAimsWe propose a tool that can automatically generate datasets for software defect prediction from GitHub repositories.BackgroundDevOps is a software development approach that emphasizes collaboration, communication, and automation in order to improve the speed and quality of software delivery.ObjectiveThis study aims to demonstrate the effectiveness of the tool, and in order to do so, a series of experiments w Read More
-
-
-
A Robust Approach to Object Detection in Images using Improved T_CenterNet Method
Authors: Tarun Jaiswal, Manju Pandey and Priyanka TripathiAimsA Robust Approach to Object Detection in Images using Improved T_CenterNet Method.BackgroundCurrently, two-stage image object detectors are the most common method of detecting objects. However, due to the slow processing of two-stage detectors, it is not always possible to apply them in real-time.ObjectiveTo develop a more robust and effective method for detecting objects in images by building upon and Read More
-
-
-
Enhancing Recommendation Systems with Skew Deviation Bias for Shilling Attack Detection
Authors: Sarika Gambhir, Sanjeev Dhawan and Kulvinder SinghIntroductionRecommender systems serve as a powerful tool to address the challenges of information overload by delivering personalized recommendations. However, their susceptibility to profile injection or shilling attacks poses a significant threat. Malicious entities can introduce fabricated profiles into the database of users to manipulate the popularity of specific items, subsequently influencing prediction outcom Read More
-
-
-
On the Improvements of the Performance of Bayes-Net Classification for Diagnosis of Diabetes: A Cross-validation Approach
Authors: Sarvachan Verma, Anupama Sharma, Sachin Jain and Anuj KumarIntroductionThis study intends to support medical professionals in the early and precise detection and diagnosis of type1 and type2 Diabetes. Many complexities occur if Diabetes is unidentified and remains untreated. 9.3% of individuals worldwide have Diabetes as of 2019, according to data from the World Health Organization. The anticipated increase would be close to 11% of the global population by 2045.Diabetes mellitus i Read More
-
-
-
Real-Time Multiple Object Detection Using Raspberry Pi and Tiny-ML Approach
Authors: Tarun Jaiswal, Manju Pandey and Priyanka TripathiIntroductionObject detection has been an essential task in computer vision for decades, and modern developments in computer vision and deep learning have greatly increased the accuracy of detecting systems. However, the high computational requirements of deep learning-based object detection algorithms limit their applicability to resource-constrained systems, such as embedded devices.MethodsWith the advent of Tin Read More
-
-
-
Blockchain Security:"Botnets and Bitcoin Mining” - A Study on the Impacts and Countermeasures
More LessIntroductionBotnets have become a significant threat to cybersecurity, as they can be used for a wide range of malicious activities, including Distributed Denial-of-Service (DDoS) attacks, spamming, and cryptocurrency mining. Bitcoin Mining, in particular, has become a lucrative target for cybercriminals, as it requires massive computing power and can generate significant profits.MethodsIn this paper, the author presents a Read More
-
Most Read This Month
Article
content/journals/raeeng
Journal
10
5
false
en
