- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Fast Track Listing
Recent Advances in Computer Science and Communications - Online First
Description text for Online First listing goes here...
31
results
21 - 31 of 31 results
-
-
Jamming Attacks Detection Based on IGWO for Optimization of Fast Correlation-Based Feature extraction in Wireless Communication
Authors: Zinah Jaffar Mohammed Ameen, Hala A. Naman and Alza Abduljabbar MahmoodAvailable online: 25 October 2024More LessBackground Wireless networks are essential communication technologies that prevent cable installation prices and burdens. Because of this technology's pervasive usage, wireless network safety is a significant problem. Owing to distributed and open wireless medium aspects, attackers might use different jamming methods to exploit physical and MAC layer protocol vulnerabilities. In addition, jamming attacks require to b Read More
-
-
-
Malignancy Detection in Lung and Colon Histopathology Images by Transfer Learning with Class Selective Image Processing
Available online: 23 October 2024More LessAims & Background Due to its ferocity, enormous metastatic potential, and variability, cancer is responsible for a disproportionately high number of deaths. Cancers of the lung and colon are two of the most common forms of the disease in both sexes worldwide. The excellence of treatment and the endurance rate for cancer patients can be greatly improved with early and precise diagnosis. Objectives & Methodology We suggest Read More
-
-
-
Utilizing AspectJ for Defense Against Evasive Malware Attacks in Android System
Authors: Ketaki Pattani, Sunil Gautam, Mamoon Rashid, Mohd Zuhair and Ahsan RizviAvailable online: 18 October 2024More LessIntroduction Mobile devices have become an integral part of our digital lives, facilitating various tasks and storing a treasure trove of sensitive information. However, as more people utilize mobile devices, sophisticated cyber threats are emerging to elude traditional security measures. Method The use of evasion techniques by malicious actors presents a significant challenge to mobile security, necessitating creative solu Read More
-
-
-
Biofuels Policy as the Indian Strategy to Achieve the 2030 Sustainable Development Goal 7: Targets, Progress, and Barriers
Authors: Michel Mutabaruka, Manmeet Kaur, Sanjay Singla, Purushottam Sharma, Gurpreet Kaur and Gagandeep SinghAvailable online: 16 October 2024More LessIntroduction The use of 20% blended biofuels to fossil fuels is one of the important targets of the Government of India to address the impacts of Climate Change, energy-related environmental pollution, and illnesses due to air pollution. Method The National Policy on Biofuels 2018 (NPB 2018) is in place to boost the emerging production of biofuels and, therefore, respond to different international agreements, including the Sust Read More
-
-
-
Data Security and Privacy Preservation in Cloud-Based IoT Technologies: an Analysis of Risks and the Creation of Robust Countermeasures
Authors: Mayank Pathak, Kamta Nath Mishra and Satya Prakash SinghAvailable online: 16 October 2024More LessThe Internet of Things (IoT) is a revolutionary technology being used in many different industries to improve productivity, automation, and comfort of the user in the cloud and distributed computing settings. Cloud computing is essential because it makes data management and storage more effective by automatically storing and examining the enormous amounts of data generated by Internet of Things applications. End users Read More
-
-
-
Analysis and Classification of Medical Images Using Deep Learning Algorithms
Authors: Chouchene Karima, Nadjla Bourbia, Kamel Messaoudi and El-Bay BourennaneAvailable online: 10 October 2024More LessIntroduction Nowadays, Artificial intelligence and machine learning have emerged as a powerful tool for the analysis of medical images such as MRI scans. This technology holds significant potential to improve diagnostic services and accelerate medical advances by facilitating clinical decision-making. Method In this work, we developed a Convolutional Neural Network (CNN) model specifically designed for the classification of m Read More
-
-
-
AI Chatbots in Fintech Sector: A Study Towards Technological Convergence
Authors: Chandni Bansal, Ajay Kumar, Namrata Dogra, Gaydaa AlZohbi and Chand PrakashAvailable online: 09 October 2024More LessThe Fintech industry, particularly banks, has witnessed a profound transformation with the integration of Artificial Intelligence chatbots, redefining customer experience and engagement. As Fintech firms increasingly integrate AI chatbots into their platforms, understanding customer perceptions becomes paramount for strategic decision-making and sustained success. To unravel the complexities of this convergence, Read More
-
-
-
Applying Polynomials for Developing Post Quantum Cryptography Algorithms to Secure Online Information - An Initial Hypothesis
Authors: Taniya Hasija, K. R. Ramkumar, Bhupendra Singh, Amanpreet Kaur and Sudesh Kumar MittalAvailable online: 04 October 2024More LessIn the contemporary era, a vast array of applications employs encryption techniques to ensure the safeguarding and privacy of data. Quantum computers are expected to threaten conventional security methods and two existing approaches, namely Shor's and Grover's algorithms, are expediting the process of breaking both asymmetric and symmetric key classical algorithms. The objective of this article is to explore th Read More
-
-
-
A Policy Configured Resource Management Scheme for Ahns Using LR-KMA and WD-BMO
Available online: 03 October 2024More LessIntroduction A critical technique that provides quality service for users by solving the conflicts between severe spectrum scarcity and the explosive growth of traffic is Cognitive Radio Ad Hoc Networks (CRAHNs). Nevertheless, a critical challenge is the coexistence of primary and secondary users for reasonable resource allocation to satisfy system performance. Many approaches have been developed to allocate resources efficien Read More
-
-
-
One Pseudo-satellite/GNSS Combined Indoor and Outdoor Fusion Positioning Method Based on Carrier Phase Measurement
Authors: Xiaobo Zhao, Ronghua Hao and Xuefei BaiAvailable online: 25 September 2024More LessBackground In order to realize seamless indoor and outdoor positioning, the positioning results of multiple positioning methods are taken into consideration, and a seamless indoor and outdoor positioning method that ignores the differences in indoor and outdoor environments is required now. Objective The implementation of Pseudo satellite/GNSS combined indoor and outdoor fusion positioning for seamless indoor and ou Read More
-
-
-
Flood Mapping and Damage Analysis Using Multispectral Sentinel-2 Satellite Imagery and Machine Learning Techniques
Authors: Rashmi Saini, Shivam Rawat, Suraj Singh and Prabhakar SemwalAvailable online: 15 July 2024More LessBackground Floods are among the deadliest natural calamities, devastating ecosystems and human lives worldwide. In India, Bihar is a state grappling with economic hardships and faces severe agricultural devastation due to recurring floods, destroying crops and natural resources, which significantly impacts local farmers. This research addresses the critical need to deeply understand the flood dynamics of selected study Read More
-