A Machine Learning‐Based Big EEG Data Artifact Detection and Wavelet‐Based Removal: An Empirical Approach

S Stalin, V Roy, PK Shukla, A Zaguia… - Mathematical …, 2021 - Wiley Online Library
The electroencephalogram (EEG) signals are a big data which are frequently corrupted by
motion artifacts. As human neural diseases, diagnosis and analysis need a robust …

Optimal medical image size reduction model creation using recurrent neural network and GenPSOWVQ

C Sridhar, PK Pareek, R Kalidoss… - Journal of …, 2022 - Wiley Online Library
Medical diagnosis is always a time and a sensitive approach to proper medical treatment.
Automation systems have been developed to improve these issues. In the process of …

IntOPMICM: intelligent medical image size reduction model

PK Pareek, C Sridhar, R Kalidoss… - Journal of …, 2022 - Wiley Online Library
Due to the increasing number of medical imaging images being utilized for the diagnosis
and treatment of diseases, lossy or improper image compression has become more …

Energy‐Aware Routing Protocol with Fuzzy Logic in Industrial Internet of Things with Blockchain Technology

A Mehbodniya, JL Webber, R Rani… - Wireless …, 2022 - Wiley Online Library
It is the expansion and use of the Industrial Internet of Things (IIoT) in various industrial
sectors and applications that are referred to as the Industrial Internet of Things (IIoT). The …

Fog big data analysis for IoT sensor application using fusion deep learning

AS Rajawat, P Bedi, SB Goyal… - Mathematical …, 2021 - Wiley Online Library
The IoT sensor applications have grown in extreme numbers, generating a large amount of
data, and it requires very effective data analysis procedures. However, the different IoT …

A Novel, Efficient, and Secure Anomaly Detection Technique Using DWU‐ODBN for IoT‐Enabled Multimedia Communication Systems

M Sathya, M Jeyaselvi, L Krishnasamy… - Wireless …, 2021 - Wiley Online Library
The Internet of Things (IoT) is enhancing our lives in a variety of structures, which consists of
smarter cities, agribusiness, and e‐healthcare, among others. Even though the Internet of …

Hiding data in images using steganography techniques with compression algorithms

OF AbdelWahab, AI Hussein… - TELKOMNIKA …, 2019 - telkomnika.uad.ac.id
Steganography is the science and art of secret communication between two sides that
attempt to hide the content of the message. It is the science of embedding information into …

Securing 5G‐IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation

AS Rajawat, P Bedi, SB Goyal… - Mathematical …, 2021 - Wiley Online Library
In terms of growth, effect, and capability, the 5G‐enabled Internet of Things (IoT) is
incredible. The volume of data distributed and processed by IoT (Internet of Things) systems …

Cyber‐Internet Security Framework to Conquer Energy‐Related Attacks on the Internet of Things with Machine Learning Techniques

A Kumar, D Dhabliya, P Agarwal… - Computational …, 2022 - Wiley Online Library
The Internet of Things (IoT) ushers in a new era of communication that depends on a broad
range of things and many types of communication technologies to share information. This …

[PDF][PDF] An approach of securing data using combined cryptography and steganography

NH Rosalina - International Journal of Mathematical Sciences and …, 2020 - mecs-press.net
The recent advance in information technology field forcing us to ensure the privacy of the
digital data. It is very important to develop the method that may satisfy the needs. Many …