[HTML][HTML] Graph convolution networks for social media trolls detection use deep feature extraction

M Asif, M Al-Razgan, YA Ali, L Yunrong - Journal of Cloud Computing, 2024 - Springer
This study presents a novel approach to identifying trolls and toxic content on social media
using deep learning. We developed a machine-learning model capable of detecting toxic …

B-LPoET: A middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading …

AA Khan, S Dhabi, J Yang, W Alhakami… - Computers and …, 2024 - Elsevier
A private permissioned chain is typically considered a fully protected authorized blockchain.
The concept of a permissioned chain has become better single-entity control operation over …

BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy

F Mehmood, AA Khan, H Wang, S Karim… - Computer Standards & …, 2025 - Elsevier
An examination of different distributed real-time applications operating on the blockchain
platform is conducted. These applications can be broadly classified into three types …

Generative Adversarial-Based Ubiquitous Data Integration Model for Human Re-Identification

M Shabaz, M Soni - Journal of Computational and Cognitive …, 2022 - ojs.bonviewpress.com
Person re-identification is a crucial field in computer vision with significant challenges,
including illumination, occlusion, pose variation, and feature variation in complex …

[PDF][PDF] Cloud-Based Solutions for Small Business Management: Integrating Blockchain, AI, and Social Media Automation

T Graepel - 2022 - researchgate.net
In today's dynamic business landscape, small businesses seek innovative solutions to
streamline operations and enhance competitiveness. This paper explores the integration of …