A survey on technologies and security protocols: Reference for future generation IoT

R Yugha, S Chithra - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Internet of Things (IoT) is the recent and growing which is inevitable in day-to-day
activities in current life. IoT is the network of systems which interconnect various real world …

Consolidated modeling and prediction of heat transfer coefficients for saturated flow boiling in mini/micro-channels using machine learning methods

A Bard, Y Qiu, CR Kharangate, R French - Applied Thermal Engineering, 2022 - Elsevier
Flow boiling has become a reliable mode of compensating with larger power densities and
greater functions of devices because it is able to utilize both the latent and sensible heat …

[HTML][HTML] Identification of smartwatch-collected lifelog variables affecting body mass index in middle-aged people using regression machine learning algorithms and …

J Kim, J Lee, M Park - Applied Sciences, 2022 - mdpi.com
Body mass index (BMI) plays a vital role in determining the health of middle-aged people,
and a high BMI is associated with various chronic diseases. This study aims to identify …

Proactive maintenance of small wind turbines using IoT and machine learning models

Y Selvaraj, C Selvaraj - International Journal of Green Energy, 2022 - Taylor & Francis
Wind is one of the most important natural resources from which we can generate power
through wind turbines, Presently the wind turbines may be small or large but the output …

Investigating spatial correlations between land use and pedestrian injury severity in crashes occurring away from intersections in northwest Florida

M Koloushani, A Karaer… - Transportation …, 2022 - journals.sagepub.com
Roadway crashes are an increasing concern worldwide, and pedestrians are among the
most vulnerable road users because of several special characteristics, including their …

SQL injection vulnerability detection using deep learning: a feature-based approach

MM Hassan, RB Ahmad… - Indonesian Journal of …, 2021 - section.iaesonline.com
SQL injection (SQLi), a well-known exploitation technique, is a serious risk factor for
database-driven web applications that are used to manage the core business functions of …

Optimal feature subset deduction based on possibilistic feature quality classification and feature complementarity

M Medhioub, SA Bouhamed, IK Kallel, N Derbel… - Expert Systems with …, 2024 - Elsevier
Data quality estimation has become an important research axis in applications when
defining useful information is required. Determining useful information is an essential task in …

[HTML][HTML] Older Adults' concerns regarding Hurricane-Induced evacuations during COVID-19: Questionnaire findings

M Koloushani, M Ghorbanzadeh, N Gray… - Transportation research …, 2022 - Elsevier
The COVID-19 pandemic has drastically affected our day-to-day life in the last few years.
This problem becomes even more challenging when older adults are considered due to …

[HTML][HTML] Application of deep learning and feature selection technique on external root resorption identification on CBCT images

NH Reduwan, AA Abdul Aziz, R Mohd Razi… - BMC Oral Health, 2024 - Springer
Background Artificial intelligence has been proven to improve the identification of various
maxillofacial lesions. The aim of the current study is two-fold: to assess the performance of …

An optimal higher order likelihood distribution based approach for strong edge and high contrast restoration

L Zhou, A Dhaka, H Malik, A Nandal, S Singh… - IEEE Access, 2021 - ieeexplore.ieee.org
The existing studies are generally focused on the pixel intensity or noise variance, and not
much attention is given to describe the actual distribution. Some modifications have been …