A novel trust-based security and privacy model for internet of vehicles using encryption and steganography

MS Rathore, M Poongodi, P Saurabh… - Computers and …, 2022 - Elsevier
High-speed wireless network technologies play a vital role in autonomous vehicle
communication systems (AVS), ie, IoV (Internet of Vehicles), and enhance the effectiveness …

Efficient prioritization and processor selection schemes for heft algorithm: A makespan optimizer for task scheduling in cloud environment

S Gupta, S Iyer, G Agarwal, P Manoharan, AD Algarni… - Electronics, 2022 - mdpi.com
Cloud computing is one of the most commonly used infrastructures for carrying out activities
using virtual machines known as processing units. One of the most fundamental issues with …

SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising

P Manoharan, R Walia, C Iwendi, TA Ahanger… - Expert …, 2023 - Wiley Online Library
Abstract Machine learning are vulnerable to the threats. The Intruders can utilize the
malicious nature of the nodes to attack the training dataset to worsen the process and …

[HTML][HTML] Social network user profiling with multilayer semantic modeling using ego network

K Balasubramaniam, S Vidhya… - International Journal of …, 2022 - igi-global.com
Social and information networks undermine the real relationship between the individuals
(ego) and the friends (alters) they are connected with on social media. The structure of …

[HTML][HTML] Autonomous transaction model for e-commerce management using blockchain technology

S Sekar, A Solayappan, J Srimathi, S Raja… - International Journal of …, 2022 - igi-global.com
A blockchain is an advanced technology that can power over a decentralized network. The
authors bring it up to design the autonomous transaction system for e-commerce …

Social network analysis for precise friend suggestion for twitter by associating multiple networks using ml

DKS Singh, N Nithya, L Rahunathan… - International Journal of …, 2022 - igi-global.com
The main aim in this paper is to create a friend suggestion algorithm that can be used to
recommend new friends to a user on Twitter when their existing friends and other details are …

Enhanced Machine learning algorithms Lightweight Ensemble Classification of Normal versus Leukemic Cel

K Sridhar, AR Yeruva, PN Renjith, A Dixit… - Journal of …, 2022 - pnrjournal.com
Leukemia is type of cancer in blood which impacts the lymphatic framework and the bone
marrow and also impacts white blood cells. Leukemia, in contrast to other types of cancer …

An Efficient Approach for Object Detection using Deep Learning

SM Patil, CM Raut, AP Pande, AR Yeruva… - Journal of …, 2022 - pnrjournal.com
Object identification is more significant application in Deep learning innovation which is
recognized by areas of strength for its element learning and component portrayal contrasted …

[HTML][HTML] Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan… - Journal of …, 2023 - journalofcloudcomputing …
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

Reinforcement learning-based approach for minimizing energy loss of driving platoon decisions

Z Gu, Z Liu, Q Wang, Q Mao, Z Shuai, Z Ma - Sensors, 2023 - mdpi.com
Reinforcement learning (RL) methods for energy saving and greening have recently
appeared in the field of autonomous driving. In inter-vehicle communication (IVC), a feasible …