Applications of artificial intelligence in engineering and manufacturing: A systematic review

IK Nti, AF Adekoya, BA Weyori… - Journal of Intelligent …, 2022 - Springer
Engineering and manufacturing processes and systems designs involve many challenges,
such as dynamism, chaotic behaviours, and complexity. Of late, the arrival of big data, high …

Homomorphic federated learning schemes enabled pedestrian and vehicle detection system

MA Mohammed, A Lakhan, KH Abdulkareem… - Internet of Things, 2023 - Elsevier
Intelligent transport systems are increasingly being used in practice these days. Fog nodes
and cloud servers collect real-time pedestrian and vehicle data and train them based on …

[PDF][PDF] Joint cryptography and channel-coding based on low-density parity-check codes and advanced encryption standard for 5g systems

L Coulibaly, F Ouallouche… - International Journal of …, 2021 - pdfs.semanticscholar.org
Security and reliability issues have always been a big challenge in digital communications.
With the emerging 5G technologies, new requirements are introduced where latency …

[PDF][PDF] Data security using random dynamic salting and AES based on master-slave keys for Iraqi dam management system

HJ Ali, TM Jawad, H Zuhair - Indonesian Journal of Electrical …, 2021 - researchgate.net
In the present time, dam management is considered one of the important challenges for e-
government in Iraq, becuase it needs information technology infrastructure, data integrity …

[PDF][PDF] A fraud prevention and secure cognitive SIM card registration model

ON Boateng, B Nkrumah… - Indian Journal …, 2022 - sciresol.s3.us-east-2.amazonaws …
Background: Most subscriber identification module (SIM) which usually finds their way to
mobile phone users are primarily unregistered or pre-registered. Criminals buy these SIM …

A novel classical and quantum cryptographic scheme for data encryption

P Nimbe, BA Weyori, AF Adekoya - International Journal of Theoretical …, 2022 - Springer
The protection of data is essential in this digitized world and hence the need for
cryptographic techniques to aid in this process. Cryptography in general helps achieve three …

[PDF][PDF] Multi-level attack with dynamic s-box variable key pattern generation for key cohort using AES.

AP Rajendran, DK Sadhasivam - Int. Arab J. Inf. Technol., 2023 - iajit.org
In recent times, data transmission in electronic medium is found to be more susceptible to
several attacks. The study aims to control the multi-level attacks in encryption and decryption …

On the performance of AES algorithm variants

MN Alenezi, H Alabdulrazzaq… - … of Information and …, 2024 - inderscienceonline.com
Advanced encryption standard (AES) is frequently used to encrypt data transmission over
the internet since it is not prone to practical attacks. Many variants of AES exist with different …

An Algorithm for Color-Based Password Authentication to Increase Security Level

SR Selamat, SY Cai, NH Hassan… - Innovation in Research of …, 2024 - jurnal.unsil.ac.id
Security level in authentication is essential to decrease the possibility of an account being
guessed. Several authentication methods are widely used nowadays, covering digital …

[PDF][PDF] Using LSB steganography technique and 256 bits key length AES algorithm for high secured information hiding

E Gyamfi, IK Nti, J Aning - International Journal, 2017 - researchgate.net
Networking of computer and information communication and technology (ICT) devices, gives
a better and an efficient medium for information and data shearing around the globe, among …