The rise of blockchain internet of things (biot): Secured, device-to-device architecture and simulation scenarios

A Rana, S Sharma, K Nisar, AAA Ibrahim, S Dhawan… - Applied Sciences, 2022 - mdpi.com
Most Internet of Things (IoT) resources are exposed to security risks due to their essential
functionality. IoT devices, such as smartphones and tablets, have a limited network …

Review and potential for artificial intelligence in healthcare

L Sun, RK Gupta, A Sharma - International Journal of System Assurance …, 2022 - Springer
In the medical image analysis, recognition of tumor in brain is very important task and it
leads cancer which should be diagnosed at early stage. It is an irregular cell population in …

Development of image recognition software based on artificial intelligence algorithm for the efficient sorting of apple fruit

M Yang, P Kumar, J Bhola, M Shabaz - International Journal of System …, 2022 - Springer
Manual sorting of fruits was considered as a significant challenging for agricultural sector as
it is a laborious task and may also lead to inconsistency in the classification. In order to …

Experimental, computational analysis of Butein and Lanceoletin for natural dye-sensitized solar cells and stabilizing efficiency by IoT

M Bradha, N Balakrishnan, A Suvitha… - Environment …, 2021 - Springer
The thoughtful implementation of Internet of Things (IoT) expertise to sustainable progress in
environment friendly renewable energy sector is significant for future energy conversion …

A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …

Research on image text recognition based on canny edge detection algorithm and k-means algorithm

F Wu, C Zhu, J Xu, MW Bhatt, A Sharma - International Journal of System …, 2022 - Springer
The latest research in the field of recognition of image characters has led to various
developments in the modern technological works for the improvement of recognition rate …

A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques

IQ Abduljaleel, ZA Abduljabbar, MA Al Sibahee… - Journal of Sensor and …, 2022 - mdpi.com
Data security can involve embedding hidden images, text, audio, or video files within other
media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …

Intelligent intrusion detection for internet of things security: A deep convolutional generative adversarial network-enabled approach

Y Wu, L Nie, S Wang, Z Ning, S Li - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With the rapid advance of Internet of Things (IoT), it is difficult for cloud-centric computing to
meet the requirements of low latency and ease of use. As an open and distributed system …

Breast cancer detection using particle swarm optimization and decision tree machine learning technique

JO Afolayan, MO Adebiyi, MO Arowolo… - Intelligent Healthcare …, 2022 - Springer
Cancer of the breast is one of the deadliest diseases encountered by women and requires
early diagnosis. Although more time is required for the traditional diagnostic process, a …

Internet of medical things-based secure and energy-efficient framework for health care

A Rana, C Chakraborty, S Sharma, S Dhawan, SK Pani… - Big Data, 2022 - liebertpub.com
The Internet of Medical Things (IoMT) is a collection of medical equipment and software that
can help patients get better care. The purpose of this study is to improve the security of data …