An improved deep reinforcement learning routing technique for collision-free VANET

P Upadhyay, V Marriboina, SJ Goyal, S Kumar… - Scientific Reports, 2023 - nature.com
Abstract Vehicular Adhoc Networks (VANETs) is an emerging field that employs a wireless
local area network (WLAN) characterized by an ad-hoc topology. Vehicular Ad Hoc …

Boosted barnacles algorithm optimizer: Comprehensive analysis for social IoT applications

MAA Al-Qaness, AA Ewees, M Abd Elaziz… - IEEE …, 2023 - ieeexplore.ieee.org
The Social Internet of Things (SIoT) has revolutionized user experience through various
applications and networking services like Social Health Monitoring, Social Assistance …

Advanced set containment deep learned Rabin certificateless signcryption for secured transmission with big data in cloud

G Sakthivel, P Madhubala - Concurrency and Computation …, 2024 - Wiley Online Library
Cloud computing is distributed type of technology to offers distant services by the internet to
manage, access, and store data on their server. The cloud server manages and distributes …

Optimize a novel Integrated Solutions to analyses Privacy persevering of the Internet of Things

AK Mishra, N Tripathi, P Bagla… - 2023 6th …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) develops a global network of interconnected items or things that will
play a significant part in Future Internet (FI). For the IoT to be extensively accepted by …

PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment

ZA Mohammed, KA Hussein - Security and Privacy, 2024 - Wiley Online Library
Modern technologies of computing cloud are showing great promise, but at the same time
create new security challenges that hinder full acceptance. Given that most of these services …

[PDF][PDF] Privacy Security System for Video Data Transmission in Edge-Fog-cloud Environment.

EK Gbashi, AT Maolood, YN Jurn - International Journal of Intelligent …, 2023 - inass.org
Fog computing is an efficient paradigm to diminish latency and congestion of networks, in
which the applications and data are no longer deployed in the cloud alone. Alternatively, the …

Utilizing digital twins and hybrid modeling to achieve efficient supply chain in hybrid production systems

Y Gong, P Zhang - The International Journal of Advanced Manufacturing …, 2024 - Springer
In today's rapidly changing manufacturing environment, efficient supply chain management
is a key factor in enhancing a company's competitiveness. Traditional supply chain …

Analysis and Implementation of Disease Detection in Leafs and Fruit Using Image Processing and Machine Learning

M Singh, S Ayuub, A Baronia, D Soni - SN Computer Science, 2023 - Springer
The purpose of this study is to examine how different image processing techniques may be
used to identify leaf disease. To identify and classify plant leaf diseases, different algorithms …

A Novel Optimization Approach for Energy-Efficient Multiple Workflow Scheduling in Cloud Environment.

A Aggarwal, S Kumar, A Bhansali… - … Systems Science & …, 2024 - search.ebscohost.com
Existing multiple workflow scheduling techniques focus on traditional Quality of Service
(QoS) parameters such as cost, deadline, and makespan to find optimal solutions by …

An Artificial Intelligence based Authentication Mechanism for Wireless Sensor Networks using Blockchain

S Devi, A Kumar - Computer Integrated Manufacturing Systems, 2023 - cims-journal.net
Blockchain Networks (BNs) are widely used in a variety of applications around the globe. BN
exchange data and information using various inter-network and intra-network protocols. This …