Eagle strategy arithmetic optimisation algorithm with optimal deep convolutional forest based fintech application for hyper-automation

P Mohan, S Neelakandan, A Mardani… - Enterprise Information …, 2023 - Taylor & Francis
Hyper automation is the group of approaches and software companies utilised to automate
manual procedures. Financial Technology (FinTech) was processed as a distinctive …

[PDF][PDF] A fuzzy logic and DEEC protocol-based clustering routing method for wireless sensor networks

N Subramani, A Mardani, AR Mishra, P Ezhumalai - AIMS Math, 2023 - aimspress.com
A fuzzy logic and DEEC protocol-based clustering routing method for wireless sensor
networks Page 1 AIMS Mathematics, 8(4): 8310–8331. DOI: 10.3934/math.2023419 …

[HTML][HTML] Design of metaheuristic optimization with deep-learning-assisted solar-operated on-board smart charging station for mass transport passenger vehicle

S Justin, W Saleh, MMA Lashin, HM Albalawi - Sustainability, 2023 - mdpi.com
Electric vehicles (EVs) have become popular in reducing the negative impact of ICE
automobiles on the environment. EVs have been predicted to be an important mode of mass …

[HTML][HTML] Generative Adversarial Networks (GAN) and HDFS-Based Realtime Traffic Forecasting System Using CCTV Surveillance

P Devadhas Sujakumari, P Dassan - Symmetry, 2023 - mdpi.com
The most crucial component of any smart city traffic management system is traffic flow
prediction. It can assist a driver in selecting the most efficient route to their destination. The …

Performance enhancement of unsupervised hardware trojan detection algorithm using clustering-based local outlier factor technique for design security

S Meenakshi - … IEEE International Test Conference India (ITC …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) has become extremely prominent for industrial applications and
stealthy modification deliberately done by insertion of Hardware Trojans has increased …

Artificial Neural Network (ANN) With Chan-Vese (CV) Algorithm-Based Plant Disease Detection And Classification

A Mayuri, V Rashmi, B Das, A Mandal… - 2023 International …, 2023 - ieeexplore.ieee.org
A country's economy is influenced by a wide range of factors, with the agriculture, service,
and food processing sectors. In our country, agriculture is one of the most significant …

[PDF][PDF] Intelligent Fish Behavior Classification Using Modified Invasive Weed Optimization with Ensemble Fusion Model.

BK Samhitha, R Subhashini - Intelligent Automation & Soft …, 2023 - cdn.techscience.cn
Accurate and rapid detection of fish behaviors is critical to perceive health and welfare by
allowing farmers to make informed management decisions about recirculating the …

Generating key-dependent involutory MDS matrices through permutations, direct exponentiation, and scalar multiplication

TT Luong, HD Linh - International Journal of Information …, 2024 - inderscienceonline.com
Block ciphers are a crucial type of cryptographic algorithm being used to ensure information
security for many applications today. However, there are numerous potential active attacks …

Enhanced Hardware Trojan Detection in Chips by Reducing Linearity Between Features

A Moussa - 2023 - search.proquest.com
Globally, there has been an increase in demand for System on Chip (SoC) applications,
active medical implants, and Internet of Things (IoT) devices. However, due to challenges in …