Autonomous vehicles and intelligent automation: Applications, challenges, and opportunities

G Bathla, K Bhadane, RK Singh… - Mobile Information …, 2022 - Wiley Online Library
Intelligent Automation (IA) in automobiles combines robotic process automation and artificial
intelligence, allowing digital transformation in autonomous vehicles. IA can completely …

Blockchain-based solutions supporting reliable healthcare for fog computing and Internet of medical things (IoMT) integration

S Alam, M Shuaib, S Ahmad, DNK Jayakody… - Sustainability, 2022 - mdpi.com
The Internet of Things (IoT) has radically transformed how patient information and
healthcare monitoring are monitored and recorded and has revolutionized the area by …

Energy efficient clustering protocol for FANETS using moth flame optimization

S Bharany, S Sharma, S Bhatia, MKI Rahmani… - Sustainability, 2022 - mdpi.com
FANET (flying ad-hoc networks) is currently a trending research topic. Unmanned aerial
vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due …

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey

S Ali, Q Li, A Yousafzai - Ad Hoc Networks, 2024 - Elsevier
The industrial internet of things (IIoT) is an evolutionary extension of the traditional Internet of
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …

Wildfire monitoring based on energy efficient clustering approach for FANETS

S Bharany, S Sharma, J Frnda, M Shuaib, MI Khalid… - Drones, 2022 - mdpi.com
Forest fires are a significant threat to the ecological system's stability. Several attempts have
been made to detect forest fires using a variety of approaches, including optical fire sensors …

Unbalanced credit card fraud detection data: a machine learning-oriented comparative study of balancing techniques

P Gupta, A Varshney, MR Khan, R Ahmed… - Procedia Computer …, 2023 - Elsevier
The number of individuals who use credit cards has increased dramatically in recent
decades, as has the volume of credit card fraud transactions. Consequently, banks and …

Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment

RF Mansour - Scientific Reports, 2022 - nature.com
Cyber physical system (CPS) is a network of cyber and physical elements, which interact
with one another in a feedback form. CPS approves critical infrastructure and is treated as …

Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey

MR Ahmed, AKMM Islam, S Shatabda, S Islam - IEEE Access, 2022 - ieeexplore.ieee.org
Identity Management System (IDMS) refers to how users or individuals are identified and
authorized to use organizational systems and services. Since traditional identity …

Evolution of Blockchain and consensus mechanisms & its real-world applications

AS Yadav, N Singh, DS Kushwaha - Multimedia Tools and Applications, 2023 - Springer
Abstract Distributed Ledger Technology (DLT) and blockchain are two terms that have been
used interchangeably for the longest of time ever since the concept of the bitcoin …

Land registry framework based on self-sovereign identity (SSI) for environmental sustainability

M Shuaib, NH Hassan, S Usman, S Alam, S Bhatia… - Sustainability, 2022 - mdpi.com
Providing a system user with a unique and secure identity is a prerequisite for authentication
and authorization aspects of a security system. It is generally understood that the existing …