Autonomous vehicles and intelligent automation: Applications, challenges, and opportunities
Intelligent Automation (IA) in automobiles combines robotic process automation and artificial
intelligence, allowing digital transformation in autonomous vehicles. IA can completely …
intelligence, allowing digital transformation in autonomous vehicles. IA can completely …
Blockchain-based solutions supporting reliable healthcare for fog computing and Internet of medical things (IoMT) integration
The Internet of Things (IoT) has radically transformed how patient information and
healthcare monitoring are monitored and recorded and has revolutionized the area by …
healthcare monitoring are monitored and recorded and has revolutionized the area by …
Energy efficient clustering protocol for FANETS using moth flame optimization
FANET (flying ad-hoc networks) is currently a trending research topic. Unmanned aerial
vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due …
vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due …
Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey
The industrial internet of things (IIoT) is an evolutionary extension of the traditional Internet of
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …
Wildfire monitoring based on energy efficient clustering approach for FANETS
Forest fires are a significant threat to the ecological system's stability. Several attempts have
been made to detect forest fires using a variety of approaches, including optical fire sensors …
been made to detect forest fires using a variety of approaches, including optical fire sensors …
Unbalanced credit card fraud detection data: a machine learning-oriented comparative study of balancing techniques
The number of individuals who use credit cards has increased dramatically in recent
decades, as has the volume of credit card fraud transactions. Consequently, banks and …
decades, as has the volume of credit card fraud transactions. Consequently, banks and …
Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
RF Mansour - Scientific Reports, 2022 - nature.com
Cyber physical system (CPS) is a network of cyber and physical elements, which interact
with one another in a feedback form. CPS approves critical infrastructure and is treated as …
with one another in a feedback form. CPS approves critical infrastructure and is treated as …
Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey
Identity Management System (IDMS) refers to how users or individuals are identified and
authorized to use organizational systems and services. Since traditional identity …
authorized to use organizational systems and services. Since traditional identity …
Evolution of Blockchain and consensus mechanisms & its real-world applications
Abstract Distributed Ledger Technology (DLT) and blockchain are two terms that have been
used interchangeably for the longest of time ever since the concept of the bitcoin …
used interchangeably for the longest of time ever since the concept of the bitcoin …
Land registry framework based on self-sovereign identity (SSI) for environmental sustainability
Providing a system user with a unique and secure identity is a prerequisite for authentication
and authorization aspects of a security system. It is generally understood that the existing …
and authorization aspects of a security system. It is generally understood that the existing …