Unveiling the potential of NOMA: A journey to next generation multiple access

A Ahmed, W **ngfu, A Hawbani, W Yuan… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The revolutionary sixth-generation wireless communications technologies and applications,
notably digital twin networks (DTN), connected autonomous vehicles (CAVs), space-air …

DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)

S Ur Rehman, M Khaliq, SI Imtiaz, A Rasool… - Future Generation …, 2021 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks can put the communication networks
in instability by throwing malicious traffic and requests in bulk over the network. Computer …

[HTML][HTML] Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things

D Ngabo, D Wang, C Iwendi, JH Anajemba, LA Ajao… - Electronics, 2021 - mdpi.com
The recent developments in fog computing architecture and cloud of things (CoT)
technology includes data mining management and artificial intelligence operations …

A multimodal facial cues based engagement detection system in e-learning context using deep learning approach

S Gupta, P Kumar, R Tekchandani - Multimedia Tools and Applications, 2023 - Springer
Due to the COVID-19 crisis, the education sector has been shifted to a virtual environment.
Monitoring the engagement level and providing regular feedback during e-classes is one of …

Healthcare data security using IoT sensors based on random hashing mechanism

AO Khadidos, S Shitharth, AO Khadidos… - Journal of …, 2022 - Wiley Online Library
Providing security to the healthcare data stored in an IoT‐cloud environment is one of the
most challenging and demanding tasks in recent days. Because the IoT‐cloud framework is …

[PDF][PDF] Advanced approach for encryption using advanced encryption standard with chaotic map

Y Alemami, MA Mohamed, S Atiewi - Int. J. Electr. Comput. Eng, 2023 - researchgate.net
At present, security is significant for individuals and organizations. All information need
security to prevent theft, leakage, alteration. Security must be guaranteed by applying some …

Pp-spa: privacy preserved smartphone-based personal assistant to improve routine life functioning of cognitive impaired individuals

AR Javed, MU Sarwar, S ur Rehman, HU Khan… - Neural Processing …, 2023 - Springer
Mobile ubiquitous computing has not only enriched human comfort but also has a deep
impact on changing standards of human daily life. Modern inventions can be even more …

Blockchain-secured recommender system for special need patients using deep learning

EA Mantey, C Zhou, JH Anajemba… - Frontiers in Public …, 2021 - frontiersin.org
Recommender systems offer several advantages to hospital data management units and
patients with special needs. These systems are more dependent on the extreme subtle …

Machine learning applications for the prediction of bone cement leakage in percutaneous vertebroplasty

W Li, J Wang, W Liu, C Xu, W Li, K Zhang… - Frontiers in public …, 2021 - frontiersin.org
Background: Bone cement leakage is a common complication of percutaneous
vertebroplasty and it could be life-threatening to some extent. The aim of this study was to …

An efficient quality of services based wireless sensor network for anomaly detection using soft computing approaches

M Mittal, M Kobielnik, S Gupta, X Cheng… - Journal of Cloud …, 2022 - Springer
Wireless sensor network (WSN) is widely acceptable communication network where human-
intervention is less. Another prominent factors are cheap in cost and covers huge area of …