Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Phrase-level emotion intensity detection of text using lexicon-based unit circle and pipelined neural networks approaches
Neural Computing and Applications (NCAA), Volume 37, Issue 5Pages 3151–3166https://doi.org/10.1007/s00521-024-10786-yAbstractEmotions have a significant impact on how people make decisions. Due to its potential applications in various fields, emotion intensity detection has attracted a lot of attention recently. Several methods have been proposed in the past using ...
- articleFebruary 2024
Intrusion Detection System: A Comparative Study of Machine Learning-Based IDS
Journal of Database Management (JDBM), Volume 35, Issue 1Pages 1–25https://doi.org/10.4018/JDM.338276The use of encrypted data, the diversity of new protocols, and the surge in the number of malicious activities worldwide have posed new challenges for intrusion detection systems (IDS). In this scenario, existing signature-based IDS are not performing ...
- research-articleNovember 2023
An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 28, Issue 5Pages 4667–4679https://doi.org/10.1007/s00500-023-09386-0AbstractToday, more than ever, the necessity for remote availability, independent of a client’s location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a few of the wireless technologies that have facilitated the ...
- research-articleDecember 2023
Multi-modal for Energy Optimization and Intrusion Detection in Wireless Sensor Networks
Wireless Personal Communications: An International Journal (WPCO), Volume 133, Issue 1Pages 289–321https://doi.org/10.1007/s11277-023-10768-8AbstractWireless sensor networks can support much more innovation than ad hoc wireless networks (AHW). For an ad hoc wireless network to work, it needs to have enough processing power, storage space, and battery life. Because they are open, don’t have ...
- research-articleAugust 2023
An Effective Biomedical Named Entity Recognition by Handling Imbalanced Data Sets Using Deep Learning and Rule-Based Methods
AbstractBiomedical named entity recognition (Bio-NER) is an important and fundamental task for biomedical text mining. Bio-NER has various applications, especially in Natural Language Processing, and its performance heavily impacts dependent tasks. ...
-
- review-articleJuly 2023
Techniques, Answers, and Real-World UAV Implementations for Precision Farming
Wireless Personal Communications: An International Journal (WPCO), Volume 131, Issue 4Pages 2715–2746https://doi.org/10.1007/s11277-023-10577-zAbstractIn adopting state-of-the-art technologies, a domain known in time is Agriculture for fertility optimization, expense saving, assistance, and environmental safeguard. In this aspect, deploying UAVs remains a modern example in the Agriculture sector,...
- research-articleJune 2023
Energy-Efficient Void Size Adaptable Graded Greedy Gradient Approach to Bypass Holes in Wireless Sensor Network
Wireless Personal Communications: An International Journal (WPCO), Volume 131, Issue 3Pages 2269–2294https://doi.org/10.1007/s11277-023-10541-xAbstractThe void region inside the wireless network can be of different sizes, i.e., small, medium, and large. Most states of art void bypassing techniques do not consider the hole size as a parameter while circumventing it. The proposed Graded Greedy ...
- research-articleJanuary 2023
An Effective Implementation of Detection and Retrieval Property of Episodic Memory
ICAAI '22: Proceedings of the 6th International Conference on Advances in Artificial IntelligencePages 147–153https://doi.org/10.1145/3571560.3571582A deep understanding of the brain can lead to significant breakthroughs in Artificial Intelligence. Many researchers concentrate their efforts on simulating the human mind to comprehend its complexities better. With the intention of better ...
- research-articleJuly 2022
Internet of Low-Altitude UAVs (IoLoUA): a methodical modeling on integration of Internet of “Things” with “UAV” possibilities and tests
Artificial Intelligence Review (ARTR), Volume 56, Issue 3Pages 2279–2324https://doi.org/10.1007/s10462-022-10225-1AbstractEvidence of the IoT is expanding the number of connected devices, including UAVs. UAVs overcome the flaws in the physical IoT infrastructure already in place. Low-altitude views are expected to be dominant swiftly in urban areas. In a short period ...
- short-paperMarch 2022
A seamless second-factor verification as a mobility-service for future commute stations
HotMobile '22: Proceedings of the 23rd Annual International Workshop on Mobile Computing Systems and ApplicationsPages 48–53https://doi.org/10.1145/3508396.3512885Mass mobility services that facilitate simultaneous movement of several passengers by means of a bus or shared cabs, are becoming commonplace in several countries today. The main challenge faced by companies offering such services is the verification of ...
- research-articleNovember 2021
Edge Enhancement by Noise Suppression in HSI Color Model of UAV Video with Adaptive Thresholding
Wireless Personal Communications: An International Journal (WPCO), Volume 124, Issue 1Pages 163–186https://doi.org/10.1007/s11277-021-09334-xAbstractUAV video often suffers from noise, blurred edges, fewer details. Quality improvement is essential by noise suppression with an enhancement of edges. Edge detection algorithms for the correct classification of an object and identification have ...
- posterJune 2021
AgriAuth: sensor collaboration and corroboration for data confidence in smart farms
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 383–385https://doi.org/10.1145/3448300.3468260This paper envisions cyber-farm systems along the lines of cyber-physical systems. It is imperative for corporates and nations to maintain health of the crops to ensure food security. In order to avoid any adversarial attack on agriculture sensors in ...
- research-articleJune 2021
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityPages 447–461https://doi.org/10.1145/3433210.3453084Second factor (2FA) or passwordless authentication based on notifications pushed to a user's personal device (e.g., a phone) that the user can simply approve (or deny) has become widely popular due to its convenience. In this paper, we show that the ...
- research-articleApril 2021
Fuel Consumption and Delay Aware Traffic Scheduling in Vanet Environment
Wireless Personal Communications: An International Journal (WPCO), Volume 117, Issue 4Pages 3173–3191https://doi.org/10.1007/s11277-020-07799-wAbstractIncreased vehicle traffic rate leads to higher waiting time, which would cause increased fuel consumption. Existing work 3-phase fuzzy-decision tree model attempts to make decision regarding traffic management quickly. Delay in data communication ...
- research-articleSeptember 2020
EarSense: earphones as a teeth activity sensor
MobiCom '20: Proceedings of the 26th Annual International Conference on Mobile Computing and NetworkingArticle No.: 40, Pages 1–13https://doi.org/10.1145/3372224.3419197This paper finds that actions of the teeth, namely tapping and sliding, produce vibrations in the jaw and skull. These vibrations are strong enough to propagate to the edge of the face and produce vibratory signals at an earphone. By re-tasking the ...
- posterJuly 2020
AnaMPhy: anonymity assisted secret key refreshment
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 351–352https://doi.org/10.1145/3395351.3401704This work is motivated by the fact that the secret key generation and refreshment of the key at the physical layer, based on randomness from reciprocity in the wireless channel, is challenged by little variations in the channel, particularly in an ...
- research-articleJuly 2020
Process skew: fingerprinting the process for anomaly detection in industrial control systems
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 219–230https://doi.org/10.1145/3395351.3399364In an Industrial Control System (ICS), its complex network of sensors, actuators and controllers have raised security concerns. In this paper, we proposed a technique called Process Skew that uses the small deviations in the ICS process (herein called ...
- research-articleFebruary 2020
STEAR: Robust Step Counting from Earables
EarComp'19: Proceedings of the 1st International Workshop on Earable ComputingPages 36–41https://doi.org/10.1145/3345615.3361133This paper shows that inertial measurement units (IMUs) inside earphones offer a clear advantage in counting the number of steps a user has walked. While step-count has been extensively studied in the mobile computing community, there is wide consensus ...
- articleJuly 2019
Multi-Objective Materialized View Selection Using Improved Strength Pareto Evolutionary Algorithm
International Journal of Artificial Intelligence and Machine Learning (IJAIML), Volume 9, Issue 2Pages 1–21https://doi.org/10.4018/IJAIML.2019070101A data warehouse system uses materialized views extensively in order to speedily tackle analytical queries. Considering that all possible views cannot be materialized due to maintenance cost and storage constraints, the selection of an appropriate set ...