Research Title | MAG. TITLE | RESEARCH AREA | PUBLISH YEAR | DOI | Journal URL |
A cutting-edge intelligent cyber model for intrusion detection | Cluster Computing | Cyber security 5G networks IoT SYNFLOOD attack Simulation Machine learning | 2024 | |
Visit URL
|
An intelligent healthcare monitoring system-based novel deep learning approach for detecting covid-19 from x-rays images | Multimedia Tools and Applications | Classification · Deep learning · Intelligent diagnosing · COVID-19 · Lung disease diagnosis · Computer added diagnosis · Smart medicine | 2024 | |
Visit URL
|
Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models | Cluster Computing | Smart dermatology services Big data as a service Big data intelligence Classification Pretrained models | 2024 | |
Visit URL
|
Dimensionality reduction for off-line object recognition and detection using supervised learning | Indonesian Journal of Electrical Engineering and Computer Science | Artificial Intelligence Applications | 2024 | |
Visit URL
|
Emotion Unveiled: A Deep Learning Odyssey in Facial Expression Analysis for Intelligent HCI | International Journal of Advances in Soft Computing and its Applicationsopen access | facial emotion detection, computer vision, convolutional neu?ral network, deep learning, facial expression recognition | 2024 | |
Visit URL
|
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things | International Journal of Information Security | Cybersecurity · Cryptography · Cloud computing · Architectural model · Intelligent | 2024 | |
Visit URL
|
Optimizing risk mitigation: A simulation-based model for detecting fake IoT clients in smart city environments | Sustainable Computing: Informatics and Systems | Fake clients Smart city Internet of Thing (IoT) Machine learning (ML) CyberSecurity | 2024 | |
Visit URL
|
A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks | Multimedia Tools and Applications | Social media · Cyber attacks · Social media privacy · Computer vision in social media · Social media security · Face recognition | 2023 | |
Visit URL
|
A novel secure cryptography model for data transmission based on Rotor64 technique | Multimedia Tools and Applications | CYBER SECURITY | 2023 | |
Visit URL
|
AnIntelligent and Precise Agriculture Model in Sustainable Cities Based on Visualized Symptoms | agriculture | agriculture intelligence; precise agriculture; sustainability; predefined model; computer vision; intelligent systems | 2023 | |
Visit URL
|
Diabetes Monitoring System in Smart Health Cities Based on Big Data Intelligence | Future Internet | big data intelligence; classification; data science; deep learning; E-health; healthcare analytics; intelligent diagnosis; machine learning; diabetes prediction | 2023 | |
Visit URL
|
Exploring the Capabilities and Limitations of ChatGPT and Alternative Big Language Models | Artificial Intelligence and Applications | natural language processing, applied AI, conversational AI, machine learning, language model, ChatGPT, Google BARD, dialogue generation, intelligent systems. | 2023 | |
Visit URL
|
Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks | International Journal of Interactive Mobile Technologies (iJIM) | Network Security | 2023 | |
Visit URL
|
Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solution | International Journal of Data and Network Science | Ad hoc networks DSR AODV OLSR Routing protocols Wireless Networks and DDoS | 2023 | |
Visit URL
|
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education | Electronics | emotional intelligence; online education; deep learning; intelligent education; transfer learning; computer vision | 2022 | |
Visit URL
|
An intelligent cyber security phishing detection system using deep learning techniques | Cluster Computing | Cybersecurity and machine Learning | 2022 | |
Visit URL
|
An intelligent cybersecurity system for detecting fake news in social media websites | Soft Computing | Cybersecurity and Machine Learning | 2022 | |
Visit URL
|
Business intelligence using deep learning techniques for social media contents | Cluster Computing | Big data - Business data analytics - Machine learning - Deep learning - Social media | 2022 | |
Visit URL
|
Design of a Virtual Reality-Based Learning System for Spoken English | International Journal of Emerging Technologies in Learning | virtual reality, spoken English, remote learning system design | 2022 | |
Visit URL
|
Hybrid CLAHE-CNN Deep Neural Networks for Classifying Lung Diseases from X-ray Acquisitions | Electronics | Machine learning | 2022 | |
Visit URL
|
Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches | Multimedia Tools and Applications | Cyber security · 5G networks · Dropping attack · Simulation · Machine learning · Attack detection | 2022 | |
Visit URL
|
Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture | Cluster Computing | Artificial intelligence Machine learning Smart agriculture Neural networks Deep learning Extreme learning machine (ELM) Binary dragonfly (BDA) Image segmentation Feature extraction Plant diseases | 2021 | |
Visit URL
|
Efficient 3D medical image segmentation algorithm over a secured multimedia network | Multimedia Tools and Applications (2020) | Image segmentation · Hidden Markov Model (HMM) · Computer aided diagnosis · Multimedia networking security · Distributed systems | 2020 | |
Visit URL
|
A secure encrypted protocol for clients handshaking in the same network | International Journal of Interactive Mobile Technologies | Cyber Security | 2019 | |
Visit URL
|
Investigating the cyberbullying risk in digital media: protecting victims in school teenagers | Social Network Analysis and Mining | Computer Science: Computer Science Applications ,Computer Science: Information Systems,Social Sciences: Communication,Engineering: Media Technology | 2011 | |
Visit URL
|