- Advanced Network Technologies.- Performance Improvement for Energy-Efficient CSS with Optimized Cognitive Users over Fading Channels.- Optimizing WiMAX Network Performance with IP Security: An Evaluation of TCP and UDP Applications.- Enhancement of Security in Opportunistic Networks.- Design and Implementation of Smart Meter for Bilateral Transaction of Solar Energy.- Optimizing Task Completion Rate in Multi-User Edge Intelligence Networks through Neural Network-based Energy Management with Partitioning and Offloading.- Efficient Task Offloading in IoV using DDPG and MEC with RIS Support.- Vacation Recommendation System Using New York Times Articles.
- Analysis of Different Measures of Centrality to Identify Vital Nodes in Social Networks.- Performance Analysis of Software-Defined Network (SDN) via POX Controller Simulation in Mininet.- Simulation and Comparison of BB84 and SSP99 QKD Protocols.- IoT and Machine Learning-based Monitoring of the Growth of Crops Using Blockchain Technology.- Determining the Impact of Metallic Obstacles on Blue-tooth Transmission to enhance Indoor Location Determination.- Optimizing Crop Yield through IoT-Based Smart Irrigation with Fuzzy Control.- Fusion of Chi-square and Z-test statistics for Feature Selection with Machine Learning Techniques in Intrusion Detection.- Smart Bakery: Technology and Automation.
- An experimental study on Estimation of Reliability of a Computer Network for the network of Delhi Development Authority: A Study on Challenges, Experiment and its results, Potential Future Avenues and Significance of Ongoing Research.- An Effective Virtual Machine Allocation in Federated Cloud by PARAMR-DNN Technique.- Intrusion Watchdog: Enhancing Intrusion Detection System with Machine Learning using 3-way Feature Selection Technique.- Phishing URLs Detection Method using Hybrid Feature and Convolutional Neural Networks with Attention Mechanisms.- Exploring Multi-Attribute Selection Strategies for Effective Phishing Detection with Machine Learning.- Zero-day exploits framework of supply chain networks.- SMASK: Parallel Probabilistic Privacy-Preserving Frequent Pattern Mining Technique for Big Data.- SMAKMS_FC: Secure Mutual Authentication and Key Management Scheme for Fog Computing.
- Comparative Analysis on Network Attack Prediction Used Deep Learning Approaches on Software Security Testing.- DNA-Based Elliptic Curve Cryptography for Data Security in IoT.