Research Article Adaptive intrusion detection framework for enhanced cloud security in fog and edge computing environments
K. Vani and S. P. Swornambiga
1613 -1640
132
Research Article A novel phishing detection model using PolyScore feature evaluator and enhanced soft voting ensemble
Swetha C.V. , Sibi Shaji and B. Meenakshi Sundaram
1641 -1663
69
Research Article Quantum prioritized experience replay with MaDi-based priority and quantum circuit mechanisms for optimizing reinforcement learning
R. Palanivel and P. Muthulakshmi
1664 -1680
54
Research Article Robust facial recognition using deep learning and modified whale optimization algorithm for biometric authentication
M. Leelavathi and D. Kannan
1681 -1698
39
Research Article Automated liver image segmentation using entropy-based thresholding and median filtering
Sangeeta K Siri, Sudha M S, Baby H T, Pramod Kumar S, Pradeepa S C and Abhijith N
1699 -1713
38
Research Article Enhancing cybersecurity awareness through mobile learning: a study on vocational accounting and finance students
Fivia Eliza, Radinal Fadli, Yayuk Hidayah, Herman Dwi Surjono and Ratna Candra Sari
1714 -1731
33
Research Article Enhancing Arabic fake news detection with a hybrid MLP-SVM approach and Doc2Vec embeddings
Noralhuda Alabid and Hawraa Ali Taher
1732 -1746
26
Research Article Lip2Voice: a sequence-to-sequence visual speech recognition system for predicting speech from silent video inputs
Aathira Pillai, Bhavana Mache and Supriya Kelkar
1747 -1767
17
Research Article Advancing urban transportation planning: a comparative analysis of machine learning and conventional regression-based trip generation models
Anish Kumar, Amit Kumar and Sanjeev Sinha
1768 -1783
36
Research Article Experimental testing and numerical modeling of fatigue and mechanical properties of composite materials for partial foot prostheses
Sarah A. Hamood, Saif M. Abbas and Aseel Ghazwan
1784 -1799