-
21
-
22
-
23
Communications in electronic textile systems
Published 2017“…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
Get full text
Get full text
Get full text
conferenceObject -
24
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…In this context, emerging Deep Reinforcement Learning (DRL) techniques are expected to be one of the main enabling technologies to address the RRAM in future wireless HetNets. …”
-
25
Automated skills assessment in open surgery: A scoping review
Published 2025“…We highlight the progress in automated skills assessment during open surgery with advancements in sensor technology, and AI algorithms with high prediction accuracies. …”
-
26
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…The global evolution of wireless technologies and intelligent sensing devices are transforming the realization of smart cities. …”
Get full text
Get full text
Get full text
Get full text
article -
27
Deep Reinforcement Learning for Internet of Drones Networks: Issues and Research Directions
Published 2023“…<p dir="ltr">Internet of Drones (IoD) is one of the promising technologies to enhance the performance of wireless networks. …”
-
28
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025“…The study examines contemporary developments in AI for cybersecurity, highlighting the use of these technologies to enhance security protocols. We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …”
-
29
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…<p dir="ltr">Cybersecurity is crucial in today’s interconnected world, as digital technologies are increasingly used in various sectors. …”
-
30
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
Published 2022“…On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …”
-
31
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024“…Additionally, we explore emerging technologies, such as Federated Learning (FL) and Transfer Learning, to enhance the robustness and adaptability of IDS solutions. …”
-
32
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…The research community is currently actively involved in the design of new technologies that can enable massive device connections with the needed speeds and reliability. …”
Get full text
Get full text
Get full text
masterThesis -
33
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
Published 2022“…</p><h3>Conclusions</h3><p dir="ltr">This review is the most extensive work, to date, summarizing WDs that use ML for people with diabetes, and provides research direction to those wanting to further contribute to this emerging field. Given the advancements in WD technologies replacing the need for invasive hospital setting devices, we see great advancement potential in this domain. …”
-
34
Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review
Published 2021“…In addition, this review analyzes recent automatic architecture optimization algorithms for DL-based PVPF. Next, the notable DL technologies are thoroughly described. …”
-
35
-
36
Scrambled Prime Key Encryption
Published 2018“…Information security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
37
What are artificial intelligence literacy and competency? A comprehensive framework to support them
Published 2024“…These definitions are needed for this emerging and disruptive technology (e.g., ChatGPT and Sora, generative AI). …”
Get full text
Get full text
Get full text
article -
38
-
39
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Published 2025“…On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
-
40
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…<div><p>Fog computing (FC) based sensor networks have emerged as a propitious archetype for next-generation wireless communication technology with caching, communication, and storage capacity services in the edge. …”