Privacy-preserving approach for IoT networks using statistical learning with optimization algorithm on high-dimensional big data environment
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: Jan. 27, 2025
Language: Английский
A Pervasive Model to Evaluate and Ranking the Best 5G Mobile by Cross‐Entropy and TOPSIS Method
International Journal of Communication Systems,
Journal Year:
2025,
Volume and Issue:
38(4)
Published: Jan. 16, 2025
ABSTRACT
The
development
of
the
new
5G
mobile
generation
is
among
most
significant
and
recent
breakthroughs
in
communications
information
technology.
Compared
to
older
networks,
wireless
cellular
technology
offers
more
capacity,
dependable
connections,
quicker
upload
download
rates.
newest
phones,
or
have
significantly
speeds
are
dependable.
They
potential
completely
change
way
we
access
social
media,
websites,
information.
This
study
was
carried
out
address
issue
that
many
users
frequently
face
when
deciding
which
phone
best
for
them
based
on
factors.
contributes
putting
a
strategy
assessing
ranking
various
possibilities
light
consumers'
order
predilections
multicriteria
decision‐making
(MCDM).
In
this
study,
studied
15
different
mobiles
data
from
companies
with
10
criteria.
First,
appealing
criteria
affect
person's
decision
about
determined.
accomplished
by
survey
target
audience,
expertise
industry
professionals
area,
research
literature.
For
alternatives,
TOPSIS
approach
employed,
relative
weights
assessment
calculated
cross‐entropy
approach,
terms
MCDM.
demonstrates
usefulness
suggested
strategy.
Language: Английский
Smart Farming Revolution: A Cutting-Edge Review of Deep Learning and IoT Innovations in Agriculture
J. Siva Prashanth,
No information about this author
G. Bala Krishna,
No information about this author
A. V. Krishna Prasad
No information about this author
et al.
Operations Research Forum,
Journal Year:
2025,
Volume and Issue:
6(1)
Published: March 14, 2025
Language: Английский
Enhanced novelty approaches for resource allocation model for multi-cloud environment in vehicular Ad-Hoc networks
R. Augustian Isaac,
No information about this author
P. Sundaravadivel,
No information about this author
V. Marx
No information about this author
et al.
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: March 19, 2025
As
the
number
of
service
requests
for
applications
continues
increasing
due
to
various
conditions,
limitations
on
resources
provide
a
barrier
in
providing
with
appropriate
Quality
Service
(QoS)
assurances.
result,
an
efficient
scheduling
mechanism
is
required
determine
order
handling
application
requests,
as
well
use
broadcast
media
and
data
transfer.
In
this
paper
innovative
approach,
incorporating
Crossover
Mutation
(CM)-centered
Marine
Predator
Algorithm
(MPA)
introduced
effective
resource
allocation.
This
strategic
allocation
optimally
schedules
within
Vehicular
Edge
computing
(VEC)
network,
ensuring
most
utilization.
The
proposed
method
begins
by
meticulous
feature
extraction
from
network
model,
attributes
such
mobility
patterns,
transmission
medium,
bandwidth,
storage
capacity,
packet
delivery
ratio.
For
further
analysis
Elephant
Herding
Lion
Optimizer
(EHLO)
algorithm
employed
pinpoint
critical
attributes.
Subsequently
Modified
Fuzzy
C-Means
(MFCM)
used
vehicle
clustering
centred
selected
These
clustered
characteristics
are
then
transferred
stored
cloud
server
infrastructure.
performance
methodology
evaluated
using
MATLAB
software
simulation
method.
study
offers
comprehensive
solution
challenge
Cloud
Networks,
addresses
burgeoning
demands
modern
while
QoS
assurances
signifies
significant
advancement
field
VEC.
Language: Английский
Enhancing the e-commerce shopping experience with IoT-enabled smart carts in smart stores
Discover Internet of Things,
Journal Year:
2025,
Volume and Issue:
5(1)
Published: April 1, 2025
Language: Английский
An Efficient Multi‐Core DSP Power Management Controller
Jian Huang,
No information about this author
Huili Wang,
No information about this author
G. H. Gong
No information about this author
et al.
Engineering Reports,
Journal Year:
2025,
Volume and Issue:
7(4)
Published: April 1, 2025
ABSTRACT
Today's
society
has
entered
a
digital
era,
and
the
use
of
DSP
is
becoming
increasingly
frequent
important.
In
order
to
achieve
market
targets
high
energy
efficiency,
it
necessary
integrate
low‐power
design
from
chip
stage.
Based
on
FT‐xDSP
architecture,
this
work
designs
power
management
controller
for
suitable
multi‐core
multi‐integrated
peripherals
perspective
control
in
This
can
precisely
supply,
clock,
memory
each
module
introduces
clamp
unit
solve
problem
possible
glitches
during
asynchronous
reset
ensures
that
system
no
overflow
redundant
requests.
Additionally,
configurable
state
transition
counter
also
set
up
avoid
insufficient
time
low‐speed
or
long
waiting
high‐speed
peripherals.
After
pre‐tapeout
experiment
post‐tapeout
testing
data
analysis,
above
new
manager
excellent
performance.
low
consumption
chip,
overall
core
reduced
by
over
95%,
which
great
significance
achieving
high‐efficiency
processor
chips.
Language: Английский
An efficient electricity theft detection based on deep learning
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: April 15, 2025
Abstract
Electrical
theft
is
a
pervasive
issue
that
has
detrimental
impacts
on
both
utility
companies
and
electrical
consumers
worldwide.
It
undermines
the
economic
growth
of
businesses,
poses
risks,
affects
customers’
expensive
energy
bills.
Smart
grids
produce
vast
quantities
data,
including
consumer
usage
data
which
crucial
for
identifying
instances
theft.
Machine
learning
deep
algorithms
may
use
this
to
identify
This
research
presents
new
approach
using
convolutional
neural
networks
long-short-term
memory
extract
abstract
characteristics
from
power
consumption
improve
accuracy
detection
electricity
users.
We
mitigate
dataset
shortcomings,
such
as
incomplete
imbalanced
class
distribution,
by
LoRAS
augmentation.
The
method’s
efficiency
evaluated
authentic
obtained
State
Grid
Corporation
China.
Finally,
we
demonstrate
competitiveness
our
when
compared
other
approaches
have
been
assessed
same
dataset.
During
validation
process,
attained
97%
rate,
surpassing
highest
reported
in
previous
studies
1%.
values
98.75%,
95.45%,
97.7%,
along
with
corresponding
recall
F1
scores.
findings
indicate
suggested
surpasses
existing
state-of-arts
methods.
Language: Английский
Leveraging stacking machine learning models and optimization for improved cyberattack detection
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: May 14, 2025
The
ever-growing
number
of
complex
cyber
attacks
requires
the
need
for
high-level
intrusion
detection
systems
(IDS).
While
available
research
deals
with
traditional,
hybrid,
and
ensemble
methods
network
data
analysis,
serious
challenges
are
still
being
met
in
terms
producing
robust
highly
accurate
systems.
There
high
hurdles
managing
high-dimensional
traffic
since
current
methodologies
limited
dealing
imbalanced
issues
minority
classes
versus
majority
false
positive
rate
classification
accuracy.
This
study
introduces
an
innovative
framework
that
directly
addresses
these
persistent
through
a
novel
approach
to
detection.
proposed
method
integrates
two
ML
models:
J48
ExtraTreeClassifier
classification.
Besides,
we
propose
improved
equilibrium
optimizer
(EO)
whereby
previous
EO
is
modified.
In
this
enhanced
(EEO),
Fisher
score
accuracy
K-Nearest
Neighbors
(KNN)
algorithm
select
attributes
optimally,
whereas
synthetic
oversampling
technique
combined
iterative
partitioning
filters
(SMOTE-IPF)
used
provide
class
balancing.
KNN
also
imputation
improve
overall
system
superior
performance
has
been
validated
experimentally
on
several
benchmark
datasets,
i.e.,
NSL-KDD,
UNSW-NB15,
achieving
99.7%
98.1%
F1
99.6
98.0
respectively.
By
subjecting
comparative
analysis
recent
state-of-the-art
works,
paper
shown
methodology
yields
better
improvement
feature
selection
precision
accuracy,
handling
instance,
less
demanding
storage
computational
efficiency.
Language: Английский