Radiological imaging generates large data volumes for diagnosing. These data volumes still constitute an immense challenge for individual radiology practices, either when complying with the archive, hacker manipulation or swiftly distributing images…
Histopathological image analysis (HIA) plays an essential role in detecting cancer cell development, but it is time-consuming, prone to inaccuracy, and dependent on pathologist competence. This paper proposes an automated HIA that uses deep learning…
In order to provide solution to limited network resources in heterogeneous wireless networks supporting different applications with distinct quality of service (QoS) requirements, call admission control (CAC) schemes are implemented. This work is…
Due to the development of wireless communications, there has been a growth in the use of IoT devices and sensor nodes. A potential power source for powering equipment in remote or inaccessible locations is necessary. This research investigates the…
To hide confidential messages from people who are not responsible or who can access the messages, a way is needed to hide the messages. One way to hide messages in transmission is to change the data into something unintelligible by encoding and…
In this article, the direct current (DC) motor control approach is presented using the sand cat swarm optimization (SCSO) method to obtain the best proportional integral derivative (PID) parameters. DC motors are popular equipment. In addition, DC…
Since cloud computing has an abundance of users, the system has to execute a wide range of tasks. Task scheduler methods that are both robust and efficient while delivering the best outcomes are required. The task volume and runtime in the cloud vary…
One of the mechanical energy harvesters, piezoelectric energy harvesters (PEHs), produces electricity in response to an external load, which leads to stress and strain in the cantilever beam. The study focused on performance PEH due to collisions…
Based on the modified Diffie-Hellman (DH) protocol, a key distribution scheme between two correspondents over open communication channels is considered. The correspondents communicate through a trusted entity. An attacker can control the…