[HTML][HTML] Prediction performance analysis of neural network models for an electrical discharge turning process

K Dey, K Kalita, S Chakraborty - International Journal on Interactive Design …, 2023 - Springer
In many of the modern-day manufacturing industries, electrical discharge machining (EDM)
now appears as an effective non-traditional material removal process for generating intricate …

Sixth‐Generation (6G) Mobile Cloud Security and Privacy Risks for AI System Using High‐Performance Computing Implementation

SR Gundu, P Charanarur… - Wireless …, 2022 - Wiley Online Library
The exchange of information from one person to another is called communication.
Telecommunication makes it possible with electronic devices and their tools. The scientist …

[HTML][HTML] A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography

R Gurunath, D Samanta - Journal of Database Management (JDM), 2023 - igi-global.com
The primary concern of every individual and organization is the security of sensitive
information generated via authorized activities; nonetheless, illicit data drawing and …

Examination of the Global Plant Factory's National Competitiveness via Artificial Intelligence-Driven Research Analysis

F Wang, JH Park - International Journal for Applied Information …, 2023 - ijaim.net
The plant factory is an advanced stage of the development of modern facility agriculture. It
integrates biotechnology, engineering technology and system management to free …

Social media and steganography: use, risks and current status

R Gurunath, MFJ Klaib, D Samanta, MZ Khan - Ieee Access, 2021 - ieeexplore.ieee.org
Steganography or data hiding is used to protect the privacy of information in the transit; it has
been observed that the information that flows through Online Social Networks (OSN) is very …

[PDF][PDF] A Review on the Recent Trends of Image Steganography for VANET Applications.

AS Ansari - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Image steganography is a technique of concealing confidential information within an image
without dramatically changing its outside look. Whereas vehicular ad hoc networks …

Approach for collision minimization and enhancement of power allocation in WSNs

D Singh, J Bhanipati, AK Biswal, D Samanta… - Journal of …, 2021 - Wiley Online Library
Wireless sensor networks (WSNs) have attracted much more attention in recent years.
Hence, nowadays, WSN is considered one of the most popular technologies in the …

A comprehensive review on deep learning-based generative linguistic steganography

IL Badawy, K Nagaty, A Hamdy - International Conference on Interactive …, 2022 - Springer
The recent development of deep learning has made a significant breakthrough in linguistic
generative steganography. The text has become one of the most intensely used …

Insights Into Deep Steganography: A Study of Steganography Automation and Trends

R Gurunath, D Samanta… - Cyber Security and …, 2022 - Wiley Online Library
Recurrent neural networks (RNNs) are built on the foundation of feed forward networks. The
greatest comparison for RNN is simple writing analysis, where the prediction of the next …

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

R Ch, V Yadlapalli, SS Sk, GT Reddy… - CAAI Transactions on …, 2024 - Wiley Online Library
Data is the key element that runs the modern society. Large amounts of data are being
released day by day as a result of many activities. The digital data is transferred through the …