Cloud Computing and Data Science, Volume 6 Issue 1 (2025), 1-114



Open Access Article

Artificial Intelligence-Based Wireless Sensor Network Model for Intrusion Detection and Firearms Image Detection in the Conflict Zone

by Simon Tooswem Apeh, Lukman Adewale Ajao, Dominic S. Nyitamen, Ciroma L. Wamdeo, Robbinson Edeh

ABSTRACT: The convergence of wireless sensor networks (WSN) and artificial intelligence (AI) for gathering security information about terrorism patterns movement in war zones renders advantages. It improves...

Open Access Article

Smart Homes and Blockchains: A Smart Door Lock Operated by a Smart Contract

by Riccardo Sottini, Vitor Jesus

ABSTRACT: The integration of blockchain technology into numerous domains has demonstrated its ability to address transparency, security, and cost-effectiveness. Furthermore, with its association with...

Open Access Article

An Efficient Automatic Detection of Cardiovascular Disease Based on Machine Learning

by Mohammad Karimi Moridani

ABSTRACT: Cardiovascular diseases have become one of the most common threats to human health worldwide. As a non-invasive diagnostic tool, heart sound detection techniques play an important role in...

Open Access Article

A Comparative Study of Deep Learning Models for Human Activity Recognition

by Mohammed Elnazer Abazar Elmamoon, Ahmad Abubakar Mustapha

ABSTRACT: Human Activity Recognition (HAR) is essential for real-time surveillance and security systems, enabling the detection and classification of human actions. This study evaluates five pre-trained...

Open Access Article

AI-Driven Federated and Transfer Learning Platform for Health Predictions

by Venkatesh Upadrista, Alejandro Martinez Galindo, Murthy S

ABSTRACT: Medical negligence, errors, and delayed diagnoses lead to preventable deaths and serious health issues. These problems are mainly caused by a shortage or lack of access to qualified healthcare...

Open Access Article

Review on Authentication Algorithms in Cellular Communication Networks

by Bem Sombo, Simon Tooswem Apeh, Isi Arthur Edeoghon

ABSTRACT: Black market and third-party subscriber identification module (SIM) cards are often exploited by criminals, such as kidnappers, to perpetrate their nefarious activities through cellular network...

Open Access Article

Developing BI Scorecards for Assessing Higher Education Quality Dashboards Using Human-Computer Interaction Concept: A Case Study

by Ali Sorour, Anthony Atkins

ABSTRACT: As Higher Education Institutions (HEIs) in the Kingdom of Saudi Arabia (KSA) have difficulties in monitoring their compliance with the national Quality Assurance (QA) standards, a Holistic...