We, the Editor, Institution and Publisher of the journal IETE Journal of Research, have retracted the following article, which is part of the Special Issue titled “Federated Learning for Blockchain systems and Indust...
We, the Editor, Institution and Publisher of the journal IETE Journal of Research, have retracted the following article, which is part of the Special Issue titled “Federated Learning for Blockchain systems and Industrial Internet of Things”:Abu Buker Siddique, Rafaqat Kazmi, Habib Ullah Khan, Sikandar Ali, Ali Samad & Gulraiz Javaid (2022) An Intelligent and Secure Air Quality Monitoring System Using Neural Network Algorithm and Blockchain, IETE Journal of Research, DOI:10.1080/03772063.2022.2052984Following publication, concerns were raised about the peer review and decision-making processes for this special *** an investigation by the Taylor & Francis Publishing Ethics & Integrity team, in full cooperation with the Editor-in-Chief and the Institution, it was confirmed that the articles included in this special issue were not reviewed appropriately, in line with the Journal’s peer review standards and *** the stringency of the peer review process is core to the integrity of the publication process, the Editor and Publisher have decided to retract all of the articles within the above-named Special *** journal has not confirmed if the authors were aware of this compromised peer review *** journal is committed to correcting the scientific record and will fully cooperate with any institutional investigations into this matter. The authors have been informed of this *** have been informed in our decision-making by our editorial policies and the COPE *** retracted articles will remain online to maintain the scholarly record, but they will be digitally watermarked on each page as “Retracted”.
The attacks of cyber are rapidly increasing due to advanced techniques applied by hackers. Furthermore, cyber security is demanding day by day, as cybercriminals are performing cyberattacks in this digital world. So, ...
The attacks of cyber are rapidly increasing due to advanced techniques applied by hackers. Furthermore, cyber security is demanding day by day, as cybercriminals are performing cyberattacks in this digital world. So, designing privacy and security measurements for IoT-based systems is necessary for secure network. Although various techniques of machine learning are applied to achieve the goal of cyber security, but still a lot of work is needed against intrusion detection. Recently, the concept of hybrid learning gives more attention to information security specialists for further improvement against cyber threats. In the proposed framework, a hybrid method of swarm intelligence and evolutionary for feature selection, namely, PSO-GA (PSO-based GA) is applied on dataset named CICIDS-2017 before training the model. The model is evaluated using ELM-BA based on bootstrap resampling to increase the reliability of ELM. This work achieved highest accuracy of 100% on PortScan, Sql injection, and brute force attack, which shows that the proposed model can be employed effectively in cybersecurity applications.
The paper deals with the issues of data collection in the dynamic Internet of Things network. An approach proposed is based on the models and methods of social networks analysis along with clustering methods commonly ...
The paper deals with the issues of data collection in the dynamic Internet of Things network. An approach proposed is based on the models and methods of social networks analysis along with clustering methods commonly used in this case. The developed hybrid model tracks contacts between nodes of the network thus creating 'social relationships' for each node and estimates the number and the frequency of 'social contacts' characterizing the degree of 'friendships'. After fixing the contacts between nodes the model takes into consideration only the nodes connected by 'friendship' relation. Data collection based on 'social structure' provides higher security level and shows the enhancement as regards energy saving and delays of data transfer.
Cloud Computing is an evolving technology in the field of IT. People are using this technology vastly as it reduces the storage and other services burden of the users as they use the services provided by the cloud. Th...
详细信息
Wireless technology is developing very fast. Most of the researchers are working in the field of wireless communication. VANET is an evolving technology in the field of wireless communication and with the advancement ...
详细信息
This paper explains risk assessment for circuit breaker utilization by using failure modes, effects, and criticality analysis (FMECA). The circuit breaker components are divided into three main parts such as live part...
详细信息
This paper explains risk assessment for circuit breaker utilization by using failure modes, effects, and criticality analysis (FMECA). The circuit breaker components are divided into three main parts such as live part, operating mechanism and insulation, and control device. FMECA is analyzed to 4 groups such as finance, safety, environment and efficiency. Finally, criticality is categorized into 4 levels such as low level, medium level, high level and highest risk level. Data collection and analysis were performed. The results of the criticality analysis will assist in making maintenance resource management decisions in order to avoid damage to the system with efficient usage of available or limited resources.
Flower Pollination Algorithm (FPA) is the new breed of metaheuristic for general optimization problem. In this paper, an improved algorithm based on Flower Pollination Algorithm (FPA), called imFPA, has been proposed....
详细信息
Cloud Computing paradigm has revolutionized IT industry and be able to offer computing as the fifth utility. With the pay-as-you-go model, cloud computing enables to offer the resources dynamically for customers anyti...
详细信息
Urtica dioica (stinging nettle) has been traditionally used in Chinese medicine for the treatment of joint pain and rheumatoid arthritis. This study aims to elucidate the active compounds and mechanisms by which it ac...
详细信息
Urtica dioica (stinging nettle) has been traditionally used in Chinese medicine for the treatment of joint pain and rheumatoid arthritis. This study aims to elucidate the active compounds and mechanisms by which it acts against gout arthritis (GA). Gout-related genes were identified from the DisGeNet, GeneCards, and OMIM databases. These genes may play a role in inhibiting corresponding proteins targeted by the active compounds identified from the literature, which have an oral bioavailability of ≥ 30% and a drug-likeness score of ≥ 0.18. A human protein-protein interaction network was constructed, resulting in sixteen clusters containing plant-targeted genes, including ABCG2, SLC22A12, MAP2K7, ADCY10, RELA, and TP53. The key bioactive compounds, apigenin-7-O-glucoside and kaempferol, demonstrated significant binding to SLC22A12 and ABCG2, suggesting their potential to reduce uric acid levels and inflammation. Pathway enrichment analysis further identified key metabolic pathways involved, highlighting a dual mechanism of anti-inflammatory and urate-lowering effects. These findings underscore the potential of U. dioica in targeting multiple pathways involved in GA, combining traditional medicine with modern pharmacology. This integrated approach provides a foundation for future research and the development of multi-target therapeutic strategies for managing gout arthritis.
Wireless technology is advancing rapidly with time. People are doing research nowadays mostly in the field of telecommunication. VANET is the most growing research area in wireless communication. With the advancement ...
详细信息
暂无评论