Repository logo
 

Research Publications (Engineering and Built Environment)

Permanent URI for this collectionhttp://ir-dev.dut.ac.za/handle/10321/215

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    Item
    Fusion in cryptocurrency price prediction: a decade survey on recent advancements, architecture, and potential future directions
    (Institute of Electrical and Electronics Engineers (IEEE), 2022) Patel, Nisarg P.; Parekh, Raj; Thakkar, Nihar; Gupta, Rajesh; Tanwar, Sudeep; Sharma, Gulshan; Davidson, Innocent E.; Sharma, Ravi
    Cryptographic forms of money are distributed peer-to-peer (P2P) computerized exchange mediums, where the exchanges or records are secured through a protected hash set of secure hash algorithm-256 (SHA-256) and message digest 5 (MD5) calculations. Since their initiation, the prices seem highly volatile and came to their amazing cutoff points during the COVID-19 pandemic. This factor makes them a popular choice for investors with an aim to get higher returns over a short span of time. The colossal high points and low points in digital forms of money costs have drawn in analysts from the scholarly community as well as ventures to foresee their costs. A few machines and deep learning algorithms like gated recurrent unit (GRU), long short-term memory (LSTM), autoregressive integrated moving average with explanatory variable (ARIMAX), and a lot more have been utilized to exactly predict and investigate the elements influencing cryptocurrency prices. The current literature is totally centered around the forecast of digital money costs disregarding its reliance on other cryptographic forms of money. However, Dash coin is an individual cryptocurrency, but it is derived from Bitcoin and Litecoin. The change in Bitcoin and Litecoin prices affects the Dash coin price. Motivated from these, we present a cryptocurrency price prediction framework in this paper. It acknowledges different cryptographic forms of money (which are subject to one another) as information and yields higher accuracy. To illustrate this concept, we have considered a price prediction of Dash coin through the past days’ prices of Dash, Litecoin, and Bitcoin as they have hierarchical dependency among them at the protocol level. We can portray the outcomes that the proposed scheme predicts the prices with low misfortune and high precision. The model can be applied to different digital money cost expectations.
  • Thumbnail Image
    Item
    Quantum cryptography-as-a-service for secure UAV communication : applications, challenges, and case study
    (Institute of Electrical and Electronics Engineers (IEEE), 2021) Ralegankar, Vishakha K.; Bagul, Jagruti; Thakkar, Bhaumikkumar; Gupta, Rajesh; Tanwar, Sudeep; Sharma, Gulshan; Davidson, Innocent Ewaen
    The sudden demand rises in security made researchers come up with solutions that provide instantaneous safety better than the state of the art solutions. The quest for securing data began in the Spartan era. People are now looking to expand this field of research by attacking the existing paradigms and inventing new algorithms that prove to be better than their vulnerable counterparts. Unmanned aerial vehicles (UAVs) are very much prevailing due to their sleek design and flexible mobility in many sectors such as agriculture, army, healthcare, monitoring and surveillance, and many more. We discuss the growth and demand of drone technology along with its importance in this article. The paper also throws some light on the ongoing security issues in real-time scenarios and the role of quantum cryptography in securing the information over the traditional solutions. Motivated by this, we present a survey on quantum cryptography’s importance, role, and benefits in securing UAV communications underlying beyond 5G networks. A novel quantum cryptography-based layered architectural solution is also proposed to achieve high data security and efficient transmission. This paper also present a case study on the battlefield application on the Internet of military things. The performance of the proposed case study system is evaluated by considering the latency, security, and reliability