![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
123 Result(s)
-
Article
Content caching in mobile edge computing: a survey
As wireless communication technology continues to advance, the number of intelligent devices, such as computers, mobile phones, and iPads, is increasing rapidly. To keep up with the growing demand for data and...
-
Book Series
-
Book and Conference Proceedings
Advanced Computing
13th International Conference, IACC 2023, Kolhapur, India, December 15–16, 2023, Revised Selected Papers, Part I
-
Book and Conference Proceedings
Advanced Computing
13th International Conference, IACC 2023, Kolhapur, India, December 15–16, 2023, Revised Selected Papers, Part II
-
Book and Conference Proceedings
-
Article
Sustainable Environmental Design Using Green IOT with Hybrid Deep Learning and Building Algorithm for Smart City
Smart cities and urbanization use enormous IoT devices to transfer data for analysis and information processing. These IoT can relate to billions of devices and transfer essential data from their surroundings....
-
Article
Editorial: Heterogeneous High Performance Computing for Intelligent Data Analysis
-
Article
Open AccessSUACC-IoT: secure unified authentication and access control system based on capability for IoT
With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security requirements have become an integral part of an IoT system. Authe...
-
Article
Open AccessA novel sample and feature dependent ensemble approach for Parkinson’s disease detection
Parkinson’s disease (PD) is a neurological disease that has been reported to have affected most people worldwide. Recent research pointed out that about 90% of PD patients possess voice disorders. Motivated by...
-
Article
Open AccessAn efficient hybrid approach for optimization using simulated annealing and grasshopper algorithm for IoT applications
The multi-objective grasshopper optimization algorithm (MOGOA) is a relatively new algorithm inspired by the collective behavior of grasshoppers, which aims to solve multi-objective optimization problems in Io...
-
Article
MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach
Internet of Things (IoT) is one of the fastest-growing technologies. With the deployment of massive and faster mobile networks, almost every daily-use item is connected to the Internet. IoT-enabled industrial ...
-
Article
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges
Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product (GDP) and as a source of employment. The past few decades h...
-
Article
Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system
Blockchain technology is popular due to properties such as immutability, transparency, distributed storage, and control decentralisation. Student certificates and skill verification are used for job applicatio...
-
Article
An integrated approach: using knowledge graph and network analysis for harnessing digital advertisement
Complex network analysis helps in finding hidden patterns within a graph network. This concept is extended for knowledge graphs to identify hidden concepts using state-of-the-art network analysis techniques. I...
-
Article
Machine Learning Models to Predict Readmission Risk of Patients with Schizophrenia in a Spanish Region
Currently, high hospital readmission rates have become a problem for mental health services, because it is directly associated with the quality of patient care. The development of predictive models with machin...
-
Book and Conference Proceedings
-
Book
-
Article
Fish recognition model for fraud prevention using convolutional neural networks
Fraud, misidentification, and adulteration of food, whether unintentional or purposeful, are a worldwide and growing concern. Aquaculture and fisheries are recognized as one of the sectors most vulnerable to f...
-
Article
Blockchain-Based Security Enhancement and Spectrum Sensing in Cognitive Radio Network
In recent times, wireless communication systems have been considered by a fixed spectrum allocation policy, where administrative agencies provide wireless spectrum to licensees on a long-term basis for high ge...
-
Article
Open AccessSurvey of Techniques on Data Leakage Protection and Methods to address the Insider threat
Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed by authorized personnel to manipulate confidential informati...