Skip to main content

previous disabled Page of 7
and
  1. No Access

    Article

    Content caching in mobile edge computing: a survey

    As wireless communication technology continues to advance, the number of intelligent devices, such as computers, mobile phones, and iPads, is increasing rapidly. To keep up with the growing demand for data and...

    Yasar Khan, Saad Mustafa, Raja Wasim Ahmad, Tahir Maqsood in Cluster Computing (2024)

  2. Book Series

  3. No Access

    Book and Conference Proceedings

    Advanced Computing

    13th International Conference, IACC 2023, Kolhapur, India, December 15–16, 2023, Revised Selected Papers, Part I

    Deepak Garg, Joel J. P. C. Rodrigues in Communications in Computer and Information Science (2024)

  4. No Access

    Book and Conference Proceedings

    Advanced Computing

    13th International Conference, IACC 2023, Kolhapur, India, December 15–16, 2023, Revised Selected Papers, Part II

    Deepak Garg, Joel J. P. C. Rodrigues in Communications in Computer and Information Science (2024)

  5. No Access

    Book and Conference Proceedings

  6. No Access

    Article

    Sustainable Environmental Design Using Green IOT with Hybrid Deep Learning and Building Algorithm for Smart City

    Smart cities and urbanization use enormous IoT devices to transfer data for analysis and information processing. These IoT can relate to billions of devices and transfer essential data from their surroundings....

    Yuting Zhong, Zesheng Qin, Abdulmajeed Alqhatani in Journal of Grid Computing (2023)

  7. Article

    Editorial: Heterogeneous High Performance Computing for Intelligent Data Analysis

    Zhigao Zheng, Shahid Mumtaz, Krishn K. Mishra in Mobile Networks and Applications (2023)

  8. Article

    Open Access

    SUACC-IoT: secure unified authentication and access control system based on capability for IoT

    With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security requirements have become an integral part of an IoT system. Authe...

    N. Sivaselvan, K. Vivekananda Bhat, Muttukrishnan Rajarajan in Cluster Computing (2023)

  9. Article

    Open Access

    A novel sample and feature dependent ensemble approach for Parkinson’s disease detection

    Parkinson’s disease (PD) is a neurological disease that has been reported to have affected most people worldwide. Recent research pointed out that about 90% of PD patients possess voice disorders. Motivated by...

    Liaqat Ali, Chinmay Chakraborty, Zhiquan He in Neural Computing and Applications (2023)

  10. Article

    Open Access

    An efficient hybrid approach for optimization using simulated annealing and grasshopper algorithm for IoT applications

    The multi-objective grasshopper optimization algorithm (MOGOA) is a relatively new algorithm inspired by the collective behavior of grasshoppers, which aims to solve multi-objective optimization problems in Io...

    Faria Sajjad, Muhammad Rashid, Afia Zafar, Kainat Zafar in Discover Internet of Things (2023)

  11. No Access

    Article

    MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach

    Internet of Things (IoT) is one of the fastest-growing technologies. With the deployment of massive and faster mobile networks, almost every daily-use item is connected to the Internet. IoT-enabled industrial ...

    Sumit Pundir, Mohammad S. Obaidat, Mohammad Wazid, Ashok Kumar Das in Multimedia Systems (2023)

  12. No Access

    Article

    Security in IoT-enabled smart agriculture: architecture, security solutions and challenges

    Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product (GDP) and as a source of employment. The past few decades h...

    Anusha Vangala, Ashok Kumar Das, Vinay Chamola, Valery Korotaev in Cluster Computing (2023)

  13. No Access

    Article

    Enhanced privacy-preserving in student certificate management in blockchain and interplanetary file system

    Blockchain technology is popular due to properties such as immutability, transparency, distributed storage, and control decentralisation. Student certificates and skill verification are used for job applicatio...

    Narendra K Dewangan, Preeti Chandrakar, Saru Kumari in Multimedia Tools and Applications (2023)

  14. No Access

    Article

    An integrated approach: using knowledge graph and network analysis for harnessing digital advertisement

    Complex network analysis helps in finding hidden patterns within a graph network. This concept is extended for knowledge graphs to identify hidden concepts using state-of-the-art network analysis techniques. I...

    Siraj Munir, Rauf Ahmed Shams Malick, Syed Imran Jami in Multimedia Tools and Applications (2023)

  15. No Access

    Article

    Machine Learning Models to Predict Readmission Risk of Patients with Schizophrenia in a Spanish Region

    Currently, high hospital readmission rates have become a problem for mental health services, because it is directly associated with the quality of patient care. The development of predictive models with machin...

    Susel Góngora Alonso, Isabel Herrera Montano in International Journal of Mental Health and… (2023)

  16. No Access

    Book and Conference Proceedings

  17. No Access

    Book

  18. No Access

    Article

    Fish recognition model for fraud prevention using convolutional neural networks

    Fraud, misidentification, and adulteration of food, whether unintentional or purposeful, are a worldwide and growing concern. Aquaculture and fisheries are recognized as one of the sectors most vulnerable to f...

    Rhayane S. Monteiro, Morgana C. O. Ribeiro in Advances in Computational Intelligence (2022)

  19. No Access

    Article

    Blockchain-Based Security Enhancement and Spectrum Sensing in Cognitive Radio Network

    In recent times, wireless communication systems have been considered by a fixed spectrum allocation policy, where administrative agencies provide wireless spectrum to licensees on a long-term basis for high ge...

    Ashish Khanna, Poonam Rani, Tariq Hussain Sheikh in Wireless Personal Communications (2022)

  20. Article

    Open Access

    Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat

    Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed by authorized personnel to manipulate confidential informati...

    Isabel Herrera Montano, José Javier García Aranda, Juan Ramos Diaz in Cluster Computing (2022)

previous disabled Page of 7