Found: 31
Select item for more details and to access through your institution.
A Machine Learning Strategy for the Quantitative Analysis of the Global Warming Impact on Marine Ecosystems.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 10, p. N.PAG, doi. 10.3390/sym14102023
- By:
- Publication type:
- Article
Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 12, p. 2089, doi. 10.3390/sym12122089
- By:
- Publication type:
- Article
A New SLM-UFMC Model for Universal Filtered Multi-Carrier to Reduce Cubic Metric and Peak to Average Power Ratio in 5G Technology.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 6, p. 909, doi. 10.3390/sym12060909
- By:
- Publication type:
- Article
Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 4, p. 664, doi. 10.3390/sym12040664
- By:
- Publication type:
- Article
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 4, p. 598, doi. 10.3390/sym12040598
- By:
- Publication type:
- Article
A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G.
- Published in:
- Drones (2504-446X), 2023, v. 7, n. 5, p. 321, doi. 10.3390/drones7050321
- By:
- Publication type:
- Article
Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS.
- Published in:
- PLoS ONE, 2024, v. 19, n. 5, p. 1, doi. 10.1371/journal.pone.0302559
- By:
- Publication type:
- Article
Healthcare Device Security: Insights and Implications.
- Published in:
- Intelligent Automation & Soft Computing, 2021, v. 27, n. 2, p. 409, doi. 10.32604/iasc.2021.015351
- By:
- Publication type:
- Article
Evaluating Intelligent Methods for Detecting COVID-19 Fake News on Social Media Platforms.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 15, p. 2417, doi. 10.3390/electronics11152417
- By:
- Publication type:
- Article
Enhanced Harris Hawks optimization as a feature selection for the prediction of student performance.
- Published in:
- Computing, 2021, v. 103, n. 7, p. 1417, doi. 10.1007/s00607-020-00894-7
- By:
- Publication type:
- Article
A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 12, p. 5419, doi. 10.3390/s23125419
- By:
- Publication type:
- Article
A Lightweight Authentication MAC Protocol for CR-WSNs.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 4, p. 2015, doi. 10.3390/s23042015
- By:
- Publication type:
- Article
A Secure LEACH-PRO Protocol Based on Blockchain.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 21, p. 8431, doi. 10.3390/s22218431
- By:
- Publication type:
- Article
Design and Analysis of a 5G Wideband Antenna for Wireless Body-Centric Network.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/1558791
- By:
- Publication type:
- Article
The Rise of "Internet of Things": Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/8669348
- By:
- Publication type:
- Article
Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method.
- Published in:
- Processes, 2023, v. 11, n. 5, p. 1366, doi. 10.3390/pr11051366
- By:
- Publication type:
- Article
Intelligent Reasoning Rules for Home Energy Management (IRRHEM): Algeria Case Study.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 4, p. 1861, doi. 10.3390/app12041861
- By:
- Publication type:
- Article
Role of Blockchain Technology in Combating COVID-19 Crisis.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 24, p. 12063, doi. 10.3390/app112412063
- By:
- Publication type:
- Article
Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 2, p. 3211, doi. 10.32604/cmc.2023.043935
- By:
- Publication type:
- Article
Advancing Sustainable Healthcare through Enhanced Therapeutic Communication with Elderly Patients in the Kingdom of Saudi Arabia.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 22, p. 15778, doi. 10.3390/su152215778
- By:
- Publication type:
- Article
A Generic Internet of Things (IoT) Middleware for Smart City Applications.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 1, p. 743, doi. 10.3390/su15010743
- By:
- Publication type:
- Article
A Numerical Study of the Dynamics of Vector-Born Viral Plant Disorders Using a Hybrid Artificial Neural Network Approach.
- Published in:
- Entropy, 2022, v. 24, n. 11, p. 1511, doi. 10.3390/e24111511
- By:
- Publication type:
- Article
On the Computational Study of a Fully Wetted Longitudinal Porous Heat Exchanger Using a Machine Learning Approach.
- Published in:
- Entropy, 2022, v. 24, n. 9, p. N.PAG, doi. 10.3390/e24091280
- By:
- Publication type:
- Article
Recognition of Ziziphus lotus through Aerial Imaging and Deep Transfer Learning Approach.
- Published in:
- Mobile Information Systems, 2021, p. 1, doi. 10.1155/2021/4310321
- By:
- Publication type:
- Article
SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising.
- Published in:
- Expert Systems, 2023, v. 40, n. 5, p. 1, doi. 10.1111/exsy.13072
- By:
- Publication type:
- Article
The Performance of Circularly Polarized Phased Sub-Array Antennas for 5G Laptop Devices Investigating the Radiation Effects.
- Published in:
- Progress in Electromagnetics Research C, 2021, v. 110, p. 267, doi. 10.2528/pierc21012005
- By:
- Publication type:
- Article
A Usability Management Framework for Securing Healthcare Information System.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 42, n. 3, p. 1015, doi. 10.32604/csse.2022.021564
- By:
- Publication type:
- Article
An Effective Secure MAC Protocol for Cognitive Radio Networks.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 42, n. 1, p. 133, doi. 10.32604/csse.2022.021543
- By:
- Publication type:
- Article
Atrocious Impinging of COVID-19 Pandemic on Software Development Industries.
- Published in:
- Computer Systems Science & Engineering, 2021, v. 36, n. 2, p. 323, doi. 10.32604/csse.2021.014929
- By:
- Publication type:
- Article
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4260804
- By:
- Publication type:
- Article
P-STORE: Extension of STORE Methodology to Elicit Privacy Requirements.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2021, v. 46, n. 9, p. 8287, doi. 10.1007/s13369-021-05476-z
- By:
- Publication type:
- Article