Found: 45
Select item for more details and to access through your institution.
Identifying People's Faces in Smart Banking Systems Using Artificial Neural Networks.
- Published in:
- International Journal of Computational Intelligence Systems, 2024, v. 17, n. 1, p. 1, doi. 10.1007/s44196-023-00383-7
- By:
- Publication type:
- Article
A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 18, p. 26614, doi. 10.1007/s11227-024-06408-y
- By:
- Publication type:
- Article
IAMnet: Presentation of Parallelization Approach for Repetitive Mining on Network Topologies with an Improved Apriori Method.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/8217774
- By:
- Publication type:
- Article
A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment.
- Published in:
- Personal & Ubiquitous Computing, 2023, v. 27, n. 3, p. 697, doi. 10.1007/s00779-020-01475-3
- By:
- Publication type:
- Article
Key-management scheme for wireless sensor networks based on merging blocks of symmetric design.
- Published in:
- Wireless Networks (10220038), 2018, v. 24, n. 8, p. 2867, doi. 10.1007/s11276-017-1509-y
- By:
- Publication type:
- Article
Toward caching techniques in edge computing over SDN-IoT architecture: a review of challenges, solutions, and open issues.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 1, p. 1311, doi. 10.1007/s11042-023-15657-7
- By:
- Publication type:
- Article
Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 17, p. 26049, doi. 10.1007/s11042-021-10844-w
- By:
- Publication type:
- Article
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice.
- Published in:
- International Journal of Information & Communication Technology Research (2251-6107), 2024, v. 16, n. 1, p. 20
- By:
- Publication type:
- Article
π-BAER *-RINGS.
- Published in:
- International Electronic Journal of Algebra, 2021, v. 30, p. 231, doi. 10.24330/ieja.969915
- By:
- Publication type:
- Article
AHP TECHNIQUES FOR PERSIAN TEXT SUMMARIZATION.
- Published in:
- Malaysian Journal of Computer Science, 2013, v. 26, n. 1, p. 1, doi. 10.22452/mjcs.vol26no1.1
- By:
- Publication type:
- Article
Secure data communication in IoT-based medical health systems using Frobenius rings.
- Published in:
- International Journal of Nonlinear Analysis & Applications, 2025, v. 16, n. 1, p. 179, doi. 10.22075/ijnaa.2023.31921.4734
- By:
- Publication type:
- Article
Recommender systems using cloud-based computer networks to predict service quality.
- Published in:
- International Journal of Nonlinear Analysis & Applications, 2024, v. 15, n. 10, p. 359, doi. 10.22075/ijnaa.2023.31196.4588
- By:
- Publication type:
- Article
A note on mj-clean rings.
- Published in:
- International Journal of Nonlinear Analysis & Applications, 2024, v. 15, n. 10, p. 175, doi. 10.22075/ijnaa.2023.30963.4528
- By:
- Publication type:
- Article
Social networks data analytical approaches for trust‐based recommender systems: A systematic literature review.
- Published in:
- International Journal of Communication Systems, 2024, v. 37, n. 5, p. 1, doi. 10.1002/dac.5684
- By:
- Publication type:
- Article
Performance improvement of Routing Protocol for Low‐Power and Lossy Networks protocol in an Internet of Things‐based smart retail system.
- Published in:
- International Journal of Communication Systems, 2022, v. 35, n. 10, p. 1, doi. 10.1002/dac.5166
- By:
- Publication type:
- Article
Internet of Things architecture challenges: A systematic review.
- Published in:
- International Journal of Communication Systems, 2021, v. 34, n. 4, p. 1, doi. 10.1002/dac.4678
- By:
- Publication type:
- Article
A dynamic fog service provisioning approach for IoT applications.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 14, p. 1, doi. 10.1002/dac.4541
- By:
- Publication type:
- Article
Measuring Efficiency of Financial Cloud Services in Banking Industry Using Modified Dynamic DEA with Network Structure (Case study: Iran E-Banking).
- Published in:
- Advances in Mathematical Finance & Applications, 2021, v. 6, n. 1, p. 1, doi. 10.22034/amfa.2020.1898567.1416
- By:
- Publication type:
- Article
A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network.
- Published in:
- Wireless Networks (10220038), 2021, v. 27, n. 4, p. 3025, doi. 10.1007/s11276-021-02629-8
- By:
- Publication type:
- Article
TCLAB: A New Topology Control Protocol in Cognitive MANETs Based on Learning Automata.
- Published in:
- Journal of Network & Systems Management, 2018, v. 26, n. 2, p. 426, doi. 10.1007/s10922-017-9422-3
- By:
- Publication type:
- Article
Generalized π-Baer rings.
- Published in:
- Turkish Journal of Mathematics, 2020, v. 44, n. 6, p. 2021, doi. 10.3906/mat-2005-30
- By:
- Publication type:
- Article
Anomaly Detection in Smart Homes Using Bayesian Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2020, v. 14, n. 4, p. 1796, doi. 10.3837/tiis.2020.04.021
- By:
- Publication type:
- Article
Improvement of Apriori Algorithm Using Parallelization Technique on Multi-CPU and GPU Topology.
- Published in:
- Wireless Communications & Mobile Computing, 2024, v. 2024, p. 1, doi. 10.1155/2024/7716976
- By:
- Publication type:
- Article
Toward a More Accurate Web Service Selection Using Modified Interval DEA Models with Undesirable Outputs.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2020, v. 123, n. 2, p. 525, doi. 10.32604/cmes.2020.08854
- By:
- Publication type:
- Article
A Novel Probabilistic Hybrid Model to Detect Anomaly in Smart Homes.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2019, v. 121, n. 3, p. 815, doi. 10.32604/cmes.2019.07848
- By:
- Publication type:
- Article
Application of S-Boxes based on the chaotic Hindmarsh-Rose system for image encryption.
- Published in:
- Journal of Mathematical Modeling (JMM), 2023, v. 11, n. 2, p. 277, doi. 10.22124/JMM.2023.23199.2068
- By:
- Publication type:
- Article
Implicit Lightweight Proxy Based Key Agreement for the Internet of Things (ILPKA).
- Published in:
- Wireless Personal Communications, 2023, v. 130, n. 3, p. 1833, doi. 10.1007/s11277-023-10360-0
- By:
- Publication type:
- Article
A High Resilience and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Networks.
- Published in:
- Wireless Personal Communications, 2022, v. 127, n. 4, p. 2905, doi. 10.1007/s11277-022-09903-8
- By:
- Publication type:
- Article
A Full Connectable and High Scalable Key Pre-distribution Scheme Based on Combinatorial Designs for Resource-Constrained Devices in IoT Network.
- Published in:
- Wireless Personal Communications, 2020, v. 114, n. 3, p. 2079, doi. 10.1007/s11277-020-07466-0
- By:
- Publication type:
- Article
Topology Control in MANETs Using the Bayesian Pursuit Algorithm.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 3, p. 1089, doi. 10.1007/s11277-019-06205-4
- By:
- Publication type:
- Article
Cog-MAC Protocol: Channel Allocation in Cognitive Ad Hoc Networks Based on the Game of Learning Automata.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 3, p. 2285, doi. 10.1007/s11277-018-5911-2
- By:
- Publication type:
- Article
A cost‐aware approach for cloud federation formation.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 12, p. 1, doi. 10.1002/ett.4631
- By:
- Publication type:
- Article
A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2021, v. 32, n. 11, p. 1, doi. 10.1002/ett.4342
- By:
- Publication type:
- Article
A medical monitoring scheme and health‐medical service composition model in cloud‐based IoT platform.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 6, p. N.PAG, doi. 10.1002/ett.3637
- By:
- Publication type:
- Article
Composition of caching and classification in edge computing based on quality optimization for SDN-based IoT healthcare solutions.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 15, p. 17619, doi. 10.1007/s11227-023-05332-x
- By:
- Publication type:
- Article
A pricing approach for optimal use of computing resources in cloud federation.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 3, p. 3055, doi. 10.1007/s11227-022-04725-8
- By:
- Publication type:
- Article
A self-learning approach for proactive resource and service provisioning in fog environment.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 15, p. 16997, doi. 10.1007/s11227-022-04521-4
- By:
- Publication type:
- Article
Star capacity-aware latency-based next controller placement problem with considering single controller failure in software-defined wide-area networks.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 11, p. 13205, doi. 10.1007/s11227-022-04360-3
- By:
- Publication type:
- Article
Load balancing in join algorithms for skewed data in MapReduce systems.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 1, p. 228, doi. 10.1007/s11227-018-2578-0
- By:
- Publication type:
- Article
Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 7, p. 3415, doi. 10.1007/s11227-018-2391-9
- By:
- Publication type:
- Article
Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case.
- Published in:
- ISeCure, 2021, v. 13, n. 1, p. 73, doi. 10.22042/isecure.2020.226400.535
- By:
- Publication type:
- Article
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud.
- Published in:
- ISeCure, 2021, v. 13, n. 2, p. 87, doi. 10.22042/isecure.2021.227562.542
- By:
- Publication type:
- Article
NEW CLASS OF INTEGRAL BIPARTITE GRAPHS WITH LARGE DIAMETER.
- Published in:
- Transactions on Combinatorics, 2018, v. 7, n. 1, p. 13, doi. 10.22108/toc.2016.20738
- By:
- Publication type:
- Article
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET.
- Published in:
- Journal of Computing & Security, 2016, v. 3, n. 1, p. 63
- By:
- Publication type:
- Article
Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2003, doi. 10.1002/sec.914
- By:
- Publication type:
- Article