Found: 117
Select item for more details and to access through your institution.
PODE: privacy-enhanced distributed federated learning approach for origin-destination estimation.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.2050
- By:
- Publication type:
- Article
Improving prediction of maternal health risks using PCA features and TreeNet model.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.1982
- By:
- Publication type:
- Article
Privacy preserved and decentralized thermal comfort prediction model for smart buildings using federated learning.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.1899
- By:
- Publication type:
- Article
Optimizing multimodal feature selection using binary reinforced cuckoo search algorithm for improved classification performance.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.1816
- By:
- Publication type:
- Article
Detection of Electronic Anklet Wearers' Groupings throughout Telematics Monitoring.
- Published in:
- ISPRS International Journal of Geo-Information, 2017, v. 6, n. 1, p. 31, doi. 10.3390/ijgi6010031
- By:
- Publication type:
- Article
Video Caption Based Searching Using End-to-End Dense Captioning and Sentence Embeddings.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 6, p. 992, doi. 10.3390/sym12060992
- By:
- Publication type:
- Article
Image Watermarking in Curvelet Domain Using Edge Surface Blocks.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 5, p. 822, doi. 10.3390/sym12050822
- By:
- Publication type:
- Article
A Smart, Sensible Agriculture System Using the Exponential Moving Average Model.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 3, p. 457, doi. 10.3390/sym12030457
- By:
- Publication type:
- Article
Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 9, p. 172, doi. 10.3390/sym9090172
- By:
- Publication type:
- Article
BATCP: Bandwidth-Aggregation Transmission Control Protocol.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 8, p. 167, doi. 10.3390/sym9080167
- By:
- Publication type:
- Article
Correction to: A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
A soldier bee defence mechanism for detecting impersonate sensor node in wireless sensor networks.
- Published in:
- Personal & Ubiquitous Computing, 2023, v. 27, n. 3, p. 889, doi. 10.1007/s00779-021-01653-x
- By:
- Publication type:
- Article
Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments.
- Published in:
- Wireless Personal Communications, 2009, v. 51, n. 1, p. 209, doi. 10.1007/s11277-008-9601-3
- By:
- Publication type:
- Article
Biometrics and Biosecurity 2014.
- Published in:
- BioMed Research International, 2015, v. 2015, p. 1, doi. 10.1155/2015/812697
- By:
- Publication type:
- Article
Evolvable hardware design based on a novel simulated annealing in an embedded system.
- Published in:
- Concurrency & Computation: Practice & Experience, 2012, v. 24, n. 4, p. 354, doi. 10.1002/cpe.1604
- By:
- Publication type:
- Article
Ubiquitous Sensor Networks and Their Application 2013.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
GTrust: Group Extension for Trust Models in Distributed Systems.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, v. 10, n. 2, p. 1, doi. 10.1155/2014/872842
- By:
- Publication type:
- Article
PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, v. 10, n. 2, p. 1, doi. 10.1155/2014/282417
- By:
- Publication type:
- Article
GTrust: Group Extension for Trust Models in Distributed Systems.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/872842
- By:
- Publication type:
- Article
A Zone-Based Media Independent Information Service for IEEE 802.21 Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/737218
- By:
- Publication type:
- Article
Ubiquitous Sensor Networks and Their Application 2013.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/583956
- By:
- Publication type:
- Article
PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/282417
- By:
- Publication type:
- Article
Advanced Sensor Technology and Applications in Industrial Control System 2014.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/182382
- By:
- Publication type:
- Article
Advanced Sensor Technology and Applications in Industrial Control System.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/516412
- By:
- Publication type:
- Article
A Dynamic Traffic-Aware Duty Cycle Adjustment MAC Protocol for Energy Conserving in Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2012, p. 1, doi. 10.1155/2012/790131
- By:
- Publication type:
- Article
Design of an Effective WSN-Based Interactive u-Learning Model.
- Published in:
- International Journal of Distributed Sensor Networks, 2012, p. 1, doi. 10.1155/2012/514836
- By:
- Publication type:
- Article
Ubiquitous Sensor Networks and Its Application.
- Published in:
- International Journal of Distributed Sensor Networks, 2012, p. 1, doi. 10.1155/2012/310271
- By:
- Publication type:
- Article
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 14, p. 19879, doi. 10.1007/s11042-021-11859-z
- By:
- Publication type:
- Article
Locating similar names through locality sensitive hashing and graph theory.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 21, p. 29853, doi. 10.1007/s11042-018-6375-9
- By:
- Publication type:
- Article
A comparison of learning methods over raw data: forecasting cab services market share in New York City.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 21, p. 29783, doi. 10.1007/s11042-018-6285-x
- By:
- Publication type:
- Article
A traffic analysis attack to compute social network measures.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 21, p. 29731, doi. 10.1007/s11042-018-6217-9
- By:
- Publication type:
- Article
Virtual learning communities: unsolved troubles.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 19, p. 8505, doi. 10.1007/s11042-013-1543-4
- By:
- Publication type:
- Article
Xen-based virtual honeypot system for smart device.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 19, p. 8541, doi. 10.1007/s11042-013-1499-4
- By:
- Publication type:
- Article
Guest Editorial: Multimedia Applications for Smart device and Equipment.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
Solving technological isolation to build virtual learning communities.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 19, p. 8521, doi. 10.1007/s11042-013-1542-5
- By:
- Publication type:
- Article
Cell-graph coloring for cancerous tissue modelling and classification.
- Published in:
- Multimedia Tools & Applications, 2013, v. 66, n. 2, p. 229, doi. 10.1007/s11042-011-0797-y
- By:
- Publication type:
- Article
A Hypertuned Lightweight and Scalable LSTM Model for Hybrid Network Intrusion Detection.
- Published in:
- Technologies (2227-7080), 2023, v. 11, n. 5, p. 121, doi. 10.3390/technologies11050121
- By:
- Publication type:
- Article
Enhancing handwritten text recognition accuracy with gated mechanisms.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-67738-8
- By:
- Publication type:
- Article
Improving prediction of blood cancer using leukemia microarray gene data and Chi2 features with weighted convolutional neural network.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-65315-7
- By:
- Publication type:
- Article
Improved Prediction of Ovarian Cancer Using Ensemble Classifier and Shaply Explainable AI.
- Published in:
- Cancers, 2023, v. 15, n. 24, p. 5793, doi. 10.3390/cancers15245793
- By:
- Publication type:
- Article
Hybrid CNN-SVM Classifier Approaches to Process Semi-Structured Data in Sugarcane Yield Forecasting Production.
- Published in:
- Agronomy, 2023, v. 13, n. 4, p. 1169, doi. 10.3390/agronomy13041169
- By:
- Publication type:
- Article
Adaptive routing protocol for mobile ad hoc networks.
- Published in:
- Computing, 2014, v. 96, n. 9, p. 817, doi. 10.1007/s00607-013-0310-8
- By:
- Publication type:
- Article
Detecting bad information in mobile wireless networks based on the wireless application protocol.
- Published in:
- Computing, 2014, v. 96, n. 9, p. 855, doi. 10.1007/s00607-013-0325-1
- By:
- Publication type:
- Article
Editorial to special issue: computer and network applications for ubiquitous computing.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Automatic image annotation approach based on optimization of classes scores.
- Published in:
- Computing, 2014, v. 96, n. 5, p. 381, doi. 10.1007/s00607-013-0342-0
- By:
- Publication type:
- Article
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9802475
- By:
- Publication type:
- Article
Improved ECG Watermarking Technique Using Curvelet Transform.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 10, p. 2941, doi. 10.3390/s20102941
- By:
- Publication type:
- Article
Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 16, p. 3603, doi. 10.3390/s19163603
- By:
- Publication type:
- Article
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 2, p. 376, doi. 10.3390/s19020376
- By:
- Publication type:
- Article
New DoS Defense Method Based on Strong Designated Verifier Signatures.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 9, p. 2813, doi. 10.3390/s18092813
- By:
- Publication type:
- Article