default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 15
Volume 15, Number 1, 2024
- Walaa Saber Ismail:
Emotion Detection in Text: Advances in Sentiment Analysis Using Deep Learning. 17-26 - B. Sreevidya, M. Supriya:
Trust based Routing - A Novel Approach for Data Security in WSN based Data Critical Applications. 27-41 - Fernando Escobedo, Henry Bernardo Garay Canales, Fernando Willy Morillo Galarza, Carlos Miguel Aguilar Saldaña, Eddy Miguel Aguirre Reyes, César Augusto Flores-Tananta:
Energy Efficient Business Management System for Improving QoS in Network Model. 42-52 - I Gde Dharma Nugraha, Edwiansyah Zaky Ashadi, Ardiansyah Musa Efendi:
Performance Evaluation of Collision Avoidance for Multi-node LoRa Networks based on TDMA and CSMA Algorithm. 53-74 - Milind B. Bhilavade, K. S. Shivaprakasha, Meenakshi R. Patil, Lalita S. Admuthe:
Fingerprint Reconstruction: Approaches to Improve Fingerprint Images. 75-87 - Hyunwoo Song, Jaeho Yu:
Effects of Augmented Reality based Dual-Task Proprioceptive Training on Postural Stability, Positioning Sensation and Cognition. 88-103 - Bandr Fakiha:
Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks. 104-114 - Agung Triayudi, Rima Tamara Aldisa, S. Sumiati:
New Framework of Educational Data Mining to Predict Student Learning Performance. 115-132 - Ahmad Al Smadi, Ahed Abugabah, Mutasem K. Alsmadi, Ahmad Alsmadi:
Smart Medical Application of Deep Learning (MUNet) for Detection of COVID-19 from Chest Images. 133-153 - Vimitha R. Vidhya Lakshmi:
VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks. 154-171 - Walaa Saber Ismail:
Human-Centric AI : Enhancing User Experience through Natural Language Interfaces. 172-183 - Daehyeon Son, Youngshin Park, Bonam Kim, Ilsun You:
A Study on the Implementation of a Network Function for Real-time False Base Station Detection for the Next Generation Mobile Communication Environment. 184-201 - M. Rajesh, S. R. Nagaraja, P. Suja:
Multi - Robot Exploration Supported by Enhanced Localization with Reduction of Localization Error Using Particle Swarm Optimization. 202-215 - Sofiene Mansouri, Souhaila Boulares, Souhir Chabchoub:
Machine Learning for Early Diabetes Detection and Diagnosis. 216-230 - Ronald M. Hernández, Walter Antonio Campos-Ugaz, Segundo Juan Sánchez Tarrillo, Silvia Josefina Aguinaga Vasquez, Sara Esther Liza Ordoñez, Ronald Avellaneda Montenegro, Dora Elisa Elías Martínez, Doris E. Fuster-Guillén:
Exploring Software Infrastructures for Enhanced Learning Environments to Empowering Education. 231-243 - Bob Subhan Riza, Rina Yunita, Rika Rosnelly:
Comparative Analysis of LSTM and BiLSTM in Image Detection Processing. 244-260
Volume 15, Number 2, 2024
- Ha Rang Kim, Hyun Min Song:
Lightweight IDS Framework Using Word Embeddings for In-Vehicle Network Security. 1-13 - P. Bharath Kumar Chowdary, R. Udayakumar, Chaya Jadhav, B. Mohanraj, V. R. Vimal:
An Efficient Intrusion Detection Solution for Cloud Computing Environments Using Integrated Machine Learning Methodologies. 14-26 - Gustavo A. Flores-Fernandez, Miguel Jimenez-Carrion, Flabio Gutiérrez, Raúl A. Sánchez-Ancajima:
Genetic Algorithm and LSTM Artificial Neural Network for Investment Portfolio Optimization. 27-46 - Vivi Monita:
Rainfall Prediction from Himawari-8 Data Using the Deep Learning Method. 47-59 - K. Malathi, Shruthi S. Nair, N. Madhumitha, S. Sreelakshmi, U. Sathya, M. Sangeetha Priya:
Medical Data Integration and Interoperability through Remote Monitoring of Healthcare Devices. 60-72 - Mutasem K. Alsmadi, Rami Mustafa A. Mohammad, Malek Alzaqebah, Sana Jawarneh, Muath AlShaikh, Ahmad Al Smadi, Fahad A. Alghamdi, Jehad Saad Alqurni, Hayat Alfagham:
Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm. 73-93 - N. R. Mohamed Kareemulla, G. S. Nijaguna, Pushpa, N. Dayananda Lal, M. Naga Raju, Zameer Ahmed Adhoni:
A Comprehensive Approach to a Hybrid Blockchain Framework for Multimedia Data Processing and Analysis in IoT-Healthcare. 94-108 - H. V. Ramana Rao, V. Ravi Sankar:
Precision in Prostate Cancer Diagnosis: A Comprehensive Study on Neural Networks. 109-122 - Nehme Azoury, Satya Subrahmanyam, Nada Sarkis:
The Influence of a Data-Driven Culture on Product Development and Organizational Success through the Use of Business Analytics. 123-134 - Anas Abu Taleb, Ammar Odeh:
Effective Routing of Mobile Sink in Wireless Sensor Networks Using Steiner Trees. 135-151 - S. Sathyanarayanan, K. Srikanta Murthy:
Heart Sound Analysis Using SAINet Incorporating CNN and Transfer Learning for Detecting Heart Diseases. 152-169 - B. Aruna Devi, S. Jaganathan, Parag K. Shah, Narendran Venkatapathy:
Prediction of Premature Retinopathy Fundus Images Using Dense Network Model for Intelligent Portable Screening Device. 170-182 - Taufiq Odhi Dwi Putra:
Container Load Placement for Deep Learning Application Using Whale Optimization. 183-201 - Afnaan. K, Peeta Basa Pati, Tripty Singh, Bhanu Prakash K. N.:
Comparative Analysis for Feature Extraction and Prediction of CKD Using Machine Learning. 202-225 - Arief Kelik Nugroho, Retantyo Wardoyo, Moh Edi Wibowo, Hardyanto Soebono:
Thresholding Segmentation of Skin Lesions with Modified Ant Colony Optimization Algorithm. 226-239 - Danielle Khalife, Satya Subrahmanyam, Assaad Farah:
A Sustainable Circular Business Model to Improve the Performance of Small and Medium-sized Enterprises Using Blockchain Technology. 240-250 - Deepthi Reddy Dasari, G. Hima Bindu:
Feature Selection Model-based Intrusion Detection System for Cyberattacks on the Internet of Vehicles Using Cat and Mouse Optimizer. 251-269 - Rawaa A. Faris, Qusay Mosa, Mustafa Albdairi:
Robust Classification for Sub Brain Tumors by Using an Ant Colony Algorithm with a Neural Network. 270-285 - Ahmed Afif Monrat, Olov Schelén, Karl Andersson:
A Taxonomy Guideline for Blockchain Platforms. 286-308
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.