347 results on '"Abawajy, Jemal"'
Search Results
2. Real-time monitoring and prediction of water content in concrete members through time series modeling
3. FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning
4. Anonymous lattice-based authentication protocol for vehicular communications
5. Untraceable blockchain-assisted authentication and key exchange in medical consortiums
6. Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis
7. SDN enabled BDSP in public cloud for resource optimization
8. Hunger games search optimization with deep learning model for sustainable supply chain management
9. Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing
10. Special issue on neural computing and applications in cyber intelligence: ATCI 2022
11. Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security
12. Network-aware worker placement for wide-area streaming analytics
13. Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach
14. Machine learning models for prediction of co-occurrence of diabetes and cardiovascular diseases: a retrospective cohort study
15. Early detection of cardiovascular autonomic neuropathy: A multi-class classification model based on feature selection and deep learning feature fusion
16. Visualization and deep-learning-based malware variant detection using OpCode-level features
17. Real-time structural health monitoring for concrete beams: a cost-effective ‘Industry 4.0’ solution using piezo sensors
18. Development of energy efficient drive for ventilation system using recurrent neural network
19. Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend
20. Automatic extraction and integration of behavioural indicators of malware for protection of cyber–physical networks
21. A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System.
22. An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT.
23. Redefining the construction managerial landscape to facilitate Industry 4.0 implementation: scientometric mapping of research frontiers.
24. Identifying cyber threats to mobile-IoT applications in edge computing paradigm
25. Learning automaton based topology control protocol for extending wireless sensor networks lifetime
26. Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms
27. Minimal ensemble based on subset selection using ECG to diagnose categories of CAN
28. A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
29. An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments
30. Universal and secure object ownership transfer protocol for the Internet of Things
31. A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog–cloud computing.
32. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks
33. A trajectory privacy-preserving scheme based on query exchange in mobile social networks
34. Editorial on Special Issue: “Applications of Intelligent and Fuzzy Theory in Data Science”
35. Editorial: Special issue on neural computing and applications in cyber intelligence: ATCI 2020
36. Hybrids of support vector machine wrapper and filter based framework for malware detection
37. Evolutionary optimization: A big data perspective
38. Utility-aware social network graph anonymization
39. A parallel framework for software defect detection and metric selection on cloud computing
40. Cloud-assisted IoT-based health status monitoring framework
41. Policy-based SQLIA detection and prevention approach for RFID systems
42. Smart Electronics, Energy, and IoT Infrastructures for Smart Cities.
43. An approach for profiling phishing activities
44. Service Level Agreements for the Digital Library
45. Scalable RFID security framework and protocol supporting Internet of Things
46. Digital Library Service Quality Assessment Model
47. Analysis of Insiders Attack Mitigation Strategies
48. A Multilevel Trust Management Framework for Service Oriented Environment
49. Enhancing Trust Management in Cloud Environment
50. An alternative data collection scheduling scheme in wireless sensor networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.