Search

Your search keyword '"Computer communication networks"' showing total 7,996 results

Search Constraints

Start Over You searched for: Descriptor "Computer communication networks" Remove constraint Descriptor: "Computer communication networks" Topic business.industry Remove constraint Topic: business.industry
7,996 results on '"Computer communication networks"'

Search Results

1. Detection and Spatial Correlation Analysis of Infectious Diseases Using Wireless Body Area Network Under Imperfect Wireless Channel

2. Hybrid Artificial Neural Networks Using Customer Churn Prediction

3. Software engineering techniques for statically analyzing mobile apps

4. Platform trust in C2C e-commerce platform: the sellers’ cultural perspective

5. Lip as biometric and beyond: a survey

6. High level visual scene classification using background knowledge of objects

7. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm

8. A Spark-based high utility itemset mining with multiple external utilities

9. Transformation of Engineering Education in India Through Student Centric Learning Approach

10. Analysis of NVMe over fabrics with SCinet DTN-as-a-Service

11. An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy

12. Comparison of light field compression methods

13. A Comprehensive Survey of Detection of Tampered Video and Localization of Tampered Frame

14. Learning multi-level and multi-scale deep representations for privacy image classification

15. Towards effective offloading mechanisms in fog computing

16. CFSM: a novel frame analyzing mechanism for real-time face recognition system on the embedded system

17. AET tool for hybrid accessibility evaluation

18. Sycon: a new milestone in designing ASCON-like permutations

19. Special issue on the technologies and applications of big data

20. Using Machine Learning to Quantify the Multimedia Risk Due to Fuzzing

21. MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing

22. Narrow privacy and desynchronization in Vaudenay’s RFID model

23. Text messages by wireless mesh network vs voice by two-way radio in disaster simulations: A crossover randomized-controlled trial

24. A detailed review of prevailing image captioning methods using deep learning techniques

25. Improving Positioning Accuracy Using Optimization Approaches: A Survey, Research Challenges and Future Perspectives

26. Detection of Choroidal Neovascularization (CNV) in Retina OCT Images Using VGG16 and DenseNet CNN

27. Secure Authentication Schemes for Vehicular Adhoc Networks: A Survey

28. Computer-Assisted Collaborative Learning for Enhancing Students Intellectual Ability Using Machine Learning Techniques

29. Ultra-Wideband Compact Circularly Polarized Antenna

30. Editorial: Big data technologies and applications

31. Image captioning improved visual question answering

32. Overview of Artificial Intelligence and Machine Learning

33. COVID-19 crisis impact on the stability between parties in crowdfunding and crowdsourcing

34. Exploring acceptance of intelligent tutoring system with pedagogical agent among high school students

35. Convergence of Edge Computing and Next Generation Networking

36. India’s non-personal data framework: a critique

37. Clickjacking: Beware of Clicking

38. Energy-Efficient Cognitive Radio Sensor Networks: Parametric and Convex Transformations

39. Detecting users’ usage intentions for websites employing deep learning on eye-tracking data

40. YOLOv4 algorithm for the real-time detection of fire and personal protective equipments at construction sites

41. 5G System Design Solutions for Wireless Personal Applications

42. Automatic segmentation of melanoma skin cancer using transfer learning and fine-tuning

43. Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures

44. Performance testing of an architecture of low-cost authentication Rural small-scale WISP Using Mikrotik hotspot and Freeradius server installed on Raspberry Pi 3

45. Machine Learning Approaches for Anomaly Detection in IoT: An Overview and Future Research Directions

46. Design considerations for transceiver-limited elastic optical networks

47. Underwater target detection with an attention mechanism and improved scale

48. Towards an IoT enabled Tourism and Visualization Review on the Relevant Literature in Recent 10 Years

49. Password guessers under a microscope: an in-depth analysis to inform deployments

50. A Group Theoretic Construction of Large Number of AES-Like Substitution-Boxes

Catalog

Books, media, physical & digital resources