5,635 results on '"A. A. C. Rodrigues"'
Search Results
152. Guest Editorial: AI-Enabled Software-Defined Industrial Networks: Architectures, Algorithms, and Applications.
153. Cross-Layer Approach for Self-Organizing and Self-Configuring Communications Within IoT.
154. Toward Response Time Minimization Considering Energy Consumption in Caching-Assisted Vehicular Edge Computing.
155. Designing Fine-Grained Access Control for Software-Defined Networks Using Private Blockchain.
156. A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings.
157. SDN-Assisted Mobile Edge Computing for Collaborative Computation Offloading in Industrial Internet of Things.
158. A Robust Approach for Privacy Data Protection: IoT Security Assurance Using Generative Adversarial Imitation Learning.
159. An Authentication Protocol for Next Generation of Constrained IoT Systems.
160. Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems.
161. An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber-Physical Systems.
162. Digital-Twin-Enabled IoMT System for Surgical Simulation Using rAC-GAN.
163. Automated CCA-MWF Algorithm for Unsupervised Identification and Removal of EOG Artifacts From EEG.
164. Banking Digitalization: (Re)Thinking Strategies and Trends Using Problem Structuring Methods.
165. An Identity-Based Authentication Protocol for the Telecare Medical Information System (TMIS) Using a Physically Unclonable Function.
166. An Efficient Context-Aware Vehicle Incidents Route Service Management for Intelligent Transport System.
167. Evaluation of HMIPv6 Algorithm in 5G Mmwave Single and Dual Connectivity Handover Network.
168. Coalition Game and Blockchain-Based Optimal Data Pricing Scheme for Ride Sharing Beyond 5G.
169. Graph Neural Network-Driven Traffic Forecasting for the Connected Internet of Vehicles.
170. A Gated Recurrent Unit Deep Learning Model to Detect and Mitigate Distributed Denial of Service and Portscan Attacks.
171. ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things.
172. A Fault-Tolerant and Secure Architecture for Key Management in LoRaWAN Based on Permissioned Blockchain.
173. Enhanced Max-Min Rate of Users in UAV-Assisted Emergency Networks Using Reinforcement Learning.
174. Applying deep learning-based multi-modal for detection of coronavirus.
175. Data Augmentation for Internet of Things Dialog System.
176. Formal verification and complexity analysis of confidentiality aware textual clinical documents framework.
177. An intelligent system for complex violence pattern analysis and detection.
178. Blockchain-Based Security Enhancement and Spectrum Sensing in Cognitive Radio Network.
179. Edge Computing AI-IoT Integrated Energy-efficient Intelligent Transportation System for Smart Cities.
180. Machine Learning and Soil Humidity Sensing: Signal Strength Approach.
181. A Group Discovery Method Based on Collaborative Filtering and Knowledge Graph for IoT Scenarios.
182. Conditional Support-Vector-Machine-Based Shared Adaptive Computing Model for Smart City Traffic Management.
183. SaTYa: Trusted Bi-LSTM-Based Fake News Classification Scheme for Smart Community.
184. Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation.
185. AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things.
186. Identifying fraud in medical insurance based on blockchain and deep learning.
187. PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments.
188. Global Communications Newsletter.
189. AI Empowered Big Data Analytics for Industrial Applications.
190. Integration of IoT and blockchain for decentralized management and ownership in the metaverse.
191. L-C2ST: Local Diagnostics for Posterior Approximations in Simulation-Based Inference.
192. Explainable artificial intelligence envisioned security mechanism for cyber threat hunting.
193. Safety and security of autonomous vehicles.
194. An improved fault detection crow search algorithm for wireless sensor network.
195. Population-based surveillance for congenital zika virus syndrome: a latent class analysis of recorded cases from 2015–2018
196. CoronaVac vaccine is effective in preventing symptomatic and severe COVID-19 in pregnant women in Brazil: a test-negative case-control study
197. Differences in risk factors for incident and recurrent preterm birth: a population-based linkage of 3.5 million births from the CIDACS birth cohort
198. Constraints on kinematic parameters at $z\ne0$
199. Can computer vision be used for anthropometry? A feasibility study of a smart mobile application.
200. On the Performance Analysis of a TensorFlow based Neural Network for Face Mask Detection.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.