2,956 results on '"Abawajy, Jemal"'
Search Results
2. Real-time monitoring and prediction of water content in concrete members through time series modeling
3. FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning
4. Anonymous lattice-based authentication protocol for vehicular communications
5. Untraceable blockchain-assisted authentication and key exchange in medical consortiums
6. Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis
7. SDN enabled BDSP in public cloud for resource optimization
8. Hunger games search optimization with deep learning model for sustainable supply chain management
9. Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing
10. Special issue on neural computing and applications in cyber intelligence: ATCI 2022
11. Correction to: Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022)
12. Analysis of Factors Affecting Successful Adoption and Acceptance of Electronic Health Records at Hospitals
13. Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security
14. Network-aware worker placement for wide-area streaming analytics
15. Correction to: Information, Communication and Computing Technology
16. Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach
17. Machine learning models for prediction of co-occurrence of diabetes and cardiovascular diseases: a retrospective cohort study
18. Early detection of cardiovascular autonomic neuropathy: A multi-class classification model based on feature selection and deep learning feature fusion
19. Cost-Aware Big Data Stream Processing in Cloud Environment
20. Lightweight Authenticated Encryption for Cloud-assisted IoT Applications
21. Visualization and deep-learning-based malware variant detection using OpCode-level features
22. Analysis of Energy Consumption Model in Cloud Computing Environments
23. A Survey of Big Workflow
24. Real-time structural health monitoring for concrete beams: a cost-effective ‘Industry 4.0’ solution using piezo sensors
25. Development of energy efficient drive for ventilation system using recurrent neural network
26. Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend
27. A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog–cloud computing
28. An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT
29. Breast Cancer Recurrence Prediction Using Random Forest Model
30. Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population
31. Frequency Switch, Secret Sharing and Recursive Use of Hash Functions Secure (Low Cost) Ad Hoc Networks
32. Automatic extraction and integration of behavioural indicators of malware for protection of cyber–physical networks
33. Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges
34. MDS-Based Cloned Device Detection in IoT-Fog Network
35. A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System.
36. Redefining the construction managerial landscape to facilitate Industry 4.0 implementation: scientometric mapping of research frontiers.
37. Analysis of Factors Affecting Successful Adoption and Acceptance of Electronic Health Records at Hospitals
38. Privacy Threat Analysis of Mobile Social Network Data Publishing
39. Securing Websites Against Homograph Attacks
40. Data-Centric Task Scheduling Algorithm for Hybrid Tasks in Cloud Data Centers
41. Identifying cyber threats to mobile-IoT applications in edge computing paradigm
42. Learning automaton based topology control protocol for extending wireless sensor networks lifetime
43. Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms
44. Minimal ensemble based on subset selection using ECG to diagnose categories of CAN
45. A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
46. An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments
47. Universal and secure object ownership transfer protocol for the Internet of Things
48. A Multi-protocol Security Framework to Support Internet of Things
49. A Framework to Analyze Quality of Service (QoS) for Text-To-Speech (TTS) Services
50. Text Detection in Low Resolution Scene Images Using Convolutional Neural Network
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.