545 results on '"Chen, Chin-Ling"'
Search Results
2. Blockchain Technology in Healthcare: A Review of Integrated Medical Service Applications and Security Considerations
3. A Survey and Planning Advice of Blockchain-Based Used Car Bidding Platform
4. An IoT and blockchain based logistics application of UAV
5. A Survey and Planning Advice of Blockchain-Based Used Car Bidding Platform
6. Quantified emotion analysis based on design principles of color feature recognition in pictures
7. A short-term load forecasting method for integrated community energy system based on STGCN
8. An anonymous and fair auction system based on blockchain
9. Machine learning for trust, security, and privacy in computing and communications
10. Research on the Analysis of Key Attack Modes in a Wireless Environment
11. Special issue on “Recent advances on computational intelligence techniques and applications in big data”
12. Blockchain-based alcoholic beverages supply chain management system
13. FreeSee: A Parameter-Independent Pattern-Based Device-Free Human Behaviour Sensing System with Wireless Signals of IoT Devices
14. An Early Detection of Distributed Denial of Service Attack
15. Research on the Analysis of Key Attack Modes in a Wireless Environment
16. A real-time arbitrary-shape text detector
17. An effective data enhancement method for classification of ECG arrhythmia
18. Fitness Sharing Chaotic Particle Swarm Optimization (FSCPSO): A Metaheuristic Approach for Allocating Dynamic Virtual Machine (VM) in Fog Computing Architecture.
19. FreeSee: A Parameter-Independent Pattern-Based Device-Free Human Behaviour Sensing System with Wireless Signals of IoT Devices
20. A Spinal MRI Image Segmentation Method Based on Improved Swin-UNet
21. Enhanced WPA2/PSK for Preventing Authentication Cracking
22. A Survey of Authentication Protocols in Logistics System
23. Digital Image Anti-counterfeiting Technology
24. A blockchain-based intelligent anti-switch package in tracing logistics system
25. An Early Detection of Distributed Denial of Service Attack
26. Quantified emotion analysis based on design principles of color feature recognition in pictures.
27. Clinical outcome of bevacizumab or ramucirumab combined with epidermal growth factor receptor (EGFR) tyrosine kinase inhibitors as the first line therapy in susceptible EGFR‐mutated advanced non‐small‐cell lung.
28. An ECC Based Secure and Convenient Rural Medical Care System
29. A Survey of Authentication Protocols in VANET
30. Non-sparse label specific features selection for multi-label classification
31. Permeation mechanisms through the selectivity filter and the open helix bundle crossing gate of GIRK2
32. A Hyperledger Fabric-based EMR Sharing Mechanisms with Proxy Re-encryption and IPFS
33. A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing
34. Research on effect of rings on coupling vibration in a rigid-disk rotor
35. Development of Audio and Visual Attention Assessment System in Combination with Brain Wave Instrument: Apply to Children with Attention Deficit Hyperactivity Disorder
36. A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
37. Hyperledger Fabric-Based Tea Supply Chain Production Data Traceable Scheme
38. An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort
39. A secure ambulance communication protocol in VANET
40. Digital Image Anti-counterfeiting Technology
41. Design of a Secure Emergency Communication System Based on Cloud for Pregnancy
42. Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems
43. Bus Drivers Fatigue Measurement Based on Monopolar EEG
44. Influence of the barrier layer on the flexural properties of nanoporous alumina film
45. An IoT and blockchain based logistics application of UAV
46. A secure electronic medical record authorization system for smart device application in cloud computing environments
47. A Blockchain and IPFS-Based Anticounterfeit Traceable Functionality of Car Insurance Claims System.
48. A Survey of Authentication Protocols in Logistics System
49. Authentication and replica migration with privacy and lightweight verification in mobile edge computing
50. Designing a flip-blended classroom model based on information technology
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.