default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 40
Volume 40, Numbers 1/2/3, 2022
- Venkata Nagaraju Thatha, A. Sudhir Babu, D. Haritha:
Privacy-preserving smart contracts for fuzzy WordNet-based document representation and clustering using regularised K-means method. 2-9 - B. Madhuravani, D. S. R. Murthy, S. Viswanadha Raju:
A dynamic preserving-based WSN framework for medical disease prediction. 10-19 - Suneetha Bulla, Bobba Basaveswararao, Gangadhara Rao Kancherla, K. Chandan, Sirisati Ranga Swamy:
A secure new HRF mechanism for mitigate EDoS attacks. 20-29 - C. V. Subhaskar Reddy, M. V. Subramanyam, P. Ramana Reddy:
Improving QOS in flow controlled CR-ad hoc network with multi criteria routing assisted with cooperative caching and information redundancy. 30-37 - J. N. V. R. Swarup Kumar, D. Suresh:
Design and implementation of a mobility support adaptive trickle algorithm for RPL in vehicular IoT networks. 38-49 - J. Premalatha, Iwin Thanakumar Joseph Swamidason, Pon Harshavardhanan, S. P. Anandaraj, V. Jeyakrishnan:
Analytical review on secure communication protocols for 5G and IoT networks. 50-66 - S. Amudha, M. Murali:
F-CHILS maps - a novel encryption scheme for secured medical data transmission using FoG-ban environment. 67-79 - M. Nagageetha, N. V. K. Ramesh:
A feature ranking-based deep learning secure framework for multi-class leaf disease detection. 80-93 - V. Devi Satya Sri, Srikanth Vemuru:
A filter-based machine learning classification framework for cloud-based medical databases. 94-105 - Mohana Sundaram Kuppusamy, D. Nageswari, J. Prakash:
Cuckoo search assisted fuzzy logic algorithm for smart WSN routing system. 106-115 - N. Sivaranjani, Jayaraj Jayabharathy:
Forecasting the decision making process of Supreme Court using hierarchical convolutional neural network. 116-126 - Sateesh Kumar Reddy Chirasani, Suchetha Manikandan:
An optimised machine learning algorithm for classification of epileptic seizures using EMD-based dynamic features of EEG. 127-138 - D. N. V. S. L. S. Indira, R. Abinaya, Suresh Babu Chandanapalli, Ramesh Vatambeti:
Secured personal health records using pattern-based verification and two-way polynomial protocol in cloud infrastructure. 139-147 - M. S. Vinmathi, M. S. Josephine, V. Jeyabalaraja:
An energy and delay aware routing protocol for wireless sensor network assisted IoT to maximise network lifetime. 148-158 - Farhana Ajaz, Mohd Naseem, Sparsh Sharma, Gaurav Dhiman, Mohammad Shabaz, S. Vimal:
Architecture and routing protocols for internet of vehicles: a review. 159-175 - Thotakura Veeranna, Kiran Kumar Reddy:
Sliding window assisted mutual redundancy-based feature selection for intrusion detection system. 176-186 - Ravi Prakash, Shashank Pushkar:
An approach using heuristic pheromones-based ACO modelling for green vehicle routing optimisation. 187-193 - Erukala Suresh Babu, Mekala Srinivasa Rao, Naganjaneyulu Satuluri, Manikonda Srinivasa Sesha Sai, Rajendra Kumar Ganiya:
Secure exchange and effectual verification of educational academic records using hyperledger fabric block chain system. 194-213 - Purshottam J. Assudani, P. Balakrishnan:
A novel bio-inspired approach for VM load balancing and efficient resource management in cloud. 214-224 - Rajendra Kumar Ganiya, Duggineni Veeraiah, Suneetha Bulla, J. Nageswara Rao, G. J. Sunny Deol:
Efficiency evaluation of HRF mechanism on EDoS attacks in cloud computing services. 225-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.