default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 411 matches
- 2024
- Mutasem K. Alsmadi, Rami Mustafa A. Mohammad, Malek Alzaqebah, Sana Jawarneh, Muath AlShaikh, Ahmad Al Smadi, Fahad A. Alghamdi, Jehad Saad Alqurni, Hayat Alfagham:
Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 73-93 (2024) - Nehme Azoury, Satya Subrahmanyam, Nada Sarkis:
The Influence of a Data-Driven Culture on Product Development and Organizational Success through the Use of Business Analytics. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 123-134 (2024) - Milind B. Bhilavade, K. S. Shivaprakasha, Meenakshi R. Patil, Lalita S. Admuthe:
Fingerprint Reconstruction: Approaches to Improve Fingerprint Images. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 75-87 (2024) - P. Bharath Kumar Chowdary, R. Udayakumar, Chaya Jadhav, B. Mohanraj, V. R. Vimal:
An Efficient Intrusion Detection Solution for Cloud Computing Environments Using Integrated Machine Learning Methodologies. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 14-26 (2024) - Deepthi Reddy Dasari, G. Hima Bindu:
Feature Selection Model-based Intrusion Detection System for Cyberattacks on the Internet of Vehicles Using Cat and Mouse Optimizer. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 251-269 (2024) - B. Aruna Devi, S. Jaganathan, Parag K. Shah, Narendran Venkatapathy:
Prediction of Premature Retinopathy Fundus Images Using Dense Network Model for Intelligent Portable Screening Device. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 170-182 (2024) - Fernando Escobedo, Henry Bernardo Garay Canales, Fernando Willy Morillo Galarza, Carlos Miguel Aguilar Saldaña, Eddy Miguel Aguirre Reyes, César Augusto Flores-Tananta:
Energy Efficient Business Management System for Improving QoS in Network Model. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 42-52 (2024) - Bandr Fakiha:
Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 104-114 (2024) - Rawaa A. Faris, Qusay Mosa, Mustafa Albdairi:
Robust Classification for Sub Brain Tumors by Using an Ant Colony Algorithm with a Neural Network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 270-285 (2024) - Gustavo A. Flores-Fernandez, Miguel Jimenez-Carrion, Flabio Gutiérrez, Raúl A. Sánchez-Ancajima:
Genetic Algorithm and LSTM Artificial Neural Network for Investment Portfolio Optimization. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 27-46 (2024) - Ronald M. Hernández, Walter Antonio Campos-Ugaz, Segundo Juan Sánchez Tarrillo, Silvia Josefina Aguinaga Vasquez, Sara Esther Liza Ordoñez, Ronald Avellaneda Montenegro, Dora Elisa Elías Martínez, Doris E. Fuster-Guillén:
Exploring Software Infrastructures for Enhanced Learning Environments to Empowering Education. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 231-243 (2024) - Walaa Saber Ismail:
Emotion Detection in Text: Advances in Sentiment Analysis Using Deep Learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 17-26 (2024) - Walaa Saber Ismail:
Human-Centric AI : Enhancing User Experience through Natural Language Interfaces. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 172-183 (2024) - Afnaan. K, Peeta Basa Pati, Tripty Singh, Bhanu Prakash K. N.:
Comparative Analysis for Feature Extraction and Prediction of CKD Using Machine Learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 202-225 (2024) - N. R. Mohamed Kareemulla, G. S. Nijaguna, Pushpa, N. Dayananda Lal, M. Naga Raju, Zameer Ahmed Adhoni:
A Comprehensive Approach to a Hybrid Blockchain Framework for Multimedia Data Processing and Analysis in IoT-Healthcare. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 94-108 (2024) - Danielle Khalife, Satya Subrahmanyam, Assaad Farah:
A Sustainable Circular Business Model to Improve the Performance of Small and Medium-sized Enterprises Using Blockchain Technology. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 240-250 (2024) - Ha Rang Kim, Hyun Min Song:
Lightweight IDS Framework Using Word Embeddings for In-Vehicle Network Security. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 1-13 (2024) - Vimitha R. Vidhya Lakshmi:
VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 154-171 (2024) - K. Malathi, Shruthi S. Nair, N. Madhumitha, S. Sreelakshmi, U. Sathya, M. Sangeetha Priya:
Medical Data Integration and Interoperability through Remote Monitoring of Healthcare Devices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 60-72 (2024) - Sofiene Mansouri, Souhaila Boulares, Souhir Chabchoub:
Machine Learning for Early Diabetes Detection and Diagnosis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 216-230 (2024) - Vivi Monita:
Rainfall Prediction from Himawari-8 Data Using the Deep Learning Method. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 47-59 (2024) - Ahmed Afif Monrat, Olov Schelén, Karl Andersson:
A Taxonomy Guideline for Blockchain Platforms. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 286-308 (2024) - I Gde Dharma Nugraha, Edwiansyah Zaky Ashadi, Ardiansyah Musa Efendi:
Performance Evaluation of Collision Avoidance for Multi-node LoRa Networks based on TDMA and CSMA Algorithm. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 53-74 (2024) - Arief Kelik Nugroho, Retantyo Wardoyo, Moh Edi Wibowo, Hardyanto Soebono:
Thresholding Segmentation of Skin Lesions with Modified Ant Colony Optimization Algorithm. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 226-239 (2024) - Taufiq Odhi Dwi Putra:
Container Load Placement for Deep Learning Application Using Whale Optimization. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 183-201 (2024) - M. Rajesh, S. R. Nagaraja, P. Suja:
Multi - Robot Exploration Supported by Enhanced Localization with Reduction of Localization Error Using Particle Swarm Optimization. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 202-215 (2024) - H. V. Ramana Rao, V. Ravi Sankar:
Precision in Prostate Cancer Diagnosis: A Comprehensive Study on Neural Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 109-122 (2024) - Bob Subhan Riza, Rina Yunita, Rika Rosnelly:
Comparative Analysis of LSTM and BiLSTM in Image Detection Processing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 244-260 (2024) - S. Sathyanarayanan, K. Srikanta Murthy:
Heart Sound Analysis Using SAINet Incorporating CNN and Transfer Learning for Detecting Heart Diseases. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 152-169 (2024) - Ahmad Al Smadi, Ahed Abugabah, Mutasem K. Alsmadi, Ahmad Alsmadi:
Smart Medical Application of Deep Learning (MUNet) for Detection of COVID-19 from Chest Images. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(1): 133-153 (2024)
skipping 381 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-14 05:40 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint