default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 14
Volume 14, Number 1, March 2023
- Asmaa Abbas Ajwad, Ammar Abdulrahman Ahmed, Muntaha Kamal, Refed Adnan Jaleel, Marium Basheer Mahmood:
Improved Secure IoTs-Based Visual Computing with Image Processing and Artificial Intelligence Techniques for Accurate Predicting of Novel COVID. 1-14 - Sovannarith Heng, Phet Aimtongkham, Chakchai So-In:
A Novel Video-on-Demand Caching Scheme using Hybrid Fuzzy Logic Least Frequency and Recently Used with Support Vector Machine. 15-36 - Gopatoti John Samuel Babu, Manickam Baskar:
Location Aware DFS Scheduling Based Improved Quality of Service Maximization with IoT Devices in Cloud. 37-49 - Mahmud Mustapa, Ummiati Rahmah, Pandu Adi Cakranegara, Winci Firdaus, Dendi Pratama, Robbi Rahim:
Implementation of Feature Selection and Data Split using Brute Force to Improve Accuracy. 50-59 - Doris E. Fuster-Guillén, Oscar Gustavo Guadalupe Zevallos, Segundo Juan Sánchez Tarrillo, Silvia Josefina Aguinaga Vasquez, Miguel A. Saavedra-López, Ronald M. Hernández:
An Ensemble-based Machine Learning Model for Investigating Children Interaction with Robots in Childhood Education. 60-68 - Sofiene Mansouri:
Application of Neural Networks in the Medical Field. 69-81 - Iman Mohammed Burhan, Qusay Abboodi Ali, Inass Shahadha Hussein, Refed Adnan Jaleel:
Mobile-computer Vision Model with Deep Learning for Testing Classification and Status of Flowers Images by using IoTs Devices. 82-94 - Jazem Mutared Alanazi:
Effective Machine-Learning Based Traffic Surveillance Moving Vehicle Detection. 95-105 - Ni Luh Putri Srinadi, Dadang Hermawan, Anak Agung Ngurah Adhi Jaya:
Advancement of Banking and Financial Services Employing Artificial Intelligence and the Internet of Things. 106-117 - R. Udayakumar, Muhammad Abul Kalam, R. Sugumar, R. Elankavi:
Assessing Learning Behaviors Using Gaussian Hybrid Fuzzy Clustering (GHFC) in Special Education Classrooms. 118-125 - Mada Alharbi, Abdulatif Alabdulatif:
Intelligent Transport System based Blockchain to Preventing Routing Attacks. 126-143 - Mirko Bruno Vela López, María Ysabel Arangurí García, Jessie Leila Bravo Jaico, Ángel Antonio Ruiz-Pico, Ronald M. Hernández:
Application of a Data Mining Model to Predict Customer Defection. Case of a Telecommunications Company in Peru. 144-158 - Sourav Sinha, Revathi Sathiya Narayanan, Indrajit Mukherjee:
A Novel Multi-Layer Sparse Regularizer based GRU Model for Consumer Reviews Summarization. 159-173 - Vinh Duc Tran, Phi Thuong Le, Viet Cuong Trinh:
A Secure Proxy Re-Signature Scheme for IoT. 174-188 - Jongkil Kim:
Studies on Inspecting Encrypted Data: Trends and Challenges. 189-199 - C. Bharathi, Duraisamy Rekha:
Load Forecasting for Demand Side Management in Smart Grid using Non-Linear Machine Learning Technique. 200-214
Volume 14, Number 2, June 2023
- Ading Sunarto, Putri Nilam Kencana, Baliyah Munadjat, Iriana Kusuma Dewi, Ali Zaenal Abidin, Robbi Rahim:
Application of Boosting Technique with C4.5 Algorithm to Reduce the Classification Error Rate in Online Shoppers Purchasing Intention. 1-11 - Salim Qadir Mohammed, Mohammed A. ElSheikh Hussein:
Reducing False Negative Intrusions Rates of Ensemble Machine Learning Model based on Imbalanced Multiclass Datasets. 12-30 - S. Bharathi, M. Senthilarasi, K. Hari:
Key Frame Extraction Based on Real-Time Person Availability Using YOLO. 31-40 - I. Indriyani, Ida Ayu Dwi Giriantari, Made Sudarma, I Made Oka Widyantara:
Facial Skin Type Detection for Race Classification using Convolutional Neural Network and Haar Cascade Method. 41-58 - Yolvi J. Ocaña-Fernández, Walter Gómez-Gonzales, Luis Alex Valenzuela Fernández, Segundo Pio Vásquez Ramos, Huguette Fortunata Dueñas Zúñiga, Jackeline Roxana Huaman Fernandez, Marco Antonio Amapanqui Broncano:
A Novel Approach to Predict the Early Childhood Special Education Learning Skills of Autistic Children Using Ensemble Machine Learning. 59-65 - R. Udayakumar, Suvarna Yogesh Pansambal, Yogesh Manohar Gajmal, V. R. Vimal, R. Sugumar:
User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks. 66-81 - Ikin Solikin, Deni Darmawan:
Impact of Artificial Intelligence in Improving the Effectiveness of Accounting Information Systems. 82-93 - Yayuk Suprihartini, Taryana, Andiyan, Pandu Adi Cakranegara, Dani Dwiyandana:
Utilization of Motion Sensors to Reduce Electricity Consumption in Buildings. 94-108 - Kritsanapong Somsuk, Sarutte Atsawaraungsuk, Chanwit Suwannapong, Suchart Khummanee, Chalida Sanemueang:
The Optimal Equations with Chinese Remainder Theorem for RSA's Decryption Process. 109-120 - Isabel Menacho Vargas, Carlos Luy-Montejo, Lourdes Ivonne del Carmen Alcaide-Aranda, Doris Isabel Goicochea Parks, Yoni Magali Maita Cruz, Jessica Paola Palacios-Garay, Aracelli del Carmen Gonzales-Sánchez:
Improved Butterfly Optimization Algorithm for Energy Efficient Antenna Selection Over Wireless Cellular Networks. 121-136 - Lixin Wang, Jianhua Yang, Maochang Qin:
Analyzing Distribution of Packet Round-Trip Times using Fast Fourier Transformation. 137-149
Volume 14, Number 3, September 2023
- Rosa Clavijo-López, Jesús Merino Velásquez, Wayky Alfredo Luy Navarrete, César Augusto Flores-Tananta, Dorothy Luisa Meléndez Morote, Maria Aurora Gonzales Vigo, Doris E. Fuster-Guillén:
Energy-aware and Context-aware Fault Detection Framework for Wireless Sensor Networks. 1-13 - Abdul Rahmat, Ahmad Arif Nurrahman, Susatyo Adhi Pramono, Dadi Ahmadi, Winci Firdaus, Robbi Rahim:
Data Optimization using PSO and K-Means Algorithm. 14-24 - V. Naren Thiruvalar, Yamini R., Manimekalai M. A. P., I Wayan Suryasa, Sugapriya S.:
Enhancing User Experiences in Ubiquitous Soft Computing Environments with Fuzzy Agent Middleware. 25-35 - Venugopal Reddy Modhugu:
Efficient Hybrid CNN Method to Classify the Liver Diseases. 36-47 - Sopha Khoeurt, Chakchai So-In, Pakarat Musikawan, Phet Aimtongkham:
Multidirectional Trust-Based Security Mechanisms for Sinkhole Attack Detection in the RPL Routing Protocol for Internet of Things. 48-76 - Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos-Ugaz, Aníbal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza:
Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm. 77-88 - Chandrababu Majjaru, K. Senthilkumar:
Strengthening IoT Intrusion Detection through the HOPNET Model. 89-102 - Dessy Adriani, Ratna Dewi, Leni Saleh, D. Yadi Heryadi, Fatma Sarie, I Gede Iwan Sudipa, Robbi Rahim:
Using Distance Measure to Perform Optimal Mapping with the K-Medoids Method on Medicinal Plants, Aromatics, and Spices Export. 103-111 - Amira Mohamed, Mohamed H. Mousa, Hamed Nassar:
Effectiveness of Guard Zone in Mitigating Interference in D2D Underlaid Cellular Networks. 112-124 - M. S. Nirmala:
Behavioural Analysis of Deaf and Mute People Using Gesture Detection. 125-142 - Belal K. Elfarra, Mamoun A. Salha, Raed S. Rasheed, Jehad Aldahdooh, Aiman Ahmed AbuSamra:
Enhancing the Lifetime of WSN Using a Modified Ant Colony Optimization Algorithm. 143-155 - Olga Fisenko, Larisa Adonina, Heriberto Solis Sosa, Shiguay Guizado Giomar Arturo, Angélica Sánchez Castro, Fernando Willy Morillo Galarza, David Aroni Palomino:
Advancements in Flexible Antenna Design: Enabling Tri-Band Connectivity for WLAN, WiMAX, and 5G Applications. 156-168 - J. Brindha Merin, W. Aisha Banu, Akila R., A. Radhika:
Semantic Annotation Based Mechanism for Web Service Discovery and Recommendation. 169-185 - Yusra Jadallah Abed Khasawneh, Mohamad Ahmad Saleem Khasawneh:
Availability of Voice-Recognition Devices to Support Visually Impaired Students in Saudi Arabian Universities. 186-193 - Rika Rosnelly, Bob Subhan Riza, S. Suparni:
Comparative Analysis of Support Vector Machine and Convolutional Neural Network for Malaria Parasite Classification and Feature Extraction. 194-217 - Akila R., J. Brindha Merin, A. Radhika, Niyati Kumari Behera:
Human Activity Recognition Using Ensemble Neural Networks and The Analysis of Multi-Environment Sensor Data Within Smart Environments. 218-229 - Yus Hermansyah:
Assessing the Impact of Communicative Artificial Intelligence Based Accounting Information Systems on Small and Medium Enterprises. 230-239 - Sofiene Mansouri, Souhir Chabchoub, Yousef Alharbi, Abdulrahman Alqahtani:
Blockchain Technology in Enhancing Health Care Ecosystem for Sustainable Development. 240-252 - Alcides Bernardo Tello, Sohaib Alam, Archana Ravindra Salve, Kusuma Kumari B. M, Meena Arora:
Quantitative Evaluation of Android Application Privacy Security Based on Privacy Policy and Behaviour. 253-266 - Ratih Hurriyati, A. Ana, Sulastri, Lisnawati, Thosporn Sawangsang:
Stock Market Trend Analysis and Machine Learning-based Predictive Evaluation. 267-281
Volume 14, Number 4, December 2023
- Sudad Gharib Hassan, Sara Alshwani, Aras Al-Dawoodi:
Design and Investigation of Modal Excitation in Tapered Optical Fiber for a Mode Division Multiplexed Transmission System. 1-9 - S. Kavitha, R. Kaniezhil:
Enhanced Wireless Network Usage and Loading on Network Delay using Cognitive Radio Network. 10-22 - Emna Bouhamed, Hend Marouane, Faouzi Zerai:
Dynamic Resource Allocation Approach for Interference Mitigation based on NOMA in Network Operating in Both Uplink and Downlink. 23-44 - K. Veerasamy, E. J. Thomson Fredrik:
Intelligence System towards Identify Weeds in Crops and Vegetables Plantation Using Image Processing and Deep Learning Techniques. 45-59 - R. Ramesh, M. Jeyakarthic:
Fuzzy Support Vector Machine Based Outlier Detection for Financial Credit Score Prediction System. 60-73 - E. Latifah, A. Fathjri Wisesa, N. Adi Pramono, T. Chusniyah:
Optimization of Depression Level Detection Based on Noninvasive Parameters with Artificial Neural Network. 74-83 - Orchu Aruna, Sk. Sameerunnisa, Ramachandran Vedantham:
Routing in Mobile ad Hoc Networks Using Machine Learning Techniques. 84-95 - U. Kumaran, S. Thangam, Nidhin Prabhakar T. V, Jana Selvaganesan, H. N. Vishwas:
Adversarial Defense: A GAN-IF Based Cyber-security Model for Intrusion Detection in Software Piracy. 96-114 - Ahed Abugabah:
Smart Medical Systems Based IoT: Exploring the Relationship Between Essential Algorithms and Service Orientation. 115-127 - Husam Suleiman:
𝑃c𝜀𝜅max-Means++: Adapt-𝑃 Driven by Energy and Distance Quality Probabilities Based on 𝜅-Means++ for the Stable Election Protocol (SEP). 128-148 - S. Subhashini, S. Revathi:
A New Fusion Feature Selection Model (FFSM) based Feature Extraction System for Hand Gesture Recognition. 149-163 - Ammar Odeh, Anas Abu Taleb:
A Multi-Faceted Encryption Strategy for Securing Patient Information in Medical Imaging. 164-176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.