default search action
International Journal of Intelligent Networks, Volume 4
Volume 4, 2023
- Velagapudi Swapna Sindhu, Kavuri Jaya Lakshmi, Ameya Sanjanita Tangellamudi, K. Ghousiya Begum:
A novel deep neural network heartbeats classifier for heart health monitoring. 1-10 - Mumtaz Ahmed, Neda Afreen, Muneeb Ahmed, Mustafa Sameer, Jameel Ahamed:
An inception V3 approach for malware classification using machine learning and transfer learning. 11-18 - A. Roshini, K. V. D. Kiran:
Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks. 19-28 - Karrar A. Abbas, Amir Gharavi, Noor A. Hindi, Mohamed Hassan, Hala Y. Alhosin, Jebraeel Gholinezhad, Hesam Ghoochaninejad, Hossein Barati, James Buick, Paria Yousefi, Reham Alasmar, Salam Al-Saegh:
Unsupervised machine learning technique for classifying production zones in unconventional reservoirs. 29-37 - P. Krishna Kishore, S. Ramamoorthy, V. N. Rajavarman:
ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach. 38-45 - Bita Asadi, Qurban A. Memon:
Efficient breast cancer detection via cascade deep learning network. 46-52 - Padhma Muniraj, K. R. Sabarmathi, R. Leelavathi, Saravana Balaji B.:
HNTSumm: Hybrid text summarization of transliterated news articles. 53-61 - A. Kousalya, Namkyun Baik:
Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique. 62-67 - Amin H. Al-Ka'bi:
Proposed artificial intelligence algorithm and deep learning techniques for development of higher education. 68-73 - Muhammed Niyas K. P., Thiyagarajan Paramasivan:
A systematic review on early prediction of Mild cognitive impairment to alzheimers using machine learning algorithms. 74-88 - Erratum regarding previously published articles. 89
- Neha Sehrawat, Sahil Vashisht, Amritpal Singh:
Solar irradiance forecasting models using machine learning techniques and digital twin: A case study with comparison. 90-102 - Mohammad J. K. Abood, Ghassan Abdul-Majeed:
Classification of network slicing threats based on slicing enablers: A survey. 103-112 - Cunzhuang Liu, Yixuan Wang, Qi Wang:
PARouting: Prediction-supported adaptive routing protocol for FANETs with deep reinforcement learning. 113-121 - Tegil J. John, R. Nagaraj:
Prediction of floods using improved PCA with one-dimensional convolutional neural network. 122-129 - O. Vidhya, S. Ranjitha Kumari:
Quadratic ensemble weighted emphasis boosting based energy and bandwidth efficient routing in Underwater Sensor Network. 130-139 - Wang Xin Hui, Nagender Aneja, Sandhya Aneja, Abdul Ghani Naim:
Conversational chat system using attention mechanism for COVID-19 inquiries. 140-144 - B. Prabadevi, R. Shalini, B. Rose Kavitha:
Customer churning analysis using machine learning algorithms. 145-154 - P. Karthikeyan:
Genetic algorithm with self adaptive immigrants for effective virtual machine placement in cloud environment. 155-161 - Suvarna Patil, Mandeep Kaur, Katarina Rogulj:
Fairness-driven link scheduling approach for heterogeneous gateways for digital twin enabled industry 4.0. 162-170 - Kaushal Shah, Dhruvil Lathiya, Naimish Lukhi, Keyur Parmar, Harshal A. Sanghvi:
A systematic review of decentralized finance protocols. 171-181 - Priyank Sunhare, Manju K. Chattopadhyay:
Cache controlled cluster networking protocol. 182-192 - Pan Cao:
Research on the impact of artificial intelligence-based e-commerce personalization on traditional accounting methods. 193-201 - Kwok Tai Chui, Brij B. Gupta, Priyanka Chaurasia, Varsha Arya, Ammar Almomani, Wadee Alhalabi:
Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset. 202-210 - Yunyan Chang, Jian Xu:
Application of spatial data and 3S robotic technology in digital city planning. 211-217 - Shuji Deng:
Face expression image detection and recognition based on big data technology. 218-223 - Zhaolong Zhou:
Intelligent prediction method for power generation based on deep learning and cloud computing in big data networks. 224-230 - Heqiang Zhou:
Intelligent personalized content recommendations based on neural networks. 231-239 - Sangeeta Kumari, Pavan Kumar Mishra, Arun Kumar Sangaiah, Veena Anand:
Priority based k-coverage hole restoration and m-connectivity using whale optimization scheme for underwater wireless sensor networks. 240-252 - Qingkun Zhu:
Enhancing vulnerability scoring for information security in intelligent computers. 253-260 - Caixia Zhang, Zijian Pan, Chaofan Hou:
Marketing data security and privacy protection based on federated gamma in cloud computing environment. 261-271 - Madhuri Husan Badole, Anuradha D. Thakare:
An optimized framework for VANET routing: A multi-objective hybrid model for data synchronization with digital twin. 272-282 - Xin An, Baigen Cai, Linguo Chai:
Roadside sensor network deployment based on vehicle-infrastructure cooperative intelligent driving. 283-300 - Nagappan Mageshkumar, J. Swapna, A. Pandiaraj, Rajakumar Ramalingam, Moez Krichen, Vinayakumar Ravi:
Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud. 301-309 - Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier:
A novel heterogenous ensemble theory for symmetric 5G cells segmentation: Intelligent RAN analytics. 310-324 - Mingyu Luo:
Multi-sensor based strategy learning with deep reinforcement learning for unmanned ground vehicle. 325-336 - Sunil Gautam, Ketaki Pattani, Mohd. Zuhair, Mamoon Rashid, Nazir Ahmad:
Covertvasion: Depicting threats through covert channels based novel evasive attacks in android. 337-348 - Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang, Shuai Zhang:
Secure short-packet communications using a full-duplex receiver. 349-354 - Iram Javed, Xianlun Tang, Muhammad Asim Saleem, Ashir Javeed, Muhammad Azam Zia, Ijaz Ali Shoukat:
Localization for V2X communication with noisy distance measurement. 355-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.