![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
International Journal of Intelligent Networks, Volume 4
Volume 4, 2023
- Velagapudi Swapna Sindhu, Kavuri Jaya Lakshmi, Ameya Sanjanita Tangellamudi, K. Ghousiya Begum
:
A novel deep neural network heartbeats classifier for heart health monitoring. 1-10 - Mumtaz Ahmed, Neda Afreen, Muneeb Ahmed, Mustafa Sameer, Jameel Ahamed
:
An inception V3 approach for malware classification using machine learning and transfer learning. 11-18 - A. Roshini
, K. V. D. Kiran
:
Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks. 19-28 - Karrar A. Abbas, Amir Gharavi, Noor A. Hindi, Mohamed Hassan
, Hala Y. Alhosin, Jebraeel Gholinezhad
, Hesam Ghoochaninejad, Hossein Barati, James Buick
, Paria Yousefi, Reham Alasmar, Salam Al-Saegh:
Unsupervised machine learning technique for classifying production zones in unconventional reservoirs. 29-37 - P. Krishna Kishore, S. Ramamoorthy, V. N. Rajavarman:
ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach. 38-45 - Bita Asadi, Qurban A. Memon
:
Efficient breast cancer detection via cascade deep learning network. 46-52 - Padhma Muniraj
, K. R. Sabarmathi
, R. Leelavathi, Saravana Balaji B.
:
HNTSumm: Hybrid text summarization of transliterated news articles. 53-61 - A. Kousalya, Namkyun Baik:
Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique. 62-67 - Amin H. Al-Ka'bi
:
Proposed artificial intelligence algorithm and deep learning techniques for development of higher education. 68-73 - Muhammed Niyas K. P., Thiyagarajan P.:
A systematic review on early prediction of Mild cognitive impairment to alzheimers using machine learning algorithms. 74-88 - Erratum regarding previously published articles. 89
- Neha Sehrawat
, Sahil Vashisht
, Amritpal Singh:
Solar irradiance forecasting models using machine learning techniques and digital twin: A case study with comparison. 90-102 - Mohammad J. K. Abood
, Ghassan Abdul-Majeed
:
Classification of network slicing threats based on slicing enablers: A survey. 103-112 - Cunzhuang Liu, Yixuan Wang, Qi Wang:
PARouting: Prediction-supported adaptive routing protocol for FANETs with deep reinforcement learning. 113-121 - Tegil J. John, R. Nagaraj:
Prediction of floods using improved PCA with one-dimensional convolutional neural network. 122-129 - O. Vidhya, S. Ranjitha Kumari:
Quadratic ensemble weighted emphasis boosting based energy and bandwidth efficient routing in Underwater Sensor Network. 130-139 - Wang Xin Hui
, Nagender Aneja
, Sandhya Aneja
, Abdul Ghani Naim
:
Conversational chat system using attention mechanism for COVID-19 inquiries. 140-144 - B. Prabadevi
, R. Shalini, B. Rose Kavitha
:
Customer churning analysis using machine learning algorithms. 145-154 - P. Karthikeyan
:
Genetic algorithm with self adaptive immigrants for effective virtual machine placement in cloud environment. 155-161 - Suvarna Patil, Mandeep Kaur
, Katarina Rogulj
:
Fairness-driven link scheduling approach for heterogeneous gateways for digital twin enabled industry 4.0. 162-170 - Kaushal Shah
, Dhruvil Lathiya, Naimish Lukhi, Keyur Parmar, Harshal A. Sanghvi
:
A systematic review of decentralized finance protocols. 171-181 - Priyank Sunhare, Manju K. Chattopadhyay
:
Cache controlled cluster networking protocol. 182-192 - Pan Cao:
Research on the impact of artificial intelligence-based e-commerce personalization on traditional accounting methods. 193-201 - Kwok Tai Chui
, Brij B. Gupta, Priyanka Chaurasia
, Varsha Arya, Ammar Almomani
, Wadee Alhalabi:
Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset. 202-210 - Yunyan Chang
, Jian Xu:
Application of spatial data and 3S robotic technology in digital city planning. 211-217 - Shuji Deng
:
Face expression image detection and recognition based on big data technology. 218-223 - Zhaolong Zhou
:
Intelligent prediction method for power generation based on deep learning and cloud computing in big data networks. 224-230 - Heqiang Zhou:
Intelligent personalized content recommendations based on neural networks. 231-239 - Sangeeta Kumari
, Pavan Kumar Mishra, Arun Kumar Sangaiah, Veena Anand:
Priority based k-coverage hole restoration and m-connectivity using whale optimization scheme for underwater wireless sensor networks. 240-252 - Qingkun Zhu:
Enhancing vulnerability scoring for information security in intelligent computers. 253-260 - Caixia Zhang, Zijian Pan, Chaofan Hou:
Marketing data security and privacy protection based on federated gamma in cloud computing environment. 261-271 - Madhuri Husan Badole, Anuradha D. Thakare:
An optimized framework for VANET routing: A multi-objective hybrid model for data synchronization with digital twin. 272-282 - Xin An, Baigen Cai, Linguo Chai:
Roadside sensor network deployment based on vehicle-infrastructure cooperative intelligent driving. 283-300 - Nagappan Mageshkumar, J. Swapna, A. Pandiaraj, Rajakumar Ramalingam, Moez Krichen
, Vinayakumar Ravi
:
Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud. 301-309 - Jean Nestor M. Dahj
, Kingsley A. Ogudo
, Leandro Boonzaaier:
A novel heterogenous ensemble theory for symmetric 5G cells segmentation: Intelligent RAN analytics. 310-324 - Mingyu Luo
:
Multi-sensor based strategy learning with deep reinforcement learning for unmanned ground vehicle. 325-336 - Sunil Gautam, Ketaki Pattani
, Mohd. Zuhair, Mamoon Rashid
, Nazir Ahmad:
Covertvasion: Depicting threats through covert channels based novel evasive attacks in android. 337-348 - Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang, Shuai Zhang:
Secure short-packet communications using a full-duplex receiver. 349-354 - Iram Javed, Xianlun Tang, Muhammad Asim Saleem
, Ashir Javeed
, Muhammad Azam Zia, Ijaz Ali Shoukat:
Localization for V2X communication with noisy distance measurement. 355-360
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.