


default search action
EAI Endorsed Transactions on Scalable Information Systems, Volume 12
Volume 12, Number 1, 2025
- Anh-Nhat Nguyen, Tung-Son Ngo, Ngoc-Anh Bui, Phuong-Chi Le, Manh-Duc Hoang:
Secrecy Offloading Analysis of NOMA-based UAV-aided MEC in IoT Networks with Imperfect CSI and SIC. - K. Krishna Rani Samal:
Auto imputation enabled deep Temporal Convolutional Network (TCN) model for pm2.5 forecasting. - Chethana H. T.
, Trisiladevi C. Nagavi, P. Mahesha
, Vinayakumar Ravi
, H. L. Gururaj:
FaceNet - A Framework for Age Variation Facial Digital Images. - Parita Shah, Hiren Patel, Priya Swaminarayan:
Multitask Sentiment Analysis and Topic Classification Using BERT. - Joshua Lee
, Joon Soo Park
, Boxi Feng, Kate N. Wang:
Cross-Sectional Analysis of Australian Dental Practitioners' Perceptions of Teledentistry. - Manish Gupta, Anish Gupta, Britto Raj S., Annu Sharma:
JWTAMH: JSON Web Tokens Based Authentication Mechanism for HADOOP. - Chunming Xu:
A novel color image encryption method using Fibonacci transformation and chaotic systems. - Srinivasan P.
, Kannan K.:
An IoT-enabled device for remotely monitoring and controlling solar photovoltaic systems. - Praveen Gupta, Ajay Prasad
:
Fortifying Patient Data Security in the Digital Era: A Two-Layer Approach with Data Hiding and Electrocardiogram. - Kevin Mcnally, Hoshang Kolivand
:
Comparative Analysis of Bitcoin Mining Machines and Their Global Environmental Impact. - Meena Ugale
, J. Midhunchakkaravarthy:
An efficient Video Forgery Detection using Two-Layer Hybridized Deep CNN classifier. - Kalla Bharath Vardhan, Mandava Nidhish, Surya Kiran C., Nahid Shameem Dudekula, Sai Charan Varanasi, R. M. Bhavadharini:
Eye Disease Detection Using Deep Learning Models with Transfer Learning Techniques. - B. Gayathri:
OPIN-ITP: Optimized Physics Informed Network with Trimmed Score Regression Based Insider Threats Prediction in Cloud Computing. - Ankush Verma, Namrata Dhanda, Vibhash Yadav:
Enhanced Edge Detection through Binary Particle Swarm Optimization and L0 Guided Filtering. - Fang Lu:
Large data density peak clustering based on sparse auto-encoder and data space meshing via evidence probability distribution. - G. S. Prabowo, A. S. Budiyanta, A. P. Adi, A. Wirawan, H. Mardikasari
, F. S. Pranoto, T. K. Wardana, D. Kusumoaji, I. Rismayanti, A. Septiyana, A. Aziz, B. H. Trisasongko:
Drone-Assisted Climate Smart Agriculture (DACSA): The design of the groundwork flow data for drone operations. - Yulisa Gardenia, Alcianno Ghobadi Gani:
Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model. - Bin Peng:
Development of New Spray Dust Suppression Materials in Metal Mines and Prediction of Algorithm Simulation Effect. - R. Bhuvanya, T. Kujani, K. Sivakumar:
Fusing Attention and Convolution: A Hybrid Model for Brain Stroke Prediction. - Enqin Yao:
Coupling Benefit of Land Use, Land Cover Change and Soil Erosion Under Algorithmic Optimization Model. - Archana Bomnale, Avinash More:
Node-Alive Index Driven Redundancy Elimination for Energy-Efficient Wireless Sensor Networks. - Xiulan Hao, Wenjing Xu, Xu Huang, Zhenzhen Sheng, Huayun Yan:
MFUIE: A Fake News Detection Model Based on Multimodal Features and User Information Enhancement. - Hakeem Quadri:
Mixed Bayesian Stackelberg Strategies for Robust Adversarial Classifiers. - G. Asmat, K. M. Maiyama:
Bitcoin Price Prediction Using N-BEATs ML Technique. - Anjanabhargavi Kulkarni
, R. H. Goudar, Vijayalaxmi N. Rathod, Dhananjaya G. M, Geetabai S. Hukkeri:
New directions for adapting intelligent communication and standardization towards 6G. - Gunjani Vaghela, Nishant Sanghani, Bhavesh Borisaniya
:
Review on DDoS Attack in Controller Environment of Software Defined Network. - Anjanabhargavi Kulkarni, R. H. Goudar, Joshi Vinayak B., Harish H. T.:
Bridging the Gap to 6G: Leveraging the Synergy of Standardization and Adaptability. - Ritu Gautam, Manik Sharma:
Computational Approaches for Anxiety and Depression: A Meta- Analytical Perspective. - Praveen Sadasivan, Ravinder Singh:
A Review of Prediction Techniques used in the Stock Market. - Tomohiro Kawata, Takumi Kato, Kazuhiko Tsuda:
Effect of Title Length and Word Count on Views: Evidence from Microsoft Excel videos on YouTube. - Mitra Madanchian
, Hamed Taherdoost:
Exploring the Landscape of Multicriteria Decision Making in Software Project Management: Trends, Challenges, and Future Directions. - Mitra Madanchian, Hamed Taherdoost:
Navigating the New Frontier: Exploring Emerging Trends and Strategies in Startup Innovation. - Thi Tuan Linh Pham, Hamed Taherdoost, Tuan-Vinh Le:
Scalable Information Systems for Agribusiness: Developing Farmers' Digital Capabilities for E-commerce Platform Adoption. - Nachaat Mohamed, Hamed Taherdoost, Mitra Madanchian
:
Enhancing Spear Phishing Defense with AI: A Comprehensive Review and Future Directions.
Volume 12, Number 2, 2025
- Salman Farsi, Mahfuzulhoq Chowdhury:
EcomFraudEX: An Explainable Machine Learning Framework for Victim-Centric and Dual-Sided Fraud Incident Classification in E-Commerce. - Aya Goudjil, Aicha Benyoucef, M'hamed Hamadouche, Mohamed Amine Riahla:
Efficient DNA-Based Logistic Mapping Algorithm for Color Image Encryption. - Yang-qing Wang, Wenke Tan, Shui-gen Ning, Bing-xin Cao:
Virtual reality simulation research on the quality and strength of the riveting process for the top cover accessory of battery pack. - Junhua Shao, Qiang Li, Junmei Tan:
Design and Simulation of Quasi-microstrip Yagi Antenna in Railway Mobile Communication. - Roxana Quiroz-Valenzuela, Oscar Gutierrez-Baracco, Felix Colina-Ysea
, Jean Arana-Alencastre:
Digital Innovation in Admission Processes based on an Architectural Model of Information Security using Blockchain Technology. - Guohui Wang:
Research on the impact of digital economy on the reduction of the gap between urban and rural areas. - Mohammadjavad Sharifpour, Mehdi Shajari, Seyyed Amir Asghari Tochae:
Improved Authentication in Information Systems through a Mobile Identity Management Scheme (MoIdM-MSS) Utilizing Mobile Signature Service. - Archana Bomnale, Avinash More:
A survey of data aggregation and routing protocols for energy-efficient wireless sensor networks. - Rehan Tariq
, Pradeep Isawasan
, Lalitha Shamugam
, Muhammad Akmal Hakim Ahmad Asmawi
, Noramira Athirah Nor Azman, Izzal Asnira Zolkepli
:
Exploring Social Media Research Trends in Malaysia using Bibliometric Analysis and Topic Modelling.
Volume 12, Number 3, 2025
- Rana Ghazali, Douglas G. Down:
Smart Data Prefetching Using KNN to Improve Hadoop Performance.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.