


default search action
International Journal of Intelligent Networks, Volume 4
Volume 4, 2023
- Velagapudi Swapna Sindhu, Kavuri Jaya Lakshmi, Ameya Sanjanita Tangellamudi, K. Ghousiya Begum

:
A novel deep neural network heartbeats classifier for heart health monitoring. 1-10 - Mumtaz Ahmed, Neda Afreen, Muneeb Ahmed, Mustafa Sameer

, Jameel Ahamed
:
An inception V3 approach for malware classification using machine learning and transfer learning. 11-18 - A. Roshini

, K. V. D. Kiran
:
Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks. 19-28 - Karrar A. Abbas, Amir Gharavi, Noor A. Hindi, Mohamed Hassan

, Hala Y. Alhosin, Jebraeel Gholinezhad
, Hesam Ghoochaninejad, Hossein Barati, James Buick
, Paria Yousefi, Reham Alasmar
, Salam Al-Saegh:
Unsupervised machine learning technique for classifying production zones in unconventional reservoirs. 29-37 - P. Krishna Kishore, S. Ramamoorthy, V. N. Rajavarman:

ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach. 38-45 - Bita Asadi, Qurban A. Memon

:
Efficient breast cancer detection via cascade deep learning network. 46-52 - Padhma Muniraj

, K. R. Sabarmathi
, R. Leelavathi, Saravana Balaji B.
:
HNTSumm: Hybrid text summarization of transliterated news articles. 53-61 - A. Kousalya, Namkyun Baik:

Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique. 62-67 - Amin H. Al-Ka'bi

:
Proposed artificial intelligence algorithm and deep learning techniques for development of higher education. 68-73 - Muhammed Niyas K. P.

, Thiyagarajan Paramasivan:
A systematic review on early prediction of Mild cognitive impairment to alzheimers using machine learning algorithms. 74-88 - Erratum regarding previously published articles. 89

- Neha Sehrawat

, Sahil Vashisht
, Amritpal Singh
:
Solar irradiance forecasting models using machine learning techniques and digital twin: A case study with comparison. 90-102 - Mohammad J. K. Abood

, Ghassan Abdul-Majeed
:
Classification of network slicing threats based on slicing enablers: A survey. 103-112 - Cunzhuang Liu, Yixuan Wang, Qi Wang:

PARouting: Prediction-supported adaptive routing protocol for FANETs with deep reinforcement learning. 113-121 - Tegil J. John, R. Nagaraj:

Prediction of floods using improved PCA with one-dimensional convolutional neural network. 122-129 - O. Vidhya, S. Ranjitha Kumari:

Quadratic ensemble weighted emphasis boosting based energy and bandwidth efficient routing in Underwater Sensor Network. 130-139 - Wang Xin Hui

, Nagender Aneja
, Sandhya Aneja
, Abdul Ghani Naim
:
Conversational chat system using attention mechanism for COVID-19 inquiries. 140-144 - B. Prabadevi

, R. Shalini, B. Rose Kavitha
:
Customer churning analysis using machine learning algorithms. 145-154 - P. Karthikeyan

:
Genetic algorithm with self adaptive immigrants for effective virtual machine placement in cloud environment. 155-161 - Suvarna Patil, Mandeep Kaur

, Katarina Rogulj
:
Fairness-driven link scheduling approach for heterogeneous gateways for digital twin enabled industry 4.0. 162-170 - Kaushal Shah

, Dhruvil Lathiya, Naimish Lukhi, Keyur Parmar, Harshal A. Sanghvi
:
A systematic review of decentralized finance protocols. 171-181 - Priyank Sunhare, Manju K. Chattopadhyay

:
Cache controlled cluster networking protocol. 182-192 - Pan Cao:

Research on the impact of artificial intelligence-based e-commerce personalization on traditional accounting methods. 193-201 - Kwok Tai Chui

, Brij B. Gupta, Priyanka Chaurasia
, Varsha Arya, Ammar Almomani
, Wadee Alhalabi
:
Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset. 202-210 - Yunyan Chang

, Jian Xu:
Application of spatial data and 3S robotic technology in digital city planning. 211-217 - Shuji Deng

:
Face expression image detection and recognition based on big data technology. 218-223 - Zhaolong Zhou

:
Intelligent prediction method for power generation based on deep learning and cloud computing in big data networks. 224-230 - Heqiang Zhou:

Intelligent personalized content recommendations based on neural networks. 231-239 - Sangeeta Kumari

, Pavan Kumar Mishra, Arun Kumar Sangaiah, Veena Anand:
Priority based k-coverage hole restoration and m-connectivity using whale optimization scheme for underwater wireless sensor networks. 240-252 - Qingkun Zhu:

Enhancing vulnerability scoring for information security in intelligent computers. 253-260 - Caixia Zhang, Zijian Pan, Chaofan Hou:

Marketing data security and privacy protection based on federated gamma in cloud computing environment. 261-271 - Madhuri Husan Badole, Anuradha D. Thakare:

An optimized framework for VANET routing: A multi-objective hybrid model for data synchronization with digital twin. 272-282 - Xin An, Baigen Cai, Linguo Chai:

Roadside sensor network deployment based on vehicle-infrastructure cooperative intelligent driving. 283-300 - Nagappan Mageshkumar, J. Swapna

, A. Pandiaraj, Rajakumar Ramalingam, Moez Krichen
, Vinayakumar Ravi
:
Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud. 301-309 - Jean Nestor M. Dahj

, Kingsley A. Ogudo
, Leandro Boonzaaier:
A novel heterogenous ensemble theory for symmetric 5G cells segmentation: Intelligent RAN analytics. 310-324 - Mingyu Luo

:
Multi-sensor based strategy learning with deep reinforcement learning for unmanned ground vehicle. 325-336 - Sunil Gautam, Ketaki Pattani

, Mohd. Zuhair
, Mamoon Rashid
, Nazir Ahmad:
Covertvasion: Depicting threats through covert channels based novel evasive attacks in android. 337-348 - Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang, Shuai Zhang:

Secure short-packet communications using a full-duplex receiver. 349-354 - Iram Javed, Xianlun Tang, Muhammad Asim Saleem

, Ashir Javeed
, Muhammad Azam Zia, Ijaz Ali Shoukat:
Localization for V2X communication with noisy distance measurement. 355-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














