


default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 40
Volume 40, Numbers 1/2/3, 2022
- Venkata Nagaraju Thatha

, A. Sudhir Babu, D. Haritha
:
Privacy-preserving smart contracts for fuzzy WordNet-based document representation and clustering using regularised K-means method. 2-9 - B. Madhuravani, D. S. R. Murthy, S. Viswanadha Raju:

A dynamic preserving-based WSN framework for medical disease prediction. 10-19 - Suneetha Bulla, Bobba Basaveswararao, Gangadhara Rao Kancherla, K. Chandan, Sirisati Ranga Swamy:

A secure new HRF mechanism for mitigate EDoS attacks. 20-29 - C. V. Subhaskar Reddy, M. V. Subramanyam, P. Ramana Reddy:

Improving QOS in flow controlled CR-ad hoc network with multi criteria routing assisted with cooperative caching and information redundancy. 30-37 - J. N. V. R. Swarup Kumar, D. Suresh:

Design and implementation of a mobility support adaptive trickle algorithm for RPL in vehicular IoT networks. 38-49 - J. Premalatha, Iwin Thanakumar Joseph Swamidason

, Pon Harshavardhanan
, S. P. Anandaraj, V. Jeyakrishnan:
Analytical review on secure communication protocols for 5G and IoT networks. 50-66 - S. Amudha, M. Murali:

F-CHILS maps - a novel encryption scheme for secured medical data transmission using FoG-ban environment. 67-79 - M. Nagageetha, N. V. K. Ramesh:

A feature ranking-based deep learning secure framework for multi-class leaf disease detection. 80-93 - V. Devi Satya Sri, Srikanth Vemuru:

A filter-based machine learning classification framework for cloud-based medical databases. 94-105 - Mohana Sundaram Kuppusamy, D. Nageswari, J. Prakash

:
Cuckoo search assisted fuzzy logic algorithm for smart WSN routing system. 106-115 - N. Sivaranjani

, Jayaraj Jayabharathy:
Forecasting the decision making process of Supreme Court using hierarchical convolutional neural network. 116-126 - Sateesh Kumar Reddy Chirasani, Suchetha Manikandan

:
An optimised machine learning algorithm for classification of epileptic seizures using EMD-based dynamic features of EEG. 127-138 - D. N. V. S. L. S. Indira

, R. Abinaya
, Suresh Babu Chandanapalli
, Ramesh Vatambeti:
Secured personal health records using pattern-based verification and two-way polynomial protocol in cloud infrastructure. 139-147 - M. S. Vinmathi, M. S. Josephine, V. Jeyabalaraja:

An energy and delay aware routing protocol for wireless sensor network assisted IoT to maximise network lifetime. 148-158 - Farhana Ajaz

, Mohd Naseem, Sparsh Sharma, Gaurav Dhiman, Mohammad Shabaz
, S. Vimal
:
Architecture and routing protocols for internet of vehicles: a review. 159-175 - Thotakura Veeranna

, Kiran Kumar Reddy
:
Sliding window assisted mutual redundancy-based feature selection for intrusion detection system. 176-186 - Ravi Prakash, Shashank Pushkar

:
An approach using heuristic pheromones-based ACO modelling for green vehicle routing optimisation. 187-193 - Erukala Suresh Babu

, Mekala Srinivasa Rao, Naganjaneyulu Satuluri, Manikonda Srinivasa Sesha Sai
, Rajendra Kumar Ganiya
:
Secure exchange and effectual verification of educational academic records using hyperledger fabric block chain system. 194-213 - Purshottam J. Assudani, P. Balakrishnan

:
A novel bio-inspired approach for VM load balancing and efficient resource management in cloud. 214-224 - Rajendra Kumar Ganiya

, Duggineni Veeraiah
, Suneetha Bulla, J. Nageswara Rao, G. Joel Sunny Deol:
Efficiency evaluation of HRF mechanism on EDoS attacks in cloud computing services. 225-238

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














