UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 153
41.
  • Ring: Real-Time Emerging An... Ring: Real-Time Emerging Anomaly Monitoring System Over Text Streams
    Yu, Weiren; Li, Jianxin; Bhuiyan, Zakirul Alam ... IEEE transactions on big data, 12/2019, Letnik: 5, Številka: 4
    Journal Article
    Recenzirano

    Microblog platforms have been extremely popular in the big data era due to its real-time diffusion of information. It's important to know what anomalous events are trending on the social network and ...
Celotno besedilo
42.
  • OCP: an OLAP-based bus crow... OCP: an OLAP-based bus crowdedness smart-perceiving mechanism for urban transportation
    Gong, Shiwen; Liu, Dandan; Bhuiyan, Md Zakirul Alam ... Connection science, 12/2022, Letnik: 34, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we deal with the problem of similarity search about crowdedness for participatory-sensing buses for urban transportation. Similarity search is usually applied for measuring ...
Celotno besedilo
43.
  • Smart healthcare-oriented o... Smart healthcare-oriented online prediction of lower-limb kinematics and kinetics based on data-driven neural signal decoding
    Yi, Chunzhi; Jiang, Feng; Bhuiyan, Md Zakirul Alam ... Future generation computer systems, January 2021, 2021-01-00, Letnik: 114
    Journal Article
    Recenzirano

    The increasing demand for fast and accurate gait-impaired disease diagnosis requires a real-time prediction of gait information in order to enable online information access to determining the disease ...
Celotno besedilo
44.
  • Modeling and clustering att... Modeling and clustering attacker activities in IoT through machine learning techniques
    Sun, Peiyuan; Li, Jianxin; Alam Bhuiyan, Md Zakirul ... Information sciences, April 2019, 2019-04-00, Letnik: 479
    Journal Article
    Recenzirano

    With the rise of the Internet of Things, malicious attacks pose serious threats to the massive vulnerable IoT devices. Recently, attackers have initiated increasingly coordinated attack activities ...
Celotno besedilo
45.
  • An incentive-based protecti... An incentive-based protection and recovery strategy for secure big data in social networks
    Wu, Youke; Huang, Haiyang; Wu, Ningyun ... Information sciences, January 2020, 2020-01-00, Letnik: 508
    Journal Article
    Recenzirano

    Big data sources, such as smart vehicles, IoT devices, and sensor networks, differ from traditional data sources in both output volume and variety. Big data is usually stored on various types of ...
Celotno besedilo
46.
  • Acoustic sensor networks in... Acoustic sensor networks in the Internet of Things applications
    Kamruzzaman, Joarder; Wang, Guojun; Karmakar, Gour ... Future generation computer systems, September 2018, 2018-09-00, Letnik: 86
    Journal Article
    Recenzirano

    Recent advancements in acoustic sensing and electronics technologies offer enormous opportunities for engineers to explore underwater and underground realms and deploy a diverse range of applications ...
Celotno besedilo
47.
  • AntiConcealer: Reliable Det... AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI-Assisted IoT
    Zhang, Jiwei; Bhuiyan, Md Zakirul Alam; Yang, Xu ... IEEE internet of things journal, 11/2022, Letnik: 9, Številka: 22
    Journal Article

    Internet of Things (IoT) is one of the rapidly developing technologies today that attract huge real-world applications. However, the reality is that IoT is easily vulnerable to numerous types of ...
Celotno besedilo
48.
  • Incremental term representa... Incremental term representation learning for social network analysis
    Peng, Hao; Bao, Mengjiao; Li, Jianxin ... Future generation computer systems, September 2018, 2018-09-00, Letnik: 86
    Journal Article
    Recenzirano

    Term representation methods as computable and semantic tools have been widely applied in social network analysis. This paper provides a new perspective that can incrementally factorize co-occurrence ...
Celotno besedilo
49.
  • Provably Secure Identity-Ba... Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments
    Karati, Arijit; Islam, Sk Hafizul; Biswas, G. P. ... IEEE internet of things journal, 08/2018, Letnik: 5, Številka: 4
    Journal Article

    Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in the context of the industry as digitization becomes a business priority for various organizations. Therefore, ...
Celotno besedilo
50.
  • Interactive Learning Experi... Interactive Learning Experience-Driven Smart Communications Networks for Cognitive Load Management in Grammar Learning Context
    Refat, Nadia; Rahman, Md. Arafatur; Asyhari, A. Taufiq ... IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    The widespread adoption of technology-enhanced learning in various knowledge disciplines has pushed forward the development of information technology-assisted media for language learning and ...
Celotno besedilo

PDF
3 4 5 6 7
zadetkov: 153

Nalaganje filtrov