UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

4 5 6 7 8
zadetkov: 154
51.
  • Interactive Learning Experi... Interactive Learning Experience-Driven Smart Communications Networks for Cognitive Load Management in Grammar Learning Context
    Refat, Nadia; Rahman, Md. Arafatur; Asyhari, A. Taufiq ... IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    The widespread adoption of technology-enhanced learning in various knowledge disciplines has pushed forward the development of information technology-assisted media for language learning and ...
Celotno besedilo

PDF
52.
  • Unauthorized and privacy‐in... Unauthorized and privacy‐intrusive human activity watching through Wi‐Fi signals: An emerging cybersecurity threat
    Qi, Fang; Zhao, Yingkai; Bhuiyan, Md Zakirul Alam ... Concurrency and computation, 30 August 2023, Letnik: 35, Številka: 19
    Journal Article
    Recenzirano

    Summary Nowadays, wireless radio signals are ubiquitous and are around us; some signals pass through us, and some reflect off us. Substantial advancements in recent years demonstrate that such ...
Celotno besedilo
53.
  • On authenticated skyline qu... On authenticated skyline query processing over road networks
    Zhu, Xiaoyu; Wu, Jie; Chang, Wei ... Concurrency and computation, 25 June 2022, Letnik: 34, Številka: 14
    Journal Article
    Recenzirano

    Summary In recent times, many location‐based service providers (LBSPs) choose to outsource data query services to third‐party cloud service providers (CSPs). This allows users to easily search for ...
Celotno besedilo
54.
  • Towards Debris Information ... Towards Debris Information Analysis and Abstraction for Wi-Fi Radar Edge in Collapsed Structures
    Khan, Muhammad Faizan; Wang, Guojun; Bhuiyan, Md. Zakirul Alam IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Structural collapses are widespread, owing to a surge in climatic changes, earthquakes, and terrorism. Therefore, there are some technological rescue methods in practice that involve sensors, radars, ...
Celotno besedilo

PDF
55.
  • Trajectory Privacy Preserva... Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services
    Tian Wang; Jiandian Zeng; Bhuiyan, Md Zakirul Alam ... IEEE access, 2017, Letnik: 5
    Journal Article
    Recenzirano
    Odprti dostop

    The development of mobile cloud computing technology has made location-based service (LBS) increasingly more popular. Given the continuous requests to cloud LBS servers, the amounts of location and ...
Celotno besedilo

PDF
56.
  • Auction-based adaptive sens... Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks
    Zheng, Jin; Bhuiyan, Md Zakirul Alam; Liang, Shaohua ... Future generation computer systems, 10/2014, Letnik: 39
    Journal Article
    Recenzirano

    Due to the severe resource constraints in wireless sensor networks (WSNs), designing an efficient target tracking algorithm for WSNs in terms of energy efficiency and high tracking quality becomes a ...
Celotno besedilo
57.
  • Re‐ranking with multiple ob... Re‐ranking with multiple objective optimization in recommender system
    Liu, Xiangyong; Wang, Guojun; Zakirul Alam Bhuiyan, Md Transactions on emerging telecommunications technologies, January 2022, 2022-01-00, Letnik: 33, Številka: 1
    Journal Article
    Recenzirano

    The ranking algorithm in the recommender system aims at optimizing accuracy during training so that it pays too much attention to the relevance of the individual and ignores the mutual influence ...
Celotno besedilo
58.
  • Secure Verifiable Database ... Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing
    Shen, Jian; Liu, Dengzhi; Bhuiyan, Md Zakirul Alam ... IEEE transactions on emerging topics in computing, 04/2020, Letnik: 8, Številka: 2
    Journal Article
    Recenzirano

    Storage is one of the main services that the cloud provides users. Utilizing the cloud to store large amounts of data can alleviate the cost of storage and the hardware investment on the local side, ...
Celotno besedilo
59.
  • Integrating Blockchain With... Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems
    Bosri, Rabeya; Rahman, Mohammad Shahriar; Bhuiyan, Md Zakirul Alam ... IEEE transactions on network science and engineering, 04/2021, Letnik: 8, Številka: 2
    Journal Article
    Recenzirano

    Data privacy is one of the intriguing problems in e-commerce site. For personal or business purposes, users have to disclose their private data to these e-commerce sites. Often such businesses use ...
Celotno besedilo
60.
Celotno besedilo
4 5 6 7 8
zadetkov: 154

Nalaganje filtrov