UP - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 3.416
1.
Celotno besedilo
2.
  • Being left-behind, mental d... Being left-behind, mental disorder, and elderly suicide in rural China: a case–control psychological autopsy study
    Zhou, Liang; Wang, Guojun; Jia, Cunxian ... Psychological medicine, 02/2019, Letnik: 49, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Suicide rate among rural elderly is the highest among all age groups in China, yet little is known about the suicide risks in this rapidly growing vulnerable population. This matched case-control ...
Celotno besedilo

PDF
3.
  • A Secure and Fast Image Enc... A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes
    Zhu, Shenli; Wang, Guojun; Zhu, Congxu Entropy (Basel, Switzerland), 08/2019, Letnik: 21, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    In order to improve the security and efficiency of image encryption systems comprehensively, a novel chaotic S-box based image encryption scheme is proposed. Firstly, a new compound chaotic system, ...
Celotno besedilo

PDF
4.
  • OBPP: An ontology-based fra... OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city
    Gheisari, Mehdi; Najafabadi, Hamid Esmaeili; Alzubi, Jafar A. ... Future generation computer systems, October 2021, 2021-10-00, Letnik: 123
    Journal Article
    Recenzirano

    IoT devices generate data over time, which is going to be shared with other parties to provide high-level services. Smart City is one of its applications which aims to manage cities automatically. ...
Celotno besedilo
5.
  • A Blockchain-Based Nonrepud... A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT
    Xu, Yang; Ren, Ju; Wang, Guojun ... IEEE transactions on industrial informatics, 06/2019, Letnik: 15, Številka: 6
    Journal Article

    Emerging network computing technologies extend the functionalities of industrial IoT (IIoT) terminals. However, this promising service-provisioning scheme encounters problems in untrusted and ...
Celotno besedilo
6.
  • Detection of hidden data at... Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system
    Zhang, Guangxue; Wang, Tian; Wang, Guojun ... Concurrency and computation, 10 April 2021, Letnik: 33, Številka: 7
    Journal Article
    Recenzirano

    Summary With the popularity of Sensor‐Cloud, its security issues get more attention from industry and academia. Especially, Sensor‐Cloud underlying network is very vulnerable to internal attacks due ...
Celotno besedilo
7.
  • Streptomycetes: Surrogate h... Streptomycetes: Surrogate hosts for the genetic manipulation of biosynthetic gene clusters and production of natural products
    Nepal, Keshav K.; Wang, Guojun Biotechnology advances, 01/2019, Letnik: 37, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Due to the worldwide prevalence of multidrug-resistant pathogens and high incidence of diseases such as cancer, there is an urgent need for the discovery and development of new drugs. Nearly half of ...
Celotno besedilo

PDF
8.
  • Dependable Structural Healt... Dependable Structural Health Monitoring Using Wireless Sensor Networks
    Bhuiyan, Md Zakirul Alam; Guojun Wang; Jie Wu ... IEEE transactions on dependable and secure computing, 07/2017, Letnik: 14, Številka: 4
    Journal Article
    Odprti dostop

    As an alternative to current wired-based networks, wireless sensor networks (WSNs) are becoming an increasingly compelling platform for engineering structural health monitoring (SHM) due to ...
Celotno besedilo

PDF
9.
  • Local Area Prediction-Based... Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks
    Bhuiyan, Md Zakirul Alam; Guojun Wang; Vasilakos, Athanasios V. IEEE transactions on computers, 2015-July-1, 2015-7-1, 20150701, Letnik: 64, Številka: 7
    Journal Article
    Recenzirano

    Tracking mobile targets in wireless sensor networks (WSNs) has many important applications. As it is often the case in prior work that the quality of tracking (QoT) heavily depends on high accuracy ...
Celotno besedilo
10.
  • Social Influence Analysis i... Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges
    Peng, Sancheng; Wang, Guojun; Xie, Dongqing IEEE network, 2017-January/February, 2017-1-00, 20170101, Letnik: 31, Številka: 1
    Journal Article
    Recenzirano

    Social influence analysis has become one of the most important technologies in modern information and service industries. It will definitely become an essential mechanism to perform complex analysis ...
Celotno besedilo
1 2 3 4 5
zadetkov: 3.416

Nalaganje filtrov