#computernetworksandcommunications search results
Great resource for building research data portals! New article provides design pattern, code and examples. Published today in @PeerJCompSci peerj.com/articles/cs-144 #ComputerNetworksandCommunications #DataScience #globusonline
My article has been published today in @PeerJCompSci peerj.com/articles/cs-144 #ComputerNetworksandCommunications #DataScience
peerj.com
The Modern Research Data Portal: a design pattern for networked, data-intensive science
We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-69 #ComputerNetworksandCommunications
My preprint has been published today in @PeerJPreprints peerj.com/preprints/1241 #ComputerNetworksandCommunications #EmbeddedComputing
My article has been published today in @PeerJCompSci peerj.com/articles/cs-334 #ComputerNetworksandCommunications #DistributedandParallelComputing #MobileandUbiquitousComputing
peerj.com
State-of-the-art IoV trust management a meta-synthesis systematic literature review (SLR)
In the near future, the Internet of Vehicles (IoV) is foreseen to become an inviolable part of smart cities. The integration of vehicular ad hoc networks (VANETs) into the IoV is being driven by the...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-791 #ComputerNetworksandCommunications #SecurityandPrivacy
My article has been published today in @PeerJCompSci peerj.com/articles/cs-10… #ArtificialIntelligence #ComputerNetworksandCommunications
A great article I helped peer review published today in @PeerJCompSci peerj.com/articles/cs-950 #ComputerArchitecture #ComputerNetworksandCommunications
My article has been published today in @PeerJCompSci peerj.com/articles/cs-791 #ComputerNetworksandCommunications #SecurityandPrivacy
My article has been published today in @PeerJCompSci peerj.com/articles/cs-538 #ComputerNetworksandCommunications
A great article I helped peer review published today in @PeerJCompSci peerj.com/articles/cs-882 #ArtificialIntelligence #ComputerNetworksandCommunications
peerj.com
Joint user grouping and power control using whale optimization algorithm for NOMA uplink systems
The non-orthogonal multiple access (NOMA) scheme has proven to be a potential candidate to enhance spectral potency and massive connectivity for 5G wireless networks. To achieve effective system...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-652 #AlgorithmsandAnalysisofAlgorithms #ComputerArchitecture #ComputerNetworksandCommunications #ProgrammingLanguages
My article has been published today in @PeerJCompSci peerj.com/articles/cs-900 #ArtificialIntelligence #ComputerEducation #ComputerNetworksandCommunications #NetworkScienceandOnlineSocialNetworks #SecurityandPrivacy
peerj.com
A novel hybrid-based approach of snort automatic rule generator and security event correlation...
The rapid advanced technological development alongside the Internet with its cutting-edge applications has positively impacted human society in many aspects. Nevertheless, it equally comes with the...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-20… #AlgorithmsandAnalysisofAlgorithms #ArtificialIntelligence #ComputerNetworksandCommunications #DataScience #SecurityandPrivacy
peerj.com
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection...
This article presents an evaluation of BukaGini, a stability-aware Gini index feature selection algorithm designed to enhance model performance in machine learning applications. Specifically, the...
An article I handled as editor has been published today @PeerJCompSci peerj.com/articles/cs-14… #AlgorithmsandAnalysisofAlgorithms #ComputerNetworksandCommunications #DataScience #TextMining
My article has been published today in @PeerJCompSci peerj.com/articles/cs-682 #ArtificialIntelligence #ComputerNetworksandCommunications
My article has been published today in @PeerJCompSci peerj.com/articles/cs-22… #ComputerNetworksandCommunications #Cryptography #DataMiningandMachineLearning #SecurityandPrivacy #InternetofThings
peerj.com
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil...
In the modern digital market flooded by nearly endless cyber-security hazards, sophisticated IDS (intrusion detection systems) can become invaluable in defending against intricate security threats....
My article has been published today in @PeerJCompSci peerj.com/articles/cs-15… #ArtificialIntelligence #ComputerNetworksandCommunications #DataMiningandMachineLearning #SecurityandPrivacy
My article just got published in @IEEEAccess @IEEEorg ieeexplore.ieee.org/document/93897… #ComputerNetworksandCommunications #DistributedandParallelComputing #EmergingTechnologies #SecurityandPrivacy #GDPR #Blockchain #blockchaintechnology #dataprivacy #dataprotection #compliance #Review
My article has been published today in @PeerJCompSci peerj.com/articles/cs-13… #AdaptiveandSelf-OrganizingSystems #ComputerNetworksandCommunications #Databases #MobileandUbiquitousComputing
My article has been published today in @PeerJCompSci peerj.com/articles/cs-24… #ArtificialIntelligence #ComputerNetworksandCommunications #SecurityandPrivacy #NeuralNetworks #InternetofThings
My article has been published today in @PeerJCompSci peerj.com/articles/cs-24… #ArtificialIntelligence #ComputerNetworksandCommunications #SecurityandPrivacy #NeuralNetworks #InternetofThings
My article has been published today in @PeerJCompSci peerj.com/articles/cs-22… #AdaptiveandSelf-OrganizingSystems #AlgorithmsandAnalysisofAlgorithms #ComputerNetworksandCommunications #DataScience
My article has been published today in @PeerJCompSci peerj.com/articles/cs-20… #AlgorithmsandAnalysisofAlgorithms #ArtificialIntelligence #ComputerNetworksandCommunications #DataScience #SecurityandPrivacy
peerj.com
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection...
This article presents an evaluation of BukaGini, a stability-aware Gini index feature selection algorithm designed to enhance model performance in machine learning applications. Specifically, the...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-18… #ArtificialIntelligence #ComputerNetworksandCommunications #EmbeddedComputing
peerj.com
A machine learning based framework for IoT devices identification using web traffic
Identification of the Internet of Things (IoT) devices has become an essential part of network management to secure the privacy of smart homes and offices. With its wide adoption in the current era,...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-15… #AlgorithmsandAnalysisofAlgorithms #ComputerNetworksandCommunications
peerj.com
A secure solution based on load-balancing algorithms between regions in the cloud environment
The problem treated in this article is the storage of sensitive data in the cloud environment and how to choose regions and zones to minimize the number of transfer file events. Handling sensitive...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-16… #ArtificialIntelligence #ComputerNetworksandCommunications #EmergingTechnologies #ScientificComputingandSimulation
My article has been published today in @PeerJCompSci peerj.com/articles/cs-15… #ArtificialIntelligence #ComputerNetworksandCommunications #DataMiningandMachineLearning #SecurityandPrivacy
peerj.com
Optimization of predictive performance of intrusion detection system using hybrid ensemble model...
Network intrusion is one of the main threats to organizational networks and systems. Its timely detection is a profound challenge for the security of networks and systems. The situation is even more...
An article I handled as editor has been published today @PeerJCompSci peerj.com/articles/cs-14… #AlgorithmsandAnalysisofAlgorithms #ComputerNetworksandCommunications #DataScience #TextMining
peerj.com
Design of feature selection algorithm for high-dimensional network data based on supervised...
High dimension and complexity of network high-dimensional data lead to poor feature selection effect network high-dimensional data. To effectively solve this problem, feature selection algorithms for...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-13… #ComputerNetworksandCommunications #SecurityandPrivacy #Blockchain
My article has been published today in @PeerJCompSci peerj.com/articles/cs-13… #AdaptiveandSelf-OrganizingSystems #ComputerNetworksandCommunications #Databases #MobileandUbiquitousComputing
My article has been published today in @PeerJCompSci peerj.com/articles/cs-10… #ArtificialIntelligence #ComputerNetworksandCommunications
My article has been published today in @PeerJCompSci peerj.com/articles/cs-892 #ComputerNetworksandCommunications #Cryptography #SecurityandPrivacy
A great article I helped peer review published today in @PeerJCompSci peerj.com/articles/cs-950 #ComputerArchitecture #ComputerNetworksandCommunications
A great article I helped peer review published today in @PeerJCompSci peerj.com/articles/cs-882 #ArtificialIntelligence #ComputerNetworksandCommunications
peerj.com
Joint user grouping and power control using whale optimization algorithm for NOMA uplink systems
The non-orthogonal multiple access (NOMA) scheme has proven to be a potential candidate to enhance spectral potency and massive connectivity for 5G wireless networks. To achieve effective system...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-791 #ComputerNetworksandCommunications #SecurityandPrivacy
My article has been published today in @PeerJCompSci peerj.com/articles/cs-791 #ComputerNetworksandCommunications #SecurityandPrivacy
My article has been published today in @PeerJCompSci peerj.com/articles/cs-682 #ArtificialIntelligence #ComputerNetworksandCommunications
peerj.com
Channel state information estimation for 5G wireless communication systems: recurrent neural...
In this study, a deep learning bidirectional long short-term memory (BiLSTM) recurrent neural network-based channel state information estimator is proposed for 5G orthogonal frequency-division...
My article has been published today in @PeerJCompSci peerj.com/articles/cs-652 #AlgorithmsandAnalysisofAlgorithms #ComputerArchitecture #ComputerNetworksandCommunications #ProgrammingLanguages
My article has been published today in @PeerJCompSci peerj.com/articles/cs-538 #ComputerNetworksandCommunications
Great resource for building research data portals! New article provides design pattern, code and examples. Published today in @PeerJCompSci peerj.com/articles/cs-144 #ComputerNetworksandCommunications #DataScience #globusonline
My article has been published today in @PeerJCompSci peerj.com/articles/cs-791 #ComputerNetworksandCommunications #SecurityandPrivacy
Something went wrong.
Something went wrong.
United States Trends
- 1. Veterans Day 65.2K posts
- 2. Good Tuesday 28.2K posts
- 3. SoftBank 7,543 posts
- 4. United States Armed Forces N/A
- 5. #Talus_Labs N/A
- 6. #tuesdayvibe 1,607 posts
- 7. Armistice Day 10.9K posts
- 8. Vets 13.4K posts
- 9. Bond 62.2K posts
- 10. #Army 1,598 posts
- 11. World War 40.5K posts
- 12. #AirForce N/A
- 13. $NBIS 6,161 posts
- 14. 600k Chinese 5,670 posts
- 15. #Navy N/A
- 16. 600,000 Chinese 10K posts
- 17. Islamabad 39.1K posts
- 18. Berkeley 94K posts
- 19. Window 54.9K posts
- 20. God is Great 13.8K posts