â
Login / Signup
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
2010
2014
2020
2024
2010
2024
Keyphrases
Publications
volume 15, number 1, 2024
Walaa Saber Ismail
Emotion Detection in Text: Advances in Sentiment Analysis Using Deep Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
M. Rajesh
,
S. R. Nagaraja
,
P. Suja
Multi - Robot Exploration Supported by Enhanced Localization with Reduction of Localization Error Using Particle Swarm Optimization.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Agung Triayudi
,
Rima Tamara Aldisa
,
S. Sumiati
New Framework of Educational Data Mining to Predict Student Learning Performance.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Bob Subhan Riza
,
Rina Yunita
,
Rika Rosnelly
Comparative Analysis of LSTM and BiLSTM in Image Detection Processing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Milind B. Bhilavade
,
K. S. Shivaprakasha
,
Meenakshi R. Patil
,
Lalita S. Admuthe
Fingerprint Reconstruction: Approaches to Improve Fingerprint Images.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Sofiene Mansouri
,
Souhaila Boulares
,
Souhir Chabchoub
Machine Learning for Early Diabetes Detection and Diagnosis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Bandr Fakiha
Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Ahmad Al Smadi
,
Ahed Abugabah
,
Mutasem K. Alsmadi
,
Ahmad Alsmadi
Smart Medical Application of Deep Learning (MUNet) for Detection of COVID-19 from Chest Images.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Hyunwoo Song
,
Jaeho Yu
Effects of Augmented Reality based Dual-Task Proprioceptive Training on Postural Stability, Positioning Sensation and Cognition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Walaa Saber Ismail
Human-Centric AI : Enhancing User Experience through Natural Language Interfaces.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
B. Sreevidya
,
M. Supriya
Trust based Routing - A Novel Approach for Data Security in WSN based Data Critical Applications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Daehyeon Son
,
Youngshin Park
,
Bonam Kim
,
Ilsun You
A Study on the Implementation of a Network Function for Real-time False Base Station Detection for the Next Generation Mobile Communication Environment.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Vimitha R. Vidhya Lakshmi
VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Fernando Escobedo
,
Henry Bernardo Garay Canales
,
Fernando Willy Morillo Galarza
,
Carlos Miguel Aguilar Saldaña
,
Eddy Miguel Aguirre Reyes
,
CĂ©sar Augusto Flores-Tananta
Energy Efficient Business Management System for Improving QoS in Network Model.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
Ronald M. HernĂĄndez
,
Walter Antonio Campos-Ugaz
,
Segundo Juan SĂĄnchez Tarrillo
,
Silvia Josefina Aguinaga Vasquez
,
Sara Esther Liza Ordoñez
,
Ronald Avellaneda Montenegro
,
Dora Elisa ElĂas MartĂnez
,
Doris E. Fuster-Guillén
Exploring Software Infrastructures for Enhanced Learning Environments to Empowering Education.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
I Gde Dharma Nugraha
,
Edwiansyah Zaky Ashadi
,
Ardiansyah Musa Efendi
Performance Evaluation of Collision Avoidance for Multi-node LoRa Networks based on TDMA and CSMA Algorithm.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (1) (2024)
volume 15, number 2, 2024
Nehme Azoury
,
Satya Subrahmanyam
,
Nada Sarkis
The Influence of a Data-Driven Culture on Product Development and Organizational Success through the Use of Business Analytics.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Vivi Monita
Rainfall Prediction from Himawari-8 Data Using the Deep Learning Method.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Deepthi Reddy Dasari
,
G. Hima Bindu
Feature Selection Model-based Intrusion Detection System for Cyberattacks on the Internet of Vehicles Using Cat and Mouse Optimizer.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
N. R. Mohamed Kareemulla
,
G. S. Nijaguna
,
Pushpa
,
N. Dayananda Lal
,
M. Naga Raju
,
Zameer Ahmed Adhoni
A Comprehensive Approach to a Hybrid Blockchain Framework for Multimedia Data Processing and Analysis in IoT-Healthcare.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Anas Abu Taleb
,
Ammar Odeh
Effective Routing of Mobile Sink in Wireless Sensor Networks Using Steiner Trees.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Ha Rang Kim
,
Hyun Min Song
Lightweight IDS Framework Using Word Embeddings for In-Vehicle Network Security.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Rawaa A. Faris
,
Qusay Mosa
,
Mustafa Albdairi
Robust Classification for Sub Brain Tumors by Using an Ant Colony Algorithm with a Neural Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Arief Kelik Nugroho
,
Retantyo Wardoyo
,
Moh Edi Wibowo
,
Hardyanto Soebono
Thresholding Segmentation of Skin Lesions with Modified Ant Colony Optimization Algorithm.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Mutasem K. Alsmadi
,
Rami Mustafa A. Mohammad
,
Malek Alzaqebah
,
Sana Jawarneh
,
Muath AlShaikh
,
Ahmad Al Smadi
,
Fahad A. Alghamdi
,
Jehad Saad Alqurni
,
Hayat Alfagham
Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
S. Sathyanarayanan
,
K. Srikanta Murthy
Heart Sound Analysis Using SAINet Incorporating CNN and Transfer Learning for Detecting Heart Diseases.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
K. Malathi
,
Shruthi S. Nair
,
N. Madhumitha
,
S. Sreelakshmi
,
U. Sathya
,
M. Sangeetha Priya
Medical Data Integration and Interoperability through Remote Monitoring of Healthcare Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
P. Bharath Kumar Chowdary
,
R. Udayakumar
,
Chaya Jadhav
,
B. Mohanraj
,
V. R. Vimal
An Efficient Intrusion Detection Solution for Cloud Computing Environments Using Integrated Machine Learning Methodologies.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
H. V. Ramana Rao
,
V. Ravi Sankar
Precision in Prostate Cancer Diagnosis: A Comprehensive Study on Neural Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
B. Aruna Devi
,
S. Jaganathan
,
Parag K. Shah
,
Narendran Venkatapathy
Prediction of Premature Retinopathy Fundus Images Using Dense Network Model for Intelligent Portable Screening Device.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Gustavo A. Flores-Fernandez
,
Miguel Jimenez-Carrion
,
Flabio Gutiérrez
,
RaĂșl A. SĂĄnchez-Ancajima
Genetic Algorithm and LSTM Artificial Neural Network for Investment Portfolio Optimization.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Taufiq Odhi Dwi Putra
Container Load Placement for Deep Learning Application Using Whale Optimization.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Ahmed Afif Monrat
,
Olov Schelén
,
Karl Andersson
A Taxonomy Guideline for Blockchain Platforms.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Afnaan. K
,
Peeta Basa Pati
,
Tripty Singh
,
Bhanu Prakash K. N.
Comparative Analysis for Feature Extraction and Prediction of CKD Using Machine Learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
Danielle Khalife
,
Satya Subrahmanyam
,
Assaad Farah
A Sustainable Circular Business Model to Improve the Performance of Small and Medium-sized Enterprises Using Blockchain Technology.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
15 (2) (2024)
volume 14, number 3, 2023
Dessy Adriani
,
Ratna Dewi
,
Leni Saleh
,
D. Yadi Heryadi
,
Fatma Sarie
,
I Gede Iwan Sudipa
,
Robbi Rahim
Using Distance Measure to Perform Optimal Mapping with the K-Medoids Method on Medicinal Plants, Aromatics, and Spices Export.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (3) (2023)
V. Naren Thiruvalar
,
Yamini R.
,
Manimekalai M. A. P.
,
I Wayan Suryasa
,
Sugapriya S.
Enhancing User Experiences in Ubiquitous Soft Computing Environments with Fuzzy Agent Middleware.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (3) (2023)
Abdul Rahmat
,
Ahmad Arif Nurrahman
,
Susatyo Adhi Pramono
,
Dadi Ahmadi
,
Winci Firdaus
,
Robbi Rahim
Data Optimization using PSO and K-Means Algorithm.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (3) (2023)
volume 14, number 4, 2023
K. Veerasamy
,
E. J. Thomson Fredrik
Intelligence System towards Identify Weeds in Crops and Vegetables Plantation Using Image Processing and Deep Learning Techniques.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
Sudad Gharib Hassan
,
Sara Alshwani
,
Aras Al-Dawoodi
Design and Investigation of Modal Excitation in Tapered Optical Fiber for a Mode Division Multiplexed Transmission System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
Ahed Abugabah
Smart Medical Systems Based IoT: Exploring the Relationship Between Essential Algorithms and Service Orientation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
S. Subhashini
,
S. Revathi
A New Fusion Feature Selection Model (FFSM) based Feature Extraction System for Hand Gesture Recognition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
S. Kavitha
,
R. Kaniezhil
Enhanced Wireless Network Usage and Loading on Network Delay using Cognitive Radio Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
U. Kumaran
,
S. Thangam
,
Nidhin Prabhakar T. V
,
Jana Selvaganesan
,
H. N. Vishwas
Adversarial Defense: A GAN-IF Based Cyber-security Model for Intrusion Detection in Software Piracy.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
Ammar Odeh
,
Anas Abu Taleb
A Multi-Faceted Encryption Strategy for Securing Patient Information in Medical Imaging.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
Orchu Aruna
,
Sk. Sameerunnisa
,
Ramachandran Vedantham
Routing in Mobile ad Hoc Networks Using Machine Learning Techniques.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
E. Latifah
,
A. Fathjri Wisesa
,
N. Adi Pramono
,
T. Chusniyah
Optimization of Depression Level Detection Based on Noninvasive Parameters with Artificial Neural Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
Husam Suleiman
đcđđ max-Means++: Adapt-đ Driven by Energy and Distance Quality Probabilities Based on đ -Means++ for the Stable Election Protocol (SEP).
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
R. Ramesh
,
M. Jeyakarthic
Fuzzy Support Vector Machine Based Outlier Detection for Financial Credit Score Prediction System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)
Emna Bouhamed
,
Hend Marouane
,
Faouzi Zerai
Dynamic Resource Allocation Approach for Interference Mitigation based on NOMA in Network Operating in Both Uplink and Downlink.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
14 (4) (2023)