161 results on '"Shahidinejad, Ali"'
Search Results
2. An autonomous proactive content caching method in edge computing environment: a learning-based approach
3. Anonymous lattice-based authentication protocol for vehicular communications
4. Untraceable blockchain-assisted authentication and key exchange in medical consortiums
5. An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security
6. A Technical Report for Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment
7. Context‐aware computation offloading for mobile edge computing
8. An efficient data replica placement mechanism using biogeography-based optimization technique in the fog computing environment
9. Performance improvement in face recognition system using optimized Gabor filters
10. Data replica placement approaches in fog computing: a review
11. List of contributors
12. Blockchain for transparent, privacy preserved, and secure health data management
13. Real-time face detection using circular sliding of the Gabor energy and neural networks
14. A cost-efficient IoT service placement approach using whale optimization algorithm in fog computing environment
15. An efficient dynamic service provisioning mechanism in fog computing environment: A learning automata approach
16. A metaheuristic-based computation offloading in edge-cloud environment
17. Resource discovery in the Internet of Things integrated with fog computing using Markov learning model
18. A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach
19. An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT
20. An efficient method to minimize cross-entropy for selecting multi-level threshold values using an improved human mental search algorithm
21. Data replication schemes in cloud computing: a survey
22. An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach
23. Autonomous computation offloading and auto-scaling the in the mobile fog computing: a deep reinforcement learning-based approach
24. A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective
25. A latency-aware and energy-efficient computation offloading in mobile fog computing: a hidden Markov model-based approach
26. Resource provisioning using workload clustering in cloud computing environment: a hybrid approach
27. Resource provisioning for IoT services in the fog computing environment: An autonomic approach
28. An efficient resource provisioning approach for analyzing cloud workloads: a metaheuristic-based clustering approach
29. Iris recognition in unconstrained environment on graphic processing units with CUDA
30. An elastic controller using Colored Petri Nets in cloud computing environment
31. Context-Aware Multi-User Offloading in Mobile Edge Computing: a Federated Learning-Based Approach
32. Wireless-assisted multiple network on chip using microring resonators
33. Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles
34. Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT
35. Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles
36. Efficient Provably-Secure Authentication Protocol for Multi-Domain IIoT Using a Combined Off-Chain and On-Chain Approach
37. An Efficient and Autonomous Planning Scheme for Deploying IoT Services in Fog Computing: A Metaheuristic-Based Approach
38. Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications
39. An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security
40. Chapter 10 - Blockchain for transparent, privacy preserved, and secure health data management
41. Ultra-Lightweight and Secure Blockchain-Assisted Charging Scheduling Scheme for Vehicular Edge Networks by Utilization of NanoPi NEO
42. Proactive content caching in edge computing environment: A review.
43. Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment
44. An Evolutionary Multi-objective Optimization Technique to Deploy the IoT Services in Fog-enabled Networks: An Autonomous Approach
45. Real-time face detection using circular sliding of the Gabor energy and neural networks
46. A metaheuristic‐based data replica placement approach for data‐intensive IoT applications in the fog computing environment
47. A metaheuristic-based computation offloading in edge-cloud environment
48. An efficient data replica placement mechanism using biogeography-based optimization technique in the fog computing environment
49. Proactive content caching in edge computing environment: A review
50. Optical wireless quantum communication coding system using decimal convertor
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.