Your selections:
A Survey on Behavioral Pattern Mining from Sensor Data in Internet of Things
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Hassan, Mohammad, Shahriar Shafin, Sakib, Bhuiyan, Md Zakirul
A survey on context awareness in big data analytics for business applications
- Dinh, Loan, Karmakar, Gour, Kamruzzaman, Joarder
A technique for parallel share-frequent sensor pattern mining from wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
A tree-based stacking ensemble technique with feature selection for network intrusion detection
- Rashid, Mamanur, Kamruzzaman, Joarder, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven
Abrasion modeling of multiple-point defect dynamics for machine condition monitoring
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Loparo, Kenneth
ACSP-Tree: A tree structure for mining behavioral patterns from wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Mehedi Hassan, Mohammad, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven, Fortino, Giancarlo
Agile spectrum evacuation in cognitive radio networks
- Shahid, Mohammad, Kamruzzaman, Joarder
An adaptive approach to opportunistic data forwarding in underwater acoustic sensor networks
- Nowsheen, Nusrat, Karmakar, Gour, Kamruzzaman, Joarder
An adaptive self-configuration scheme for severity invariant machine fault diagnosis
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
An analytical approach for voice capacity estimation over WiFi network using ITU-T E-model
- Siddique, Md, Kamruzzaman, Joarder, Hossain, Md Jahangir
An efficient data delivery mechanism for AUV-based Ad hoc UASNs
- Karmakar, Gour, Kamruzzaman, Joarder, Nowsheen, Nusrat
An efficient data extraction framework for mining wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
An efficient pose estimation for limited-resourced MAVs using sufficient statistics
- Senthooran, Ilankaikone, Barca, Jan, Kamruzzaman, Joarder, Murhsed, Manzur, Chung, Hoam
An efficient RANSAC hypothesis evaluation using sufficient statistics for RGB-D pose estimation
- Senthooran, Ilankalkone, Murshed, Manzur, Barca, Jan, Kamruzzaman, Joarder, Chung, Hoam
An environment-aware mobility model for wireless ad hoc network
- Ahmed, Sabbir, Karmakar, Gour, Kamruzzaman, Joarder
An evidence theoretic approach for traffic signal intrusion detection
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Das, Rajkumar, Newaz, Shah
- Ahmad, Iftekhar, Kamruzzaman, Joarder, Habibi, Daryoush, Islam, Farzana
An opportunistic message forwarding protocol for underwater acoustic sensor networks
- Nowsheen, Nusrat, Karmakar, Gour, Kamruzzaman, Joarder
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?