Your selections:
Optimally parameterized wavelet packet transform for machine residual life prediction
- Gondal, Iqbal, Yaqub, Muhammad, Kamruzzaman, Joarder
A novel vertical handover scheme for diminution in social network traffic
- Haider, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder
Partial undersampling of imbalanced data for cyber threats detection
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal
An efficient data extraction framework for mining wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
A technique for parallel share-frequent sensor pattern mining from wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
A cross-layer approach for QoS topology control in wireless ad hoc networks
- Rokonuzzaman, S. K., Pose, Ronald, Gondal, Iqbal
Heuristic non parametric collateral missing value imputation : A step towards robust post-genomic knowledge discovery
- Sehgal, Muhammad Shoaib B, Gondal, Iqbal, Dooley, Laurence, Coppel, Ross
Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
Blockchain leveraged task migration in body area sensor networks
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza
Multiple-points fault signature's dynamics modeling for bearing defect frequencies
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
Envelope-Wavelet Packet Transform for Machine Condition Monitoring
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
Are you sure you would like to clear your session, including search history and login status?