Your selections:
Cloud robotics in smart manufacturing environments : challenges and countermeasures
- Yan, Hehua, Hua, Qingsong, Wang, Yingying, Wei, Wenguo, Imran, Muhammad
Blockchain for cloud exchange : a survey
- Xie, Shaoan, Zheng, Zibin, Chen, Weili, Wu, Jiajing, Dai, Hong-Ning, Imran, Muhammad
- Imran, Muhammad, Bakhsh, Sheikh, Tahir, Sabeen, Basheri, Mohammed, Shoaib, Muhammad
Managing big RDF data in clouds : challenges, opportunities, and solutions
- Elzein, Nahla, Majid, Mazlina, Hashem, Ibaker, Yaqoob, Ibrar, Alaba, Fadele, Imran, Muhammad
A lightweight cyber security framework with context-awareness for pervasive computing environments
- Al-Muhtadi, Jalal, Saleem, Kashif, Al-Rabiaah, Sumaya, Imran, Muhammad, Gawanmeh, Amjad, Rodrigues, Joel
Real-time big data processing for anomaly detection : a survey
- Ariyaluran Habeeb, Riyaz, Nasaruddin, Fariza, Gani, Abdullah, Targio Hashem, Ibrahim, Ahmed, Ejaz, Imran, Muhammad
Data-driven prognosis method using hybrid deep recurrent neural network
- Xia, Min, Zheng, Xi, Imran, Muhammad, Shoaib, Muhammad
Traffic accident detection and condition analysis based on social networking data
- Ali, Farman, Ali, Amjad, Imran, Muhammad, Naqvi, Rizwan, Siddiqi, Muhammad, Kwak, Kyung-Sup
Mobile crowd sensing – taxonomy, applications, challenges, and solutions
- Boubiche, Djallel, Imran, Muhammad, Maqsood, Aneela, Shoaib, Muhammad
Cloud-assisted gamification for education and learning – recent advances and challenges
- Hakak, Saqib, Noor, Nurul, Ayub, Mohamad, Affal, Hannyzurra, Imran, Muhammad
An efficient caching policy for content retrieval in autonomous connected vehicles
- Rahim, Muddasir, Javed, Muhammad, Alvi, Alvi, Imran, Muhammad
A policy-based solution for the detection of colluding GPS-Spoofing attacks in FANETs
- Bada, Mousaab, Boubiche, Djallel, Lagraa, Nasreddine, Kerrache, Chaker, Imran, Muhammad, Shoaib, Muhammad
Intelligent energy prediction techniques for fog computing networks
- Farooq, Umar, Shabir, Muhammad, Javed, Muhammad, Imran, Muhammad
An intelligent and efficient network intrusion detection system using deep learning
- Qazi, Emad-ul-Haq, Imran, Muhammad, Haider, Noman, Shoaib, Muhammad, Razzak, Imran
Are you sure you would like to clear your session, including search history and login status?