{"title":"Artificial intelligence technology in internet financial edge computing and analysis of security risk","authors":"Qinghua Sun, Hong Wu, Bin Zhao","doi":"10.1504/IJAHUC.2022.121654","DOIUrl":"https://doi.org/10.1504/IJAHUC.2022.121654","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76536951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A concurrent prediction of criminal law charge and sentence using twin convolutional neural networks","authors":"T. Juang, Chih-Shun Hsu, Y. Chen, Wan-Chun Chen","doi":"10.1504/ijahuc.2022.10049035","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10049035","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77373416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-stage adaptive weight vector design method for decomposition based many-objective evolutionary algorithm","authors":"Xiaofang Guo, Yuping Wang, Xiaozhi Gao","doi":"10.1504/ijahuc.2022.10045142","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10045142","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90868551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A method for constructing connected dominating set for consensus in ad hoc wireless network","authors":"Qingdong Huang, Yun Zhou, Qing Liu","doi":"10.1504/ijahuc.2022.10045375","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10045375","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88422432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of a mobility support adaptive trickle algorithm for RPL in vehicular IoT networks","authors":"J. Kumar, D. Suresh","doi":"10.1504/IJAHUC.2022.10039477","DOIUrl":"https://doi.org/10.1504/IJAHUC.2022.10039477","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86638110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A feature ranking-based deep learning secure framework for multi-class leaf disease detection","authors":"M. Nagageetha, N. Ramesh","doi":"10.1504/ijahuc.2022.10048193","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10048193","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91326652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"F-CHILS maps - a novel encryption scheme for secured medical data transmission using FoG-ban environment","authors":"S. Amudha, M. Murali","doi":"10.1504/ijahuc.2022.10048192","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10048192","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72911238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sirisati Ranga Swamy, K. Rao, Kishan Chandan, B. Basaveswararao, Suneetha Bulla
{"title":"A secure new HRF mechanism for mitigate EDoS attacks","authors":"Sirisati Ranga Swamy, K. Rao, Kishan Chandan, B. Basaveswararao, Suneetha Bulla","doi":"10.1504/ijahuc.2022.10048189","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10048189","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78955145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Premalatha, Iwin Thanakumar Joseph Swamidason, Pon Harshavardhanan, S. Anandaraj, V. Jeyakrishnan
{"title":"Analytical review on secure communication protocols for 5G and IoT networks","authors":"J. Premalatha, Iwin Thanakumar Joseph Swamidason, Pon Harshavardhanan, S. Anandaraj, V. Jeyakrishnan","doi":"10.1504/ijahuc.2022.10048191","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10048191","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79785970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance and communication energy constrained embedded benchmark for fault tolerant core mapping onto NoC architectures","authors":"Aruru Sai Kumar, T. Rao, B. K. Reddy","doi":"10.1504/ijahuc.2022.10049325","DOIUrl":"https://doi.org/10.1504/ijahuc.2022.10049325","url":null,"abstract":"","PeriodicalId":50346,"journal":{"name":"International Journal of Ad Hoc and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83389051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}