RESEARCH ARTICLES
Security-aware resource management approaches in software defined networks: Comprehensive analysis, opportunities and challenges – Openly Available
Norouzi, Monire | Gürkaş-Aydın, Zeynep | Ergen, Sefer | Şerif Bakır, Mehmet
A high presence traditional crafts experience system that combines multicultural architectural styles with Japanese culture
Ishida, Tomoyuki | Lu, Yangzhicheng
A study on community detection in multilayer networks
Katakamsetty, Venkatakrishna Rao | Rajani, D. | Srikanth, P.
The state of art and review on video streaming
Laghari, Asif Ali | Shahid, Sana | Yadav, Rahul | Karim, Shahid | Khan, Awais | Li, Hang | Shoulin, Yin
Towards swarm optimization techniques for power communication systems and smart grid environments
Liu, Yongchao | Zhang, Tao | Li, Wenfang | Cheng, Tingting | Zhang, Yaping
Design and implementation of a fast integration method for multi-source data in high-speed network
Ma, Lei | Zhang, Yanning | García-Díaz, Vicente
RESEARCH ARTICLES
Improved design of load balancing for multipath routing protocol – Openly Available
Liao, Daqiang | Zou, Du | Srivastava, Gautam
Modelling a stacked dense network model for outlier prediction over medical-based heart prediction data
Krishna, Boddu L.V. Siva Rama | Mahalakshmi, V. | Nookala, Gopala Krishna Murthy
Decision tree-based prediction approach for improving stable energy management in smart grids
Chen, Sichao | Huang, Liejiang | Pan, Yuanjun | Hu, Yuanchao | Shen, Dilong | Dai, Jiangang
Hidden target recognition method for high-speed network security threats based on attack graph theory
Song, Limin | Rho, Seungmin
An improved PBFT consensus mechanism with trust value evaluation application in the agricultural product trusted traceability system
Sun, Weiqing | Wang, Shengxin | Wei, Shen | Cao, Pengfei | Zhao, Yan | Xi, Lechao | Liu, Xinlu | Wang, Lihua
Identity-based proxy blind signature scheme on lattice in high-speed network environment
Yang, Mengjiao | Ke, Dongmei | Li, Fengyin