no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An efficient automatic brain tumor classification using optimized hybrid deep neural network
|
Shanthi, S. |
|
|
3 |
C |
p. 188-196 |
article |
2 |
A new secure 2PL real-time concurrency control algorithm (ES2PL)
|
Abduljalil, Ebrahim |
|
|
3 |
C |
p. 48-57 |
article |
3 |
An optimal construction of smart aged homes based on SDLC using smart sensors and agent networks
|
Subha, R. |
|
|
3 |
C |
p. 138-142 |
article |
4 |
A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing
|
Thabit, Fursan |
|
|
3 |
C |
p. 16-30 |
article |
5 |
Application of machine learning techniques for identifying productive zones in unconventional reservoir
|
Gharavi, Amir |
|
|
3 |
C |
p. 87-101 |
article |
6 |
Artificial intelligence (AI) applications for marketing: A literature-based study
|
Haleem, Abid |
|
|
3 |
C |
p. 119-132 |
article |
7 |
Design and implementation of a Social Distance Vest for Covid19 prevention (SODIV-COP)
|
Kapalamula, Henry Eric |
|
|
3 |
C |
p. 113-118 |
article |
8 |
Development and performance evaluation of Correntropy Kalman Filter for improved accuracy of GPS position estimation
|
Pagoti, Sirish Kumar |
|
|
3 |
C |
p. 1-8 |
article |
9 |
Enhancing investigations in data migration and security using sequence cover cat and cover particle swarm optimization in the fog paradigm
|
Saravanan, T. |
|
|
3 |
C |
p. 204-212 |
article |
10 |
Enhancing smart farming through the applications of Agriculture 4.0 technologies
|
Javaid, Mohd |
|
|
3 |
C |
p. 150-164 |
article |
11 |
Hybrid TABU search with SDS based feature selection for lung cancer prediction
|
Shanthi, S. |
|
|
3 |
C |
p. 143-149 |
article |
12 |
Improved constrained social network rating-based neural network technique for recommending products in E-commerce environment
|
Ottikunta, Lohith |
|
|
3 |
C |
p. 80-86 |
article |
13 |
Improved Henon Chaotic Map-based Progressive Block-based visual cryptography strategy for securing sensitive data in a cloud EHR system
|
Mohanasundaram, Aneruth |
|
|
3 |
C |
p. 109-112 |
article |
14 |
Internet of Things in the global healthcare sector: Significance, applications, and barriers
|
Javaid, Mohd |
|
|
3 |
C |
p. 165-175 |
article |
15 |
Machine learning and quantum computing for 5G/6G communication networks - A survey
|
M, Suriya |
|
|
3 |
C |
p. 197-203 |
article |
16 |
Machine-type communications in NOMA-based terahertz wireless networks
|
Sabuj, Saifur Rahman |
|
|
3 |
C |
p. 31-47 |
article |
17 |
Multi-Objective Genetic Algorithm and CNN-Based Deep Learning Architectural Scheme for effective spam detection
|
Rosita P, Jenifer Darling |
|
|
3 |
C |
p. 9-15 |
article |
18 |
PE-DeepNet: A deep neural network model for pulmonary embolism detection
|
Lynch, Damian |
|
|
3 |
C |
p. 176-180 |
article |
19 |
Radix Trie improved Nahrain chaotic map-based image encryption model for effective image encryption process
|
Abas, Fazly Salleh |
|
|
3 |
C |
p. 102-108 |
article |
20 |
Remora optimization algorithm-based optimized node clustering technique for reliable data delivery in VANETs
|
Konduru, Swathi |
|
|
3 |
C |
p. 74-79 |
article |
21 |
Rough set based on least dissimilarity normalized index for handling uncertainty during E-learners learning pattern recognition
|
Sugumaran, Vijayan |
|
|
3 |
C |
p. 133-137 |
article |
22 |
Security behavior analysis in web of things smart environments using deep belief networks
|
Premkumar, M. |
|
|
3 |
C |
p. 181-187 |
article |
23 |
Significance of machine learning in healthcare: Features, pillars and applications
|
Javaid, Mohd |
|
|
3 |
C |
p. 58-73 |
article |