nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative study on word embedding techniques for suicide prediction on COVID-19 tweets using deep learning models
|
Kancharapu, Rohini |
|
|
|
6 |
p. 3293-3306 |
artikel |
2 |
A comprehensive analysis of wavelet tree based indexing schemes in GIR systems
|
Kumar, Dharmendra |
|
|
|
6 |
p. 2227-2236 |
artikel |
3 |
Advanced AODV routing based on restricted broadcasting of route request packets in MANET
|
Pandey, Priyanka |
|
|
|
6 |
p. 2471-2482 |
artikel |
4 |
A Fast longest crossing-plain preserving common subsequence algorithm
|
Kenawy, Tarek G. |
|
|
|
6 |
p. 3019-3029 |
artikel |
5 |
AHP based network selection scheme for heterogeneous network in different traffic scenarios
|
Singh, Pushpa |
|
|
|
6 |
p. 2505-2513 |
artikel |
6 |
A hybrid approach of blockchain and semantic web technologies to validating learning outcomes in accordance with legal constraints
|
Nguyen, Minh Duc |
|
|
|
6 |
p. 2893-2901 |
artikel |
7 |
A hybrid edge detection mechanism based on edge preserving filtration and type-1 fuzzy logic
|
Ranjan, Rakesh |
|
|
|
6 |
p. 2991-3000 |
artikel |
8 |
A hybrid machine learning model for detecting cybersecurity threats in IoT applications
|
Usoh, Midighe |
|
|
|
6 |
p. 3359-3370 |
artikel |
9 |
A hybrid model for data security and preserving anonymity using machine learning
|
Allagi, Shridhar |
|
|
|
6 |
p. 2397-2410 |
artikel |
10 |
A lightweight security framework for electronic healthcare system
|
Chaudhary, Ravi Raushan Kumar |
|
|
|
6 |
p. 3109-3121 |
artikel |
11 |
A multicore-based algorithm for optimal multi-way number partitioning
|
Abdelsalam, Kamel M. K. |
|
|
|
6 |
p. 2929-2940 |
artikel |
12 |
A multilingual translator to SQL with database schema pruning to improve self-attention
|
Jose, Marcelo Archanjo |
|
|
|
6 |
p. 3015-3023 |
artikel |
13 |
An artificial intelligence based approach for managing risk of IT systems in adopting cloud
|
Gupta, Shikha |
|
|
|
6 |
p. 2515-2523 |
artikel |
14 |
An automatic text summarization based on valuable sentences selection
|
Mahalleh, Elham Rahimzadeh |
|
|
|
6 |
p. 2963-2969 |
artikel |
15 |
An efficient approach for clustering and classification for fraud detection using bankruptcy data in IoT environment
|
Srikanth, Panigrahi |
|
|
|
6 |
p. 2497-2503 |
artikel |
16 |
An efficient astronomical image processing technique using advance dynamic workflow scheduler in cloud environment
|
Ahmad, Faiyaz |
|
|
|
6 |
p. 2779-2791 |
artikel |
17 |
An efficient CNN approach for facial expression recognition with some measures of overfitting
|
Rusia, Mayank Kumar |
|
|
|
6 |
p. 2419-2430 |
artikel |
18 |
An efficient framework for anomaly detection in attributed social networks
|
Khan, Wasim |
|
|
|
6 |
p. 3069-3076 |
artikel |
19 |
An energy-efficient scheduling approach for memory-intensive tasks in multi-core systems
|
Maurya, Ashish Kumar |
|
|
|
6 |
p. 2793-2801 |
artikel |
20 |
An enhanced approach for analyzing the performance of heart stroke prediction with machine learning techniques
|
Mishra, Indrani |
|
|
|
6 |
p. 3257-3270 |
artikel |
21 |
A new design of low power varactor based voltage controlled oscillator
|
Kumar, Manoj |
|
|
|
6 |
p. 2533-2541 |
artikel |
22 |
An improvement to the conventional PD scheme for the speed control of a two-wheeled differential steering mobile robot
|
Deshmukh, Rushikesh A. |
|
|
|
6 |
p. 3093-3101 |
artikel |
23 |
An optimal model using hybrid LCNN- GRU for efficient hyperspectral image classification
|
Ablin, R. |
|
|
|
6 |
p. 3335-3342 |
artikel |
24 |
An optimistic approach for task scheduling in cloud computing
|
Sharma, Mehak |
|
|
|
6 |
p. 2951-2961 |
artikel |
25 |
A novel algorithmic approach of open eye analysis for drowsiness detection
|
Pandey, Nageshwar Nath |
|
|
|
6 |
p. 2199-2208 |
artikel |
26 |
A novel anomaly detection scheme for high dimensional systems using Kantorovich distance statistic
|
Madakyaru, Muddu |
|
|
|
6 |
p. 3001-3010 |
artikel |
27 |
A novel approach to predict stock market price using radial basis function network
|
Kumar, Rajesh |
|
|
|
6 |
p. 2277-2285 |
artikel |
28 |
A novel decentralized model for storing and sharing neuroimaging data using ethereum blockchain and the interplanetary file system
|
Batchu, Sai |
|
|
|
6 |
p. 2145-2151 |
artikel |
29 |
A novel image model for vehicle classification in restricted areas using on-device machine learning
|
Lamba, Abhinav |
|
|
|
6 |
p. 3037-3043 |
artikel |
30 |
A novel intuitionistic fuzzy inference system for sentiment analysis
|
Dhyani, Makrand |
|
|
|
6 |
p. 3193-3200 |
artikel |
31 |
A novel privacy-preserving technique using steganography and L-diversity for multi-relational educational dataset
|
Muttoo, Sunil Kumar |
|
|
|
6 |
p. 3307-3325 |
artikel |
32 |
A novel SETA-based gamification framework to raise cybersecurity awareness
|
Abu-Amara, Fadi |
|
|
|
6 |
p. 2371-2380 |
artikel |
33 |
A novel squirrel search clustering algorithm for text document clustering
|
Chaudhary, Meena |
|
|
|
6 |
p. 3277-3286 |
artikel |
34 |
A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system
|
Kamble, Ashish |
|
|
|
6 |
p. 3211-3227 |
artikel |
35 |
A provably secure data sharing scheme for smart gas distribution grid using fog computing
|
Patil, Rachana Y. |
|
|
|
6 |
p. 2927-2939 |
artikel |
36 |
A rehabilitation framework based on motor imagery induced wheelchair movement using fuzzy vector quantization
|
Ghosh, Ahona |
|
|
|
6 |
p. 3025-3036 |
artikel |
37 |
A smartphone-based wander management system for Bangla speaking patients with Alzheimer’s disease
|
Rashida, Maliha |
|
|
|
6 |
p. 2543-2550 |
artikel |
38 |
Association rule learning for threat analysis using traffic analysis and packet filtering approach
|
Rawat, Romil |
|
|
|
6 |
p. 3245-3255 |
artikel |
39 |
A tracking system with multiple region background subtraction algorithm for night scene
|
Tsai, Tsung-Han |
|
|
|
6 |
p. 3169-3179 |
artikel |
40 |
Automatic tracking of objects using improvised Yolov3 algorithm and alarm human activities in case of anomalies
|
Kashika, P. H. |
|
|
|
6 |
p. 2885-2891 |
artikel |
41 |
Automation of prediction system for temporal data
|
Singh, Brijendra |
|
|
|
6 |
p. 3165-3174 |
artikel |
42 |
A zero-knowledge proof of transpose of a matrix of finite field elements
|
Antony, Amalan |
|
|
|
6 |
p. 3055-3061 |
artikel |
43 |
BAFS: binary artificial bee colony based feature selection approach to estimate software development effort
|
Manchala, Pravali |
|
|
|
6 |
p. 2975-2986 |
artikel |
44 |
Benchmarking strategic alignment of business and IT strategies: opportunities, risks, challenges and solutions
|
Dairo, Modupeola |
|
|
|
6 |
p. 2191-2197 |
artikel |
45 |
Bimodal fusion of visual and speech data for audiovisual speaker recognition in noisy environment
|
Chelali, Fatma Zohra |
|
|
|
6 |
p. 3135-3145 |
artikel |
46 |
Blockchain-based smart and secured scheme for question sharing using bee colony optimization based quantum logistic map encryption
|
Nagarajan, B. |
|
|
|
6 |
p. 2889-2895 |
artikel |
47 |
BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments
|
Gowda, Naveen Chandra |
|
|
|
6 |
p. 3343-3357 |
artikel |
48 |
Characterize ingredient network for recipe suggestion
|
Nyati, Umang |
|
|
|
6 |
p. 2323-2330 |
artikel |
49 |
Classification of brain MR images based on bleed and calcification using ROI cropped U-Net segmentation and ensemble RNN classifier
|
Kakhandaki, Nita |
|
|
|
6 |
p. 3405-3420 |
artikel |
50 |
Computation of terminal wiener index from subtrees
|
Sulphikar, A |
|
|
|
6 |
p. 3175-3181 |
artikel |
51 |
Contrast enhancement with brightness preservation of low light images using a blending of CLAHE and BPDHE histogram equalization methods
|
Thepade, Sudeep D. |
|
|
|
6 |
p. 3047-3056 |
artikel |
52 |
Crop classification and prediction based on soil nutrition using machine learning methods
|
Swathi, T. |
|
|
|
6 |
p. 2951-2960 |
artikel |
53 |
Cross-dataset learning for performance improvement of leaf disease detection using reinforced generative adversarial networks
|
Nerkar, Bhavana |
|
|
|
6 |
p. 2305-2312 |
artikel |
54 |
Cryptographic one-way hash function generation using twelve-terms 4D nonlinear system
|
Ahmad, Musheer |
|
|
|
6 |
p. 2295-2303 |
artikel |
55 |
Cuckoo search based multi-objective algorithm with decomposition for detection of masses in mammogram images
|
Bhalerao, Pramod B. |
|
|
|
6 |
p. 2215-2226 |
artikel |
56 |
Darts game optimization with intuitionistic fuzzy kernel ridge regression for IoT based smart farming model
|
Gokuldhev, M. |
|
|
|
6 |
p. 3123-3131 |
artikel |
57 |
Deep ensemble learning for automatic medicinal leaf identification
|
Sachar, Silky |
|
|
|
6 |
p. 3089-3097 |
artikel |
58 |
Design of PSO tuned PID controller for different types of plants
|
Kanwar, Khamma |
|
|
|
6 |
p. 2877-2884 |
artikel |
59 |
Detection and delineation of the enigmatic U-wave in an electrocardiogram
|
Sharma, Lakhan Dev |
|
|
|
6 |
p. 2525-2532 |
artikel |
60 |
Detection of bradycardia from electrocardiogram signals using feature extraction and snapshot ensembling
|
Sengupta, Subhadeep |
|
|
|
6 |
p. 3235-3244 |
artikel |
61 |
DISCOVID: discovering patterns of COVID-19 infection from recovered patients: a case study in Saudi Arabia
|
Alafif, Tarik |
|
|
|
6 |
p. 2825-2838 |
artikel |
62 |
Downlink throughput prediction using machine learning models on 4G-LTE networks
|
Al-Thaedan, Abbas |
|
|
|
6 |
p. 2987-2993 |
artikel |
63 |
DQN Algorithm for network resource management in vehicular communication network
|
Agarwal, Vartika |
|
|
|
6 |
p. 3371-3379 |
artikel |
64 |
DT-Model: a classification model for distributed denial of service attacks and flash events
|
Tinubu, C. O. |
|
|
|
6 |
p. 3077-3087 |
artikel |
65 |
Early detection of students at risk of poor performance in Rwanda higher education using machine learning techniques
|
Masabo, Emmanuel |
|
|
|
6 |
p. 3201-3210 |
artikel |
66 |
Edge detection using adjusted Chebyshev polynomials on contrast-enhanced images by modified histogram equalization
|
Acharya, Kuldip |
|
|
|
6 |
p. 3031-3038 |
artikel |
67 |
Editorial
|
Hoda, M. N. |
|
|
|
6 |
p. 2753-2756 |
artikel |
68 |
Editorial
|
Hoda, M. N. |
|
|
|
6 |
p. 2141-2144 |
artikel |
69 |
Editorial
|
Hoda, M. N. |
|
|
|
6 |
p. 2859-2862 |
artikel |
70 |
Embedded and RF switchable ultra-wide band filter bank architecture for radar applications
|
Nakirekanti, Madhu |
|
|
|
6 |
p. 3155-3163 |
artikel |
71 |
Emergency events detection based on integration of federated learning and active learning
|
Alfalqi, Khalid |
|
|
|
6 |
p. 2863-2876 |
artikel |
72 |
Energy and target coverage aware technique for mobile sink based wireless sensor networks with duty cycling
|
Bhasgi, Shivani S. |
|
|
|
6 |
p. 2331-2343 |
artikel |
73 |
Energy efficient clustering routing protocol using novel admission allotment scheme (AAS) based intra-cluster communication for Wireless Sensor Network
|
Thekiya, Mohammed Shahid |
|
|
|
6 |
p. 2815-2824 |
artikel |
74 |
Energy-efficient enhanced Particle Swarm Optimization for virtual machine consolidation in cloud environment
|
Usha Kirana, S. P. |
|
|
|
6 |
p. 2153-2161 |
artikel |
75 |
Enhanced lexicon E-SLIDE framework for efficient sentiment analysis
|
Vashisht, Geetika |
|
|
|
6 |
p. 2169-2174 |
artikel |
76 |
Evaluating the Quality of Indian School Education boards’ websites using multi criteria decision making models
|
Dani, Diksha |
|
|
|
6 |
p. 1-9 |
artikel |
77 |
Experimental analysis of received power for OOK-NRZ visible light communication system using off-the-shelf components
|
Mukherjee, Mrinmoyee |
|
|
|
6 |
p. 2839-2853 |
artikel |
78 |
Female perception towards buying decisions of mobile phones
|
Mittal, Neetu |
|
|
|
6 |
p. 2579-2586 |
artikel |
79 |
Fuzzy attributed goal oriented software requirements analysis with multiple stakeholders
|
Mohammad, Chaudhary Wali |
|
|
|
6 |
p. 1-9 |
artikel |
80 |
Fuzzy based energy efficient clustering for designing WSN-based smart parking systems
|
Sharma, Richa |
|
|
|
6 |
p. 2381-2387 |
artikel |
81 |
Gauss-sigmoid based clustering routing protocol for wireless sensor networks
|
Sharma, Deepak Kumar |
|
|
|
6 |
p. 2569-2577 |
artikel |
82 |
Generation of synthetic datasets using weighted bayesian association rules in clinical world
|
Kharya, Shweta |
|
|
|
6 |
p. 3245-3251 |
artikel |
83 |
Gumbel-SoftMax based graph convolution network approach for community detection
|
Chaudhary, Laxmi |
|
|
|
6 |
p. 3063-3070 |
artikel |
84 |
Hajj and Umrah management during COVID-19
|
Basahel, Sarah |
|
|
|
6 |
p. 2491-2495 |
artikel |
85 |
HRSR-SVM: Hybrid Reptile Search Remora-based Support Vector Machine for forecasting stock price movement
|
Shanthini, P. Matilda |
|
|
|
6 |
p. 3127-3134 |
artikel |
86 |
Hybrid deep learning algorithms for forecasting air quality index using dimension reduction technique in search of precise results
|
Thakur, Nisha |
|
|
|
6 |
p. 3181-3187 |
artikel |
87 |
Identification of plant diseases using convolutional neural networks
|
Jadhav, Sachin B. |
|
|
|
6 |
p. 2461-2470 |
artikel |
88 |
Image classification in artificial neural network using fractal dimension
|
Padhy, Rajalaxmi |
|
|
|
6 |
p. 3003-3013 |
artikel |
89 |
Impact of node mobility on the DL based uplink and downlink MIMO-NOMA network
|
Shankar, Ravi |
|
|
|
6 |
p. 3391-3404 |
artikel |
90 |
Implementation and evaluation of the DAOM framework and support tool for designing blockchain decentralized applications
|
Udokwu, Chibuzor |
|
|
|
6 |
p. 2245-2263 |
artikel |
91 |
Implementation and study of a novel approach to control adaptive cooperative robot using fuzzy rules
|
Enthrakandi Narasimhan, Ganesh |
|
|
|
6 |
p. 2287-2294 |
artikel |
92 |
Implementation of convolution coded OFDM through different channel models on SDR platform
|
Thakur, Ashish |
|
|
|
6 |
p. 2561-2568 |
artikel |
93 |
Improve the recommendation using hybrid tendency and user trust
|
Kumar, Jitendra |
|
|
|
6 |
p. 3147-3156 |
artikel |
94 |
Improving the stockpiling sites for inbound, outbound containers by timing the place of stacking
|
Saleh, Mohammed Ahmed Moqbel |
|
|
|
6 |
p. 3071-3077 |
artikel |
95 |
Integrated intelligent IOT forensic framework for data acquisition through open-source tools
|
Surange, Geetanjali |
|
|
|
6 |
p. 3011-3018 |
artikel |
96 |
Investigation of fuzzy semi-Markovian model for single unit systems with partial failure and Weibull distributed random laws
|
Maan, Vijay Singh |
|
|
|
6 |
p. 2971-2980 |
artikel |
97 |
Isolated words recognition of Adi, a low-resource indigenous language of Arunachal Pradesh
|
Sasmal, Sajal |
|
|
|
6 |
p. 3079-3092 |
artikel |
98 |
Joint aspect-opinion extraction and sentiment orientation detection in university reviews
|
M, Devi Sri Nandhini |
|
|
|
6 |
p. 3213-3225 |
artikel |
99 |
LapEFCM: overlapping community detection using laplacian eigenmaps and fuzzy C-means clustering
|
Hasan, Ahmadi |
|
|
|
6 |
p. 3133-3144 |
artikel |
100 |
LARIC: latency-aware QoS routing for interactive communication in software defined multimedia
|
Suguna, P. |
|
|
|
6 |
p. 2941-2950 |
artikel |
101 |
Light weight hash function using secured key distribution technique for MANET
|
Srividya, Ramisetty |
|
|
|
6 |
p. 3099-3108 |
artikel |
102 |
Low voltage Improved Impedance Wide Bandwidth Current Mirror
|
Kumar, P. Anil |
|
|
|
6 |
p. 2411-2417 |
artikel |
103 |
MacWilliams type identities on Sharma-Kaushik weights for linear codes over ring Zq
|
Sridhar, Meenakshi |
|
|
|
6 |
p. 2995-3001 |
artikel |
104 |
Mathematical modeling and RAMD investigation of cloud infrastructure
|
Saini, Monika |
|
|
|
6 |
p. 3157-3168 |
artikel |
105 |
Maximum likelihood based estimation with quasi oppositional chemical reaction optimization algorithm for speech signal enhancement
|
Kaur, Inderjeet |
|
|
|
6 |
p. 3265-3275 |
artikel |
106 |
Measuring particle size distribution of ground coffee using computer vision
|
Lertsawatwicha, Parkpoom |
|
|
|
6 |
p. 2961-2967 |
artikel |
107 |
Mental arithmetic task load recognition using EEG signal and Bayesian optimized K-nearest neighbor
|
Sharma, Lakhan Dev |
|
|
|
6 |
p. 2363-2369 |
artikel |
108 |
Miniaturized omnidirectional satellite phone antenna inspired by meander line radiator and metamaterial integrated ground plane
|
Acharya, Puja |
|
|
|
6 |
p. 2981-2990 |
artikel |
109 |
MirrorME: implementation of an IoT based smart mirror through facial recognition and personalized information recommendation algorithm
|
Uddin, Khandaker Mohammad Mohi |
|
|
|
6 |
p. 2313-2322 |
artikel |
110 |
Mobilenetv3: a deep learning technique for human face expressions identification
|
Prasad, S. Babu Rajendra |
|
|
|
6 |
p. 3229-3243 |
artikel |
111 |
Modeling and availability analysis of data center: a fuzzy approach
|
Saini, Monika |
|
|
|
6 |
p. 2453-2460 |
artikel |
112 |
Modeling, simulation and computational analysis of plasmonic optical sensor using BaTiO3 in diabetes mellitus
|
Yadav, Archana |
|
|
|
6 |
p. 2163-2168 |
artikel |
113 |
Model view controller (MVC) architecture and client-to-client file transfer protocol with binarized spiking neural network for building a smart home appliances control in IoT
|
Yadawad, Ranganath |
|
|
|
6 |
p. 3189-3200 |
artikel |
114 |
Modified Bird Swarm Algorithm for blind image steganalysis
|
Chhikara, Rita |
|
|
|
6 |
p. 2877-2888 |
artikel |
115 |
Modified variable step incremental-conductance MPPT technique for photovoltaic system
|
Singh, Priyanka |
|
|
|
6 |
p. 2483-2490 |
artikel |
116 |
New evolutionary operators in coloring DIMACS challenge benchmark graphs
|
Marappan, Raja |
|
|
|
6 |
p. 3039-3046 |
artikel |
117 |
Novel design of reversible latches using feynman gate and implementation of reversible combinational circuits
|
Asthana, Amita |
|
|
|
6 |
p. 2903-2915 |
artikel |
118 |
Object detection using deep ensemble model for enhancing security towards sustainable agriculture
|
Singh, Priya |
|
|
|
6 |
p. 3113-3126 |
artikel |
119 |
Offline handwritten Gurmukhi character recognition: k-NN vs. SVM classifier
|
Garg, Anupam |
|
|
|
6 |
p. 2389-2396 |
artikel |
120 |
OpNeD: optimum neighbor density for maximizing lifetime of a wireless sensor network deployed for smart billing of utility services in Indian scenario
|
Ghosh, Moumita |
|
|
|
6 |
p. 3057-3067 |
artikel |
121 |
Opportunities for utilizing consumer grade 3D capture tools for insurance documentation
|
Ponto, Kevin |
|
|
|
6 |
p. 2757-2766 |
artikel |
122 |
Optimal free space optical fronthaul framework for 5G Cran
|
Israr, Ali |
|
|
|
6 |
p. 3327-3334 |
artikel |
123 |
Optimized intelligent framework for peak-to-average power ratio reduction in filter bank multicarrier
|
Kataksham, V. Sudarshani |
|
|
|
6 |
p. 2917-2927 |
artikel |
124 |
Orientation angle based online motion control of an Aldebaran NAO humanoid robot in V-REP software environment using novel sunflower optimization (SFO) algorithm
|
Gupta, Aanjaney |
|
|
|
6 |
p. 2175-2183 |
artikel |
125 |
Parameter estimation of an SRGM using teaching learning based optimization
|
Dhaka, Ramgopal |
|
|
|
6 |
p. 2941-2950 |
artikel |
126 |
PCAC: a new method for predicting compounds with activity cliff property in QSAR approach
|
Keyvanpour, Mohammad Reza |
|
|
|
6 |
p. 2431-2437 |
artikel |
127 |
Performance analysis of 2-D optical prime codes for optical-CDMA
|
Kumar, Ankit |
|
|
|
6 |
p. 1-8 |
artikel |
128 |
Performance evaluation of deep learning models in detection of different types of arrhythmia using photo plethysmography signals
|
Kulkarni, Tripti R. |
|
|
|
6 |
p. 2209-2214 |
artikel |
129 |
Performance evaluation of distance metrics on Firefly Algorithm for VRP with time windows
|
Aggarwal, Divya |
|
|
|
6 |
p. 2355-2362 |
artikel |
130 |
Polarity enriched attention network for aspect-based sentiment analysis
|
Wadawadagi, Ramesh |
|
|
|
6 |
p. 2767-2778 |
artikel |
131 |
Portfolio optimization in stocks using mean–variance optimization and the efficient frontier
|
Agarwal, Shiva |
|
|
|
6 |
p. 2917-2926 |
artikel |
132 |
Predicting vehicle prices via quantum-assisted feature selection
|
Dollen, David Von |
|
|
|
6 |
p. 2897-2905 |
artikel |
133 |
Principal component-based hybrid model for time series forecasting
|
Hajirahimi, Zahra |
|
|
|
6 |
p. 3045-3053 |
artikel |
134 |
Prioritization of e-learners activities using principal component analysis method
|
Raj, S. Anthony Philomen |
|
|
|
6 |
p. 2439-2451 |
artikel |
135 |
Recognition of human skin diseases using inception-V3 with transfer learning
|
Mamun, Md. Al |
|
|
|
6 |
p. 3145-3154 |
artikel |
136 |
Resource optimization in performance modeling for serverless application
|
Kumari, Anisha |
|
|
|
6 |
p. 2867-2875 |
artikel |
137 |
Rule based approach for compound segmentation and paraphrase generation in Sanskrit
|
Dhingra, Vandana |
|
|
|
6 |
p. 3183-3191 |
artikel |
138 |
Selfish node management in opportunistic mobile networks with improved social based watchdog and dynamic power AODV protocol
|
Sherif, Bismin V. |
|
|
|
6 |
p. 3253-3264 |
artikel |
139 |
Semantic relations classification in Hindi compound nouns using embeddings
|
Dwivedi, Vandana |
|
|
|
6 |
p. 2969-2974 |
artikel |
140 |
Sequential (t,n) multi secret sharing scheme for level-ordered access structure
|
Tentu, Appala Naidu |
|
|
|
6 |
p. 2265-2275 |
artikel |
141 |
Shakey: an improved cipher for protection of Iot devices
|
Sivakumar, Anushka |
|
|
|
6 |
p. 3381-3390 |
artikel |
142 |
Similarity evaluation among several benchmark handwritten latin digits datasets
|
Dey, Raghunath |
|
|
|
6 |
p. 2803-2813 |
artikel |
143 |
Simulative analysis of manchester coded DPSK FSO in diverse weather conditions
|
Bharti, Manisha |
|
|
|
6 |
p. 2237-2243 |
artikel |
144 |
Software fault prediction using lion optimization algorithm
|
Goyal, Somya |
|
|
|
6 |
p. 2185-2190 |
artikel |
145 |
Stacking-based ensemble model for malware detection in android devices
|
Joshi, Apoorv |
|
|
|
6 |
p. 2907-2915 |
artikel |
146 |
The classification of medical and botanical data through majority voting using artificial neural network
|
Tripathi, Kshitij |
|
|
|
6 |
p. 3271-3283 |
artikel |
147 |
The impact of Markov model to predict the status of children with congenital heart disease at post-operative ICU
|
Sharwardy, Sharmin Nahar |
|
|
|
6 |
p. 3285-3292 |
artikel |
148 |
TwitterGAN: robust spam detection in twitter using novel generative adversarial networks
|
Diqi, Mohammad |
|
|
|
6 |
p. 3103-3111 |
artikel |
149 |
UMAP guided topological analysis of transcriptomic data for cancer subtyping
|
Rather, Arif Ahmad |
|
|
|
6 |
p. 2855-2865 |
artikel |
150 |
Using the Unified Theory of Acceptance and Use of Technology to Investigate the Adoption of Open Educational Resources by Faculty Members
|
Smirani, Lassaad |
|
|
|
6 |
p. 3201-3211 |
artikel |
151 |
Visual cryptography for securing medical images using a combination of hyperchaotic-based pixel, bit scrambling, and DNA encoding
|
Maurya, Richa |
|
|
|
6 |
p. 3227-3234 |
artikel |