Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             50 results found
no title author magazine year volume issue page(s) type
1 A digital image colorimetry approach for identifying fuel types in downstream petroleum sector Hemachandiran, S.

15 3 p. 1443-1452
article
2 A hierarchical blockchain architecture for secure data sharing for vehicular networks C, Kripakar Srinivasan

15 3 p. 1689-1697
article
3 Analysis of multichannel neurophysiological signal for detecting epilepsy using deep-nets Swati, Shipra

15 3 p. 1435-1441
article
4 An approach for anti-forensic contrast enhancement detection using grey level co-occurrence matrix and Zernike moments Goel, Neha

15 3 p. 1625-1636
article
5 An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems Srikanth, G. Umarani

15 3 p. 1221-1230
article
6 An efficient mCK signing and mobile based identity solution for authentication Kamal, Kapil Kant

15 3 p. 1637-1646
article
7 A novel, low-cost, smart IoT based framework for fruit and vegetable quality detection during transit in India Wason, Ritika

15 3 p. 1509-1519
article
8 Application of a fuzzy differential equation system to the oil and gas industry safety model Mondal, Debapriya

15 3 p. 1243-1253
article
9 A proficient two stage model for identification of promising gene subset and accurate cancer classification Dass, Sayantan

15 3 p. 1555-1568
article
10 A secure algorithm using high-dimensional sine map for color image encryption Ahuja, Bharti

15 3 p. 1535-1543
article
11 A study on improving bounds for batch verification of DNA synthesis using concurrent ZKP Singh, Rajrupa

15 3 p. 1417-1425
article
12 Background region based Face orientation prediction through HSV skin color model and K-Means clustering Prakash, Shet Reshma

15 3 p. 1275-1288
article
13 Closed-set automatic speaker identification using multi-scale recurrent networks in non-native children Radha, Kodali

15 3 p. 1375-1385
article
14 Congestion control in high speed optical data center networks Shukla, Madhukar Prashant

15 3 p. 1481-1488
article
15 Development and optimization of deep convolutional neural network using Taguchi method for real-time electricity conservation system Ushasukhanya, S.

15 3 p. 1521-1534
article
16 Ebola optimization search algorithm for the enhancement of devops and cycle time reduction DileepKumar, S. R.

15 3 p. 1309-1317
article
17 Editorial Hoda, M. N.

15 3 p. 1201-1204
article
18 Enabling power attack on traces of FPGA based block ciphers not acquired with start of encryption Singh, Arvind Kumar

15 3 p. 1367-1373
article
19 Enhanced personalized recommendation system for machine learning public datasets: generalized modeling, simulation, significant results and analysis Bhaskaran, S.

15 3 p. 1583-1595
article
20 Genetic algorithm based identification of biogas production model from wastewater via anaerobic digestion model no.1 Chaabna, Abdelhani

15 3 p. 1465-1472
article
21 GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment Arunkumar, M.

15 3 p. 1653-1660
article
22 Hate speech recognition in multilingual text: hinglish documents Yadav, Arun Kumar

15 3 p. 1319-1331
article
23 HHO-ACO hybridized load balancing technique in cloud computing Sumathi, Muruganandam

15 3 p. 1357-1365
article
24 Hybrid approach for next basket recommendation system Yannam, V Ramanjaneyulu

15 3 p. 1733-1740
article
25 Hyperspectral image classification using efficientnet-B4 with search and rescue operation algorithm Srinivasan, S.

15 3 p. 1473-1479
article
26 Improving group recommendation using deep collaborative filtering approach Yannam, V. Ramanjaneyulu

15 3 p. 1489-1497
article
27 Interference reduction in hybrid beamforming using 2-D overlapped partially connected subarray structure Londhe, Gayatri D.

15 3 p. 1407-1415
article
28 Key performance indicators analysis for 4 G-LTE cellular networks based on real measurements Shakir, Zaenab

15 3 p. 1347-1355
article
29 Land use and land cover detection system using an intelligent framework Rohini, S.

15 3 p. 1661-1677
article
30 Logistic random forest boosting technique for Alzheimer’s diagnosis Shastry, K. Aditya

15 3 p. 1719-1731
article
31 ModChain: a hybridized secure and scaling blockchain framework for IoT environment Pabitha, P.

15 3 p. 1741-1754
article
32 Modified dropping-random early detection (MD-RED): a modified algorithm for controlling network congestion Hassan, Samuel

15 3 p. 1499-1508
article
33 Multi-factor ranking method for trading-off accuracy, diversity, novelty, and coverage of recommender systems Alhijawi, Bushra

15 3 p. 1427-1433
article
34 MVM-LBP :  mean−variance−median based LBP for face recognition Arora, Nitin

15 3 p. 1231-1242
article
35 Novel ALBP and OLBP features for gender prediction from offline handwriting Verma, Aryan

15 3 p. 1453-1464
article
36 Optimal color watermarking scheme using PSO in RDWT domain Thanki, Rohit

15 3 p. 1205-1219
article
37 Optimization of search space division with enhanced shared memory-based utility list buffer miner with a parallel framework (SM-PLB) for effective high utility itemset mining Atmaja, Eduardus Hardika Sandy

15 3 p. 1597-1609
article
38 ParichartBOT: a chatbot for automatic answering for postgraduate students of an open university Sakulwichitsintu, Songlak

15 3 p. 1387-1397
article
39 Person identification using electrocardiogram and deep long short term memory Gupta, Praveen Kumar

15 3 p. 1709-1717
article
40 Predicting the level of autism and improvement rate from assessment dataset using machine learning techniques Khan, Shahidul Islam

15 3 p. 1647-1652
article
41 Protein tertiary structure prediction by integrating ant colony optimization with path relinking and structure knowledge Sekhar, Sivagnanam Rajamanickam Mani

15 3 p. 1399-1405
article
42 Reduction of torque ripple in induction motor-driven electric vehicle using optimized stator flux Sahoo, Anjan Kumar

15 3 p. 1333-1346
article
43 Secure video steganography using key frame and region selection technique Roselinkiruba, R.

15 3 p. 1299-1308
article
44 SMOTE and ExtraTreesRegressor based random forest technique for predicting Australian rainfall Irshada, Mariyam

15 3 p. 1679-1687
article
45 Solar energy harvested prolong stability period protocol for wireless sensor networks Yadav, Amit

15 3 p. 1289-1297
article
46 Spatio-temporal based video anomaly detection using deep neural networks Chaurasia, Rajeev Kumar

15 3 p. 1569-1581
article
47 The moderating role of trust in government adoption e-service during Covid-19 pandemic: health belief model perspective Sihotang, Dony Martinus

15 3 p. 1545-1553
article
48 Using distributed ledger technology for digital forensic investigation purposes on tendering projects Ramazhamba, P. T.

15 3 p. 1255-1274
article
49 Wader hunt optimization based UNET model for change detection in satellite images Vasantrao, Chafle Pratiksha

15 3 p. 1611-1623
article
50 Wavelet scattering and scalogram visualization based human brain decoding using empirical wavelet transform Lakshmipriya, B.

15 3 p. 1699-1708
article
                             50 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands