Analyzing the Patterns of Delhi’s Air Pollution
|
2020 |
Sharma, Shally |
Design Flaws and Cryptanalysis of a Standard Mutual Authentication Protocol for Cloud Computing-Based Healthcare System
|
2020 |
Kumari, Adesh |
Soft Computing Paradigms Based Clustering in Wireless Sensor Networks: A Survey
|
2020 |
Sharma, Richa |
How to Help Johnny to Travel in a Brimming Train?
|
2020 |
Jain, Vanita |
ANN Model for Liver Disorder Detection
|
2020 |
Dhingra, Shubham |
An Experimental Approach to Unravel Effects of Malware on System Network Interface
|
2020 |
Subairu, Sikiru Olanrewaju |
Controller Area Network for Battlefield-of-Things
|
2020 |
Desai, S. Sundeep |
Smart Ticketing for Academic Campus Shuttle Transportation System Based on RFID
|
2020 |
Abayomi-Alli, Olusola |
Design of Big Data Privacy Framework—A Balancing Act
|
2020 |
Geetha, P. |
Develop Ten Security Analytics Metrics for Big Data on the Cloud
|
2020 |
Wang, Yong |
Crime Data Set Analysis Using Formal Concept Analysis (FCA): A Survey
|
2020 |
Kapoor, Prerna |
Advanced Anti-theft and Accident Alert System for Two-Wheelers Using Location-Based Services
|
2020 |
Arora, Aditya |
Design Flaws and Cryptanalysis of Elliptic Curve Cryptography-Based Lightweight Authentication Scheme for Smart Grid Communication
|
2020 |
Kumar, Vinod |
Macro Factors Affecting Cloud Computing Readiness: A Cross-Country Analysis
|
2020 |
Tripathy, Samit |
Distributed Authentication Security for IOT Using DASS and LOKI91
|
2020 |
Sharma, Santosh Kumar |
Forecasting Air Quality of Delhi Using ARIMA Model
|
2020 |
Gourav |
Proposed Model for Distributed Storage Automation System Using Kubernetes Operators
|
2020 |
Sharma, Ashish |
Classification and Analysis of Real-World Earthquake Data Using Various Machine Learning Algorithms
|
2020 |
Vasti, Manka |
Training Data on Recursive Parallel Processors for Deep Learning
|
2020 |
Raheja, Shipra |
Robust Speaker Recognition Based on Low-Level- and Prosodic-Level-Features
|
2020 |
Jagdale, S. M. |