251 results on '"Uttam Ghosh"'
Search Results
2. A Secure Blockchain Enabled V2V Communication System Using Smart Contracts
3. A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT
4. Next-Generation Internet of Things in Fintech Ecosystem
5. An SEQAIHR model to study COVID-19 transmission and optimal control strategies in Hong Kong, 2022
6. A mathematical model of Zika virus transmission with saturated incidence and optimal control: A case study of 2016 zika outbreak in Puerto Rico
7. An attempt to construct an indole-fused azabicyclo[3.3.1]nonane framework via radical cyclization
8. Study of Memory Effect in an EOQ Model with Fractional Polynomial Demand Rate Under Fuzzy Environment
9. Effect of Fear, Treatment, and Hunting Cooperation on an Eco-Epidemiological Model: Memory Effect in Terms of Fractional Derivative
10. DYNAMIC INTERACTIONS BETWEEN PREY AND PREDATOR WITH COOPERATION AND ALLEE EFFECT: DETERMINISTIC AND STOCHASTIC APPROACH
11. Privacy Preserving Authentication System based on Non-interactive Zero Knowledge Proof Suitable for Internet of Things
12. Transmission dynamics and control strategy of single-strain dengue disease
13. Complex dynamical behaviour of a delayed prey-predator model with square root functional response in presence of fear in the prey
14. MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing
15. Study of Memory Effect in an Economic Order Quantity Model for Completely Backlogged Demand During Shortage
16. A Residual Resource Fitness-Based Genetic Algorithm for a Fog-Level Virtual Machine Placement for Green Smart City Services
17. An inventory model for partial backlogging items with memory effect
18. DeCrypt:a 3DES inspired optimised cryptographic algorithm
19. Study of co-dimension two bifurcation of a prey–predator model with prey refuge and non-linear harvesting on both species
20. Formation and Shock Solutions of the Time Fractional (2+1) and (3+1)-Dimensional Boiti–Leon–Manna–Pempinelli Equations
21. Fog Assisted Tiger Alarming Framework for Saving Endangered Wild Life
22. Efficient Allocation of Resource-Intensive Mobile Cyber–Physical Social System Applications on a Heterogeneous Mobile Ad Hoc Cloud
23. On optimal harvesting policy for two economically beneficial species mysida and herring: a clue for conservation biologist through mathematical model
24. A Comprehensive Tutorial on Cybersecurity in Quantum Computing Paradigm
25. Conformation Based in silico Studies of Cyclic Tetrapeptides with βγ Fused Turns as Thrombin Inhibitors
26. Effect of Environmental Fluctuation in the Dynamics of a Three-Species Food Chain Model with Sexually Reproductive Generalized Type Top Predator and Crowley-Martin Type Functional Response Between Predators
27. Editorial: The New Era of Computer Network by using Machine Learning
28. Transmission Dynamics of COVID-19 with Saturated Treatment: A Case Study of Spain
29. A Study of a Prey-Generalist Predator System Considering Hunting Cooperation and Fear Effects Under Interval Uncertainty
30. Security, Trust, and Privacy Management Framework in Cyber-Physical Systems using Blockchain
31. Dynamic Joint Deployment of SDN Controllers and Hypervisors for Softwarized 5G and Beyond – The Indian Perspective
32. Blockchain Enabled SDN Framework for Security Management in 5G Applications
33. Contributors
34. An intelligent deep learning approach for colon cancer diagnosis
35. Editorial Special Section on Security, Privacy, and Trust Analysis and Service Management for Intelligent Internet of Things Healthcare
36. Research on the Dynamic Monitoring System Model of University Network Public Opinion under the Big Data Environment
37. Analytic Solution of the Fractional Order Non-linear Schrödinger Equation and the Fractional Order Klein Gordon Equation
38. FedLearnSP: Preserving Privacy and Security Using Federated Learning and Edge Computing
39. GLOBAL DYNAMICS OF A PREY–PREDATOR MODEL WITH HOLLING TYPE III FUNCTIONAL RESPONSE IN THE PRESENCE OF HARVESTING
40. Secure and transparent pharmaceutical supply chain using permissioned blockchain network
41. Guest Editorial Special Issue on Secure Data Analytics for Emerging Internet of Things
42. Novel Vote Scheme for Decision-Making Feedback Based on Blockchain in Internet of Vehicles
43. Studies of different types of bifurcations analyses of an imprecise two species food chain model with fear effect and non-linear harvesting
44. AI Based Energy Efficient Routing Protocol for Intelligent Transportation System
45. Complex dynamics of a prey-predator interaction model with Holling type-II functional response incorporating the effect of fear on prey and non-linear predator harvesting
46. Intelligent Task Scheduling Approach for IoT Integrated Healthcare Cyber Physical Systems
47. Homomorphic Encryption-based Privacy-preserving Federated Learning in IoT-enabled Healthcare System
48. Construction of fractional granular model and bright, dark, lump, breather types soliton solutions using Hirota bilinear method
49. Enabling Sustainable Energy for Smart Environment Using 5G Wireless Communication and Internet of Things
50. Smart stochastic routing for 6G-enabled massive Internet of Things
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.