26 results on '"Singh, Simar Preet"'
Search Results
2. Enhancing explainability in predicting mental health disorders using human–machine interaction
3. Routing attack induced anomaly detection in IoT network using RBM-LSTM
4. Privacy Enhancement in Internet of Things (IoT) via mRMR for prevention and avoidance of data leakage
5. Retraction Note: SVM-based compliance discrepancies detection using remote sensing for organic farms
6. Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing
7. Securing Internet of Things devices against code tampering attacks using Return Oriented Programming
8. Integrated frame work for identifying sustainable manufacturing layouts based on big data, machine learning, meta-heuristic and data envelopment analysis
9. Designing of fog based FBCMI2E Model using machine learning approaches for intelligent communication systems
10. Robust Facial Biometric Authentication System Using Pupillary Light Reflex for Liveness Detection of Facial Images.
11. Design and exploration of load balancers for fog computing using fuzzy logic
12. RETRACTED ARTICLE: SVM-based compliance discrepancies detection using remote sensing for organic farms
13. Fog computing security using token-based authentication system.
14. Fog computing: from architecture to edge computing and big data processing
15. 1 - Big Data classification: techniques and tools
16. Chapter 10 - Intelligent Smart Home Energy Efficiency Model Using Artificial Intelligence and Internet of Things
17. Chapter 5 - Internet of Intelligent Things: Injection of Intelligence into IoT Devices
18. Leveraging energy‐efficient load balancing algorithms in fog computing.
19. MeQryEP: A Texture Based Descriptor for Biomedical Image Retrieval.
20. SVM-based compliance discrepancies detection using remote sensing for organic farms.
21. List of contributors
22. List of contributors
23. DYNAMIC TASK SCHEDULING USING BALANCED VM ALLOCATION POLICY FOR FOG COMPUTING PLATFORMS.
24. Proposed Protocol to Enhance the Performance of AOMDV Routing Protocol Under Flooding Attack in Different Propagation Models.
25. Effective load balancing strategy using fuzzy golden eagle optimization in fog computing environment.
26. Efficient content retrieval in fog zone using Nano‐Caches.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.