113 results on '"Durgesh Kumar"'
Search Results
2. Challenges and Opportunities in Modeling Dronebased Surveillance for Open Border Security in Vulnerable Gaps and Areas: A Review.
3. Machine Intelligence for Predicting New Start-ups Success: A Survey.
4. Machine learning based Development and Evaluation of a Hand Exoskeleton Rehabilitation Robot for Patients with Partial Paralysis
5. Towards Practical and Efficient High-Resolution HDR Deghosting with CNN.
6. Prioritized Named Entity Driven LDA for Document Clustering.
7. A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm.
8. Electromagnetic Performance Analysis of Steel-Canned Halbach Permanent Magnet Rotor Synchronous Machine
9. Effect of Eccentric Tooth Tip Arc on Cogging Torque of PM Machines
10. Ammonium sulphate induces dose-dependent ammonium stress in rice seedlings.
11. Carbon nitride nano biochar imparts concentration dependent impact on finger millet growth.
12. Carbon nitride nano-biochar exhibit dose-dependent effect on rice growth.
13. Silicon exhibits dose-dependent impact on barley growth.
14. Your Classifier can Secretly Suffice Multi-Source Domain Adaptation.
15. A Novel User Selection and Resource Allocation Framework for Cooperative D2D Communication.
16. Secure Sum Computation Using Homomorphic Encryption.
17. Startup Success and Failure Prediction Algorithm Using k-Means Clustering and Artificial Neural Network
18. Design of Dopingless Nanowire FET with the Effect of Interface Charges upon Linearity Analysis
19. Secure Sum Computation for Insecure Networks.
20. Link Prediction Using Social Network Analysis over Heterogeneous Terrorist Network.
21. A new fault isolation and automatic energization scheme for inverter interfaced distributed energy resource using autorecloser.
22. A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set.
23. Effects of Inset-Magnet Depth on the Performance of Axial-Flux PM BLDC Machine
24. A survey on threats in routing security in manet for trust management using SMC protocols.
25. Electronic Data Interchange: A Review.
26. Reliability Analysis for Wireless Sensor Networks Considering Environmental Parameters Using MATLAB.
27. An Investigation into the creation of a Monitoring System that Works in Real Time within a Smart Grid Environment
28. Strategic Game theory models and commercialization for Nano RFID systems.
29. Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network.
30. Security issues in MANET: A review.
31. Tri-TTP based architecture for Secure Multi-Party Computations using Virtual Parties.
32. Classification Rule Mining for Object Oriented Databases: A Brief Review.
33. A Paramount Pair of Cache Replacement Algorithms on L1 and L2 Using Multiple Databases with Security.
34. Key Issues of Security and Integrity in Third Party Association Rule Mining.
35. Congestion Control during Data Privacy in Secure Multiparty Computation.
36. Integration of Battery Energy Storage System with Solar Power Generation System along with Load Management System
37. Machine Intelligence for Predicting New Start-ups Success
38. New Optimized Fractional Slot Concentrated Winding Design for MMF Harmonic Reduction
39. Analysing Data Mining Techniques on Bank Customers for Credit Score
40. New Optimized Winding and Core Design for Space Harmonic Reduction in Doubly Fed Induction Machine
41. A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm
42. Design, Modeling, and Analysis of Dual Rotor Axial Flux Induction Motor
43. Torque Ripple Reduction in Unsymmetrical Two Phase Induction Motor
44. Modified Distributed Winding for Harmonic Reduction in Space MMF Distribution
45. A novel approach for CPU utilization on a multicore paradigm using parallel quicksort
46. Dynamics of attack of malicious codes on the targeted network: Effect of firewall
47. A Survey Paper on a Compact Data Structure Based Technique for Mining Frequent Closed Item Set
48. Secure Sum Computation for Insecure Networks
49. A roadmap towards trust management & privacy preservation in mobile ad hoc networks
50. Design Methodology and Analysis of Multi-Axes Motion Controller On FPGA
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.