143 results on '"Razaque, Abdul"'
Search Results
2. A review of artificial intelligence methods for Alzheimer's disease diagnosis: Insights from neuroimaging to sensor data analysis
3. Energy-efficient and secure mobile fog-based cloud for the Internet of Things
4. DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network
5. Efficient and reliable forensics using intelligent edge computing
6. Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology
7. Simulation based Study of TCP Variants in Hybrid Network
8. Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL)
9. Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs)
10. Stream Control Transmission Protocol (SCTP): Robust and Efficient for Data Centre Applications
11. Deployment of Stream Control Transmission Protocol (SCTP) to Maintain the Applications of Data Centers
12. Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network
13. Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs)
14. Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment
15. Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL)
16. TCP-UB: A New congestion aware transmission control protocolvariant
17. Novel Framework for Mobile Collaborative learning (MCL)to substantiate pedagogical activities
18. Fostering Project Scheduling and Controlling Risk Management
19. Analytical Study of Pre-congestion notification (PCN) techniques
20. Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)
21. Designing an Intelligent Scoring System for Crediting Manufacturers and Importers of Goods in Industry 4.0.
22. Early Results of Mechanochemical Ablation by Flebogrif and Radiofrequency Ablation in Treating Primary Varicose Veins of Lower Limb
23. Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things
24. Heterogeneous Algorithm for Efficient-Path Detection and Congestion Avoidance for a Vehicular-Management System
25. Secure data aggregation using access control and authentication for wireless sensor networks
26. Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process
27. A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers
28. Developing Robotic Process Automation to Efficiently Integrate Long-Term Business Process Management.
29. A Data-Science Approach for Creation of a Comprehensive Model to Assess the Impact of Mobile Technologies on Humans
30. Quality of Service Generalization using Parallel Turing Integration Paradigm to Support Machine Learning
31. Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment
32. Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms
33. Anomaly Detection Paradigm for Multivariate Time Series Data Mining for Healthcare
34. Detection of Unauthorized Unmanned Aerial Vehicles Using YOLOv5 and Transfer Learning
35. Light Weight Authentication Scheme for Smart Home IoT Devices
36. Privacy preserving model: a new scheme for auditing cloud stakeholders
37. Clickbait Detection Using Deep Recurrent Neural Network
38. Big Data Handling Approach for Unauthorized Cloud Computing Access
39. Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection
40. State-of-art review of information diffusion models and their impact on social network vulnerabilities
41. An Efficient Data-Balancing Cyber-Physical System Paradigm for Quality-of-Service (QoS) Provision over Fog Computing
42. Influence of COVID-19 Epidemic on Dark Web Contents
43. Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
44. Credit Card-Not-Present Fraud Detection and Prevention Using Big Data Analytics Algorithms.
45. A Multichannel Deep Learning Framework for Cyberbullying Detection on Social Media
46. Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System
47. Blockchain-Enabled Transaction Scanning Method for Money Laundering Detection
48. Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification
49. Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security
50. Enhanced Grey Risk Assessment Model for Support of Cloud Service Provider
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.