Search

Your search keyword '"Durgesh Kumar"' showing total 95 results

Search Constraints

Start Over You searched for: Author "Durgesh Kumar" Remove constraint Author: "Durgesh Kumar" Topic computer science Remove constraint Topic: computer science
95 results on '"Durgesh Kumar"'

Search Results

2. Visual Encryption Using Block based Scrambling Followed by Affine Encryption Technique

4. Nonsmooth PI Controller for Uncertain Systems

5. Artificial Intelligence applied on the basis of powering of vessel and its operational and management aspects

6. A Target Tracking System Using Directional Nodes in Wireless Sensor Networks

8. The Future Digital Work Force: Robotic Process Automation (RPA)

9. An approach using Trust Management with Next-Generation IoT Networks for Healthcare, Agriculture and Sustainable Development Goals

10. Design & Implementation of Enhanced Security Architecture to Improve Performance of Cloud Computing

12. Bank Customer’s Credit Score Prediction Using Feature Selection and Data Mining Algorithm

13. State Space Modeling of Earned Value Method for Iterative Enhancement Based Traditional Software Projects Tracking

14. Agile Planning and Tracking of Software Projects Using the State-Space Approach

15. Accident Detection Using Deep Learning

16. A New Methodology on Sentiment Analysis

17. Analysing Data Mining Techniques on Bank Customers for Credit Score

18. Emotion Dynamics of Public Opinions on Twitter

19. Design and Performance Analysis of Active Inductor with Low Voltage and High Q factor

20. Towards Practical and Efficient High-Resolution HDR Deghosting with CNN

21. Recent advances in scaling-up of non-conventional extraction techniques: learning from successes and failures

22. A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm

23. Lyapunov Function Analysis for System with Stochastic Nonsmooth PI Controller

24. An Overview of Smart Identity Cards for Educational Institutions

25. Mining of data through various soft computing techniques

26. Embedding Parallelism in the Process of Sorting

27. Domain wall motion control for racetrack memory applications

28. Prioritized Named Entity Driven LDA for Document Clustering

29. A Novel User Selection and Resource Allocation Framework for Cooperative D2D Communication

30. Threshold Analysis and Comparison of Sequential and Parallel Divide and Conquer Sorting Algorithms

31. A simplified simulation model of silicon photovoltaic modules for performance evaluation at different operating conditions

32. Stress analysis of Landing gear of light Unmanned Aerial Vehicle

33. Person-Dependent Face Recognition Using Histogram of Oriented Gradients (HOG) and Convolution Neural Network (CNN)

34. Security and Privacy Issues in Big Data: A Review

35. Secure Sum Computation Using Homomorphic Encryption

36. A New Symmetric Key Encryption Algorithm Based on Jumbling Binary Sequence of Message

37. Study of Electromagnetic Radiation Effects on Human Body and Reduction Techniques

38. Energy Efficient Transmission in the Presence of Interference for Wireless Sensor Networks

39. Exploring the Multifaceted Role of Microbes in Pharmacology

40. Big Data Analytics : Proceedings of CSI 2015

41. VNC server based robot for military applications

42. The New Image Encryption and Decryption Using Quasi Group

43. Simulation of gain flattened 32 channels EDFA-DWDM optical system

44. Critical Node Detection in Large Scale Mobile Ad hoc Networks

45. A Reliability Calculations Model for Large-Scale MANETs

46. Auction System for Automated E-Commerce: JADE based Multiagent Application

47. Performance Investigation of ANN Controller-Assisted Small Hydro Power Generation System

48. Evaluating Negotiation Protocols and Negotiation Strategies for Automated E-Commerce

49. Dynamics of attack of malicious codes on the targeted network: Effect of firewall

50. Secure Sum Computation for Insecure Networks

Catalog

Books, media, physical & digital resources