164 results on '"Nandal, Amita"'
Search Results
52. Fractal Feature Based Image Resolution Enhancement Using Wavelet–Fractal Transformation in Gradient Domain.
53. Fermatean Fuzzy Programming with New Score Function: A New Methodology to Multi-Objective Transportation Problems.
54. Fuzzy enhancement and deep hash layer based neural network to detect Covid-19
55. Artificial Neural Network Dual Hesitant Fermatean Fuzzy Implementation in Transportation of COVID-19 Vaccine
56. Likelihood Estimation and Wavelet Transformation Based Optimization for Minimization of Noisy Pixels
57. 6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates
58. An Optimal Higher Order Likelihood Distribution Based Approach for Strong Edge and High Contrast Restoration
59. LWT-DCT based Image Watermarking Scheme using Normalized SVD
60. A DCT Fractional bit replacement based Dual Watermarking Algorithm for Image Authentication
61. A Novel Architecture for Production of Glance-Friendly Online Documents Using Semiformal Approach
62. Modified PCA Transformation with LWT for High-Resolution based Image Fusion
63. Enhanced image fusion using directive contrast with higher‐order approximation
64. Contrast‐based image enhancement algorithm using grey‐scale and colour space
65. Statistical approach using phase variance for analysing correlated multipath fading environment
66. Fuzzy enhanced image fusion using pixel intensity control
67. LWT-DCT based Image Watermarking Scheme using Normalized SVD
68. A DCT Fractional Bit Replacement Based Dual Watermarking Algorithmfor Image Authentication
69. Erratum: Fractal Feature Based Image Resolution Enhancement Using Wavelet–Fractal Transformation in Gradient Domain.
70. Enhanced image fusion using directional contrast rules in fuzzy transform domain
71. Statistical Approach for Performance Analysis of Multipath Scattering Environment.
72. Booth Multiplier using Reversible Logic with Low Power and Reduced Logical Complexity
73. DA-Based Efficient Testable FIR Filter Implementation on FPGA Using Reversible Logic
74. Optimized Reversible Logic Based Add and Shift Multiplier Using Linear Transformation
75. Linear transformation based efficient canonical signed digit multiplier using high speed and low power reversible logic
76. Quantum Simulation for Reversible Gates as Fourier Transform Application.
77. Study and Analysis of Various Multiplier Architectures Using Reversible Logic.
78. A Fuzzy Optimization Technique for Multi-Objective Aspirational Level Fractional Transportation Problem.
79. Hyper-parameters Study for Breast Cancer Datasets: Enhancing Image Security and Accuracy for Prediction Class
80. Satellite Image Classification Using ANN
81. On-Orbit, Non-destructive Surface Surveillance and Inspection with Convolution Neural Network
82. Power Quality Disturbance Classification Using Transformer Network
83. Creation of Novel Database for Knowledge Repository on Cyber Security
84. Preventing Fault Attacks on S-Boxes of AES-Like Block Ciphers
85. Learning Co-occurrence Embeddings for Sentence Classification
86. Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing
87. Critical Analysis of IoT Ecosystem to Understand Security Threats and Challenges
88. An Efficient Image Encryption Technique Using Logistic Map and 2D-TCLM
89. Analysis of Various Supervised Machine Learning Algorithms for Intrusion Detection
90. INTELLIBOT - Intelligent Voice Assisted Chatbot with Sentiment Analysis, COVID Dashboard and Offensive Text Detection
91. Enhancing Security Mechanism in Smart Phones Using Crowdsourcing
92. Ramadan Group Transform Fundamental Properties and Some its Dualities
93. Short-Delay Multipath Errors in NavIC Signals for Stationary Receivers
94. Point Clouds Object Classification Using Part-Based Capsule Network
95. Study of Various Attacks Over Images Transferred Optically Through Communication Channel
96. A Study on Cyber Security in Various Critical IT Infrastructure Organizational Sectors: Challenges and Solutions
97. Design of a High Efficiency Access Control and Authentication Analysis Model for Cloud Deployments Using Pattern Analysis
98. Privacy Preserving of Two Local Data Sites Using Global Random Forest Classification
99. Practical Phase Shift Model for RIS-Assisted D2D Communication Systems
100. Recent Trend of Transform Domain Image Steganography Technique for Secret Sharing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.