1,883 results on '"Aslam Khan"'
Search Results
102. Corona Virus-19: Impact on Education by using Online Teaching Methodology by the University Teachers and Students in Delhi NCR Region
103. Fabrication of Bilayer Nanofibrous-Hydrogel Scaffold from Bacterial Cellulose, PVA, and Gelatin as Advanced Dressing for Wound Healing and Soft Tissue Engineering
104. Design of normalized fractional SGD computing paradigm for recommender systems.
105. Blockchain and Smart Healthcare Security: A Survey.
106. The Miraculous True History of Nomi Ali
107. Comprehensive investigation of Opto-electronic and transport properties of Cs2ScAgX6 (X = Cl, Br, I) for solar cells and thermoelectric applications
108. Nanocomposite hydrogels for melanoma skin cancer care and treatment: In-vitro drug delivery, drug release kinetics and anti-cancer activities
109. Development of porous, antibacterial and biocompatible GO/n-HAp/bacterial cellulose/β-glucan biocomposite scaffold for bone tissue engineering
110. Process modeling and simulation of ethylene oxide production by implementing pinch and cost analysis
111. CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover.
112. LPQ-SAM: A Low-Power Quality Scalable Approximate Multiplier.
113. TriDroid: a triage and classification framework for fast detection of mobile threats in android markets.
114. Subjective logic-based trust model for fog computing.
115. Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network.
116. Tweet-Based Bot Detection Using Big Data Analytics.
117. Detection and Prediction of Diabetes Using Data Mining: A Comprehensive Review.
118. Memory augmented hyper-heuristic framework to solve multi-disciplinary problems inspired by cognitive problem solving skills.
119. Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT.
120. A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection.
121. A context-aware encryption protocol suite for edge computing-based IoT devices.
122. DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks.
123. Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing.
124. Reliable Path Selection and Opportunistic Routing Protocol for Underwater Wireless Sensor Networks.
125. A Hybrid Approach for Energy Consumption Forecasting With a New Feature Engineering and Optimization Framework in Smart Grid.
126. An Innovative Optimization Strategy for Efficient Energy Management With Day-Ahead Demand Response Signal and Energy Consumption Forecasting in Smart Grid Using Artificial Neural Network.
127. MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance.
128. Formal Verification of Hardware Components in Critical Systems.
129. Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering.
130. BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things.
131. Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework.
132. Internet of drones security: Taxonomies, open issues, and future directions.
133. Supply Chain Management (SCM): A Critical Study of Literature Reviews to Analyse the Critical Factors of Success in the Competitive Market in India
134. EVALUATION OF URBAN ENCROACHMENT ON FARMLAND : A THREAT TO URBAN AGRICULTURE IN PESHAWAR CITY DISTRICT, PAKISTAN
135. A Multi-Classifier Framework for Open Source Malware Forensics.
136. A descriptive study to assess the experiences of mothers of infants (42 days-6 months of age) on respectful maternity care residing in Dadu Majra Colony, UT, Chandigarh (2021-2022)
137. A Comparative Study of Green and Chemical Cerium Oxide Nanoparticles (CeO2-NPs): From Synthesis, Characterization, and Electrochemical Analysis to Multifaceted Biomedical Applications
138. Optimal energy resource mix for the US and China to meet emissions pledges
139. Normalized fractional adaptive methods for nonlinear control autoregressive systems
140. KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research.
141. A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks.
142. TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection.
143. Design of Momentum Fractional Stochastic Gradient Descent for Recommender Systems.
144. An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks.
145. A New Users Rating-Trend Based Collaborative Denoising Auto-Encoder for Top-N Recommender Systems.
146. Formal Analysis of Language-Based Android Security Using Theorem Proving Approach.
147. Fractional stochastic gradient descent for recommender systems.
148. Toward an optimal solution against Denial of Service attacks in Software Defined Networks.
149. Accurate detection of sitting posture activities in a secure IoT based assisted living environment.
150. BRONCHIAL STENTING IN ADVANCED ESOPHAGEAL CARCINOMA: A SYSTEMATIC REVIEW AND META-ANALYSIS
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.