281 results on '"Irshad, Azeem"'
Search Results
2. Artificial Intelligence Systems in Environmental Engineering
3. PDAC-SL: A PUF-enabled drone access control technique for smart logistics
4. Intelligent dynamic spectrum access using fuzzy logic in cognitive radio networks
5. An effective framework to improve the managerial activities in global software development
6. An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
7. Review: a comparative study of state-of-the-art skin image segmentation techniques with CNN
8. Studying infant mortality: A demographic analysis based on data mining models
9. Predictive analytics in smart healthcare for child mortality prediction using a machine learning approach
10. A machine learning method for predicting disease-associated microRNA connections using network internal topology data
11. COVID-19 and commodity effects monitoring using financial & machine learning models
12. A low-cost privacy preserving user access in mobile edge computing framework
13. A secure demand response management authentication scheme for smart grid
14. An anonymous device to device access control based on secure certificate for internet of medical things systems
15. A secure blockchain-oriented data delivery and collection scheme for 5G-enabled IoD environment
16. SAWPS: Secure Access Control for Wearable Plant Sensors—Reinforcing Agriculture 4.0
17. A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks
18. Research on the evaluation method of English textbook readability based on the TextCNN model and its application in teaching design
19. SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
20. MCLA Task Offloading Framework for 5G-NR-V2X-Based Heterogeneous VECNs
21. An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
22. DAC‐MD: A privacy preserving drone‐access control scheme for last mile delivery.
23. SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber–Physical Systems
24. A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
25. Research on the evaluation method of English textbook readability based on the TextCNN model and its application in teaching design.
26. Energy efficient indoor localisation for narrowband internet of things.
27. An efficient and secure design of multi-server authenticated key agreement protocol
28. A secure mutual authenticated key agreement of user with multiple servers for critical systems
29. SUSIC:A Secure User Access Control mechanism for SDN-enabled IIoT and Cyber Physical Systems
30. Extended state space recursive least squares
31. Skill Specific Spoken Dialogues Based Personalized ATM Design to Maximize Effective Interaction for Visually Impaired Persona
32. A Novel Self-Calibrated UWB-Based Indoor Localization Systems for Context-Aware Applications
33. SPAKE-DC: A Secure PUF Enabled Authenticated Key Exchange for 5G-Based Drone Communications
34. Identification and Visualization of Spatial and Temporal Trends in Textile Industry
35. BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment
36. ReSOTS: RFID/IoT-enabled Secure Object Tracking Key Exchange for Trustworthy Smart Logistics
37. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture
38. An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo’s Scheme
39. An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification
40. Comments on “A privacy preserving three-factor authentication protocol for e-health clouds”
41. An improved and secure chaotic map based authenticated key agreement in multi-server architecture
42. An Algorithm for Prediction of Overhead Messages in Client-Server Based Wireless Networks
43. An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
44. Architecture, Protocols, and Security in IoV: Taxonomy, Analysis, Challenges, and Solutions
45. Review: a comparative study of state-of-the-art skin image segmentation techniques with CNN
46. Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks
47. Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers
48. Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS-WLAN
49. An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre
50. Flexible and efficient aggregation framework for antifragile wireless mesh networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.