95 results on '"Patel, Asma"'
Search Results
2. Object tracking and detection techniques under GANN threats: A systemic review
3. Preserving users' location privacy in mobile platforms
4. Development and approval of rybelsus (oral semaglutide): ushering in a new era in peptide delivery
5. Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K.
6. Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions
7. Feasibility of Structured, Machine-Readable Privacy Notices
8. Predicting Forex Currency Fluctuations Using a Novel Bio-Inspired Modular Neural Network
9. Protecting Smartphone Users’ Private Locations Through Caching
10. A Middleware Enforcing Location Privacy in Mobile Platform
11. Formulation studies and development of novel anticancer prodrugs
12. Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K.
13. Patients undergoing general anaesthesia: A dosage comparison study of cisatracurium for intubation
14. A Middleware Enforcing Location Privacy in Mobile Platform
15. Protecting Smartphone Users’ Private Locations Through Caching
16. Still Birth classification: Application of Relevant Condition at Death (ReCoDe) classification system in a tertiary care hospital of Pakistan
17. Phytoestrogens as natural prodrugs in cancer prevention: a novel concept
18. Development and approval of rybelsus (oral semaglutide): ushering in a new era in peptide delivery
19. Sarcoid-like reaction: a unique response to immunotherapy in malignant melanoma
20. Developing a security behavioural assessment approach for cyber rating UK MSBs
21. Still Birth classification: Application of Relevant Condition at Death (ReCoDe) classification system in a tertiary care hospital of Pakistan.
22. LP-Cache: Privacy-aware Cache Model for Location-based Apps
23. Validation of Gujarati Version of the Neck Pain and Disability Scale in Patients with Chronic Neck Pain.
24. Privacy Preservation in Location-Based Mobile Applications: Research Directions
25. Smart care spaces: needs for intelligent at-home care
26. The Design and Synthesis of Novel 3‐[2‐Indol‐1‐yl‐ethyl]‐1H‐indole Derivatives as Selective Inhibitors of CDK4.
27. The design and synthesis of novel 3-[2-indol-1-yl-ethyl]-1 H-indole derivatives as selective inhibitors of CDK4
28. A Middleware Enforcing Location Privacy in Mobile Platforms
29. Transforming Forensics Digital: What works in digital forensics? (Effectiveness of digital forensics techniques)
30. Characterizing Blockchain Interoperability Systems from an Architecture Perspective
31. A Review of Crime Scene Investigations Through Augmented Reality
32. A Multi-sensor Information Fusion Method for Autonomous Vehicle Perception System
33. Clustered WSN for Building Energy Management Applications
34. Efficient 2D Processing of 1D Sensor Signals
35. Realizing Seamless Integration of Sensors and Actuators into the IoT
36. Detection Against Replay Attack: A Feedback Watermark Approach
37. A Forensic-Ready Intelligent Transportation System
38. Propagation Characteristics of LoRa-Based Wireless Communication in Steel Ship Cabin
39. Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network
40. Blockchain Technology in Supply Chain Management – A Discussion of Current and Future Research Topics
41. Machine Learning-Based Predictors for ICU Admission of COVID-19 Patients
42. Micropayments Interoperability with Blockchain and Off-Chain Data Store to Improve Transaction Throughputs
43. A State-of-the-Art Blockchain Approach to the ETSI Implementation for Long-Term Preservation Solutions
44. Critical Review of Citizens’ Participation in Achieving Smart Sustainable Cities: The Case of Saudi Arabia
45. Implementation and Comparison of Four Algorithms on Transportation Problem
46. Prevention of IoT-Enabled Crime Using Home Routers (PITCHR)
47. An Overview of the Status of DNS and HTTP Security Services in Higher Education Institutions in Portugal
48. Benefits and Obstacles of Smart Governance in Cities
49. Scalable and Sustainable Community Networks for Inclusive Smart Cities
50. Security in V2X Communications: A Comparative Analysis of Simulation/Emulation Tools
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.