89 results on '"Ragha, Lata"'
Search Results
2. Text Generation and Enhanced Evaluation of Metric for Machine Translation
3. Challenges in making blockchain privacy compliant for the digital world: some measures
4. High-Resolution Image-to-Image Translation for Aesthetic Enhancements Using Generative Adversarial Network
5. Alphanumeric Character Recognition on Tiny Dataset
6. RETRACTED CHAPTER: A Review: Various Steering Conventions in MANET
7. Blockchain Impact of Security and Privacy in Digital Identity Management
8. Network Selection Scheme Using Taguchi Method for Real-Time Streaming Media Over Heterogeneous Networks
9. Establishing Secure Routing Path Using Trust to Enhance Security in MANET
10. An Accident Detection System (ADS) for the Mumbai-Pune Expressway Using Vehicular Communication
11. Mobile Ad Hoc Networks Security Enhancement With Trust Management
12. Text Generation and Enhanced Evaluation of Metric for Machine Translation
13. Optimizing Pesticide Decisions with Deep Transfer Learning by Recognizing Crop Pest
14. Vigorous and Efficient Trust Model for Security Enhancement in MANET
15. Alphanumeric Character Recognition on Tiny Dataset
16. A Review: Various Steering Conventions in MANET
17. A Quantum Resistant Blockchain System for Privacy Protection of Patient Records
18. Network Selection Scheme Using Taguchi Method for Real-Time Streaming Media Over Heterogeneous Networks
19. Security Aspects in Cloud Computing
20. Dlctlungdetectnet: Deep Learning for Lung Tumor Detection in Ct Scans
21. An Accident Detection System (ADS) for the Mumbai-Pune Expressway Using Vehicular Communication
22. Security Aspects in Cloud Computing
23. ECBFMBP: Design of an Ensemble deep learning Classifier with Bio-inspired Feature Selection for high-efficiency Multidomain Bug Prediction.
24. Analysis of Software Bug Prediction and Tracing Models from a Statistical Perspective Using Machine Learning
25. Using Weakly Supervised Machine learning Algorithms for Classification and Analysis of CT Scan Lung Cancer Images
26. Abstractive Text Summarization For Multimodal Data
27. Analysis of CT Scan Lung Cancer Images using Machine Learning Algorithms
28. Secured and Quantum Resistant Key Exchange Cryptography Methods – A Comparison
29. MACVTL: Improving Efficiency of Mood Analysis from Text & Facial Cues Using Cross Validation and Transfer Learning.
30. Comparison of Time-Series Forecasting Models
31. Blockchain Technology: Applications and Research Challenges
32. Adaptive fuzzy‐based message dissemination and micro‐artificial bee colony algorithm optimised routing scheme for vehicular ad hoc network
33. Deployment and Decentralized Identity Management for VANETs
34. Impact of Mobility and Density on Performance of MANET
35. Hybrid spectrum access model using game theory approach for multi-channel heterogeneous mobile cognitive radio wireless sensor network
36. Establishing Secure Routing Path Using Trust to Enhance Security in MANET
37. ETSR: Enhanced Trust Based Secure Routing Scheme for Mobile Ad Hoc Networks
38. Mitigation of Resource Depletion in AD-HOC Network
39. Video Quality Assessment through PSNR Estimation for Different Compression Standards
40. A Sneak Preview of Sentiment Analysis
41. Mitigation of attack on authenticating identities in ad-hoc network
42. A dynamic spectrum access model for cognitive radio wireless sensor network
43. Performance analysis of various video compression standards
44. Avoidance of co-operative black hole attack in AODV in MANET
45. Security agents for detecting and avoiding cooperative blackhole attacks in MANET
46. A DYNAMIC SPECTRUM ACCESS OPTIMIZATION MODEL FOR COGNITIVE RADIO WIRELESS SENSOR NETWORK.
47. A genetic approach for processor scheduling
48. Security enabled DSR for establishing symmetric key and security in MANETS
49. Privacy Preserving in Data Mining Using Hybrid Approach
50. Hybrid Approach for Database Intrusion Detection with Reactive Policies
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.