default search action
International Journal of Next-Generation Computing, Volume 11
Volume 11, Number 1, 2020
Original Research
- Latesh Kumar K. J, Leena H. U:
NGEN Firewall Security Augmentation using Brooks-Iyengar and Random Forest Classfier method: by Predicting Cyber Threats from: Darkweb/Deepweb Data. - Mikael Desertot, Rudy Bisiaux, Sylvain Lecomte, Dorian Petit:
Evaluation and qualification of mobile application quality. - Krati Rastogi, Divya Lohani:
An IoT-based Framework to Forecast Indoor Air Quality using ANFIS-DTMC model.
- Jhimli Adhikari:
OCCUPANCY BASED PATTERN MINING: CURRENT STATUS AND FUTURE DIRECTIONS. - Akhil Kumar, Arvind Kalia, Akashdeep Sharma:
Object Detection: A Comprehensive Review of the State-of-the-Art Methods.
Volume 11, Number 2, 2020
Original Research
- Ajitha K. M, N. Chenthalir Indra:
BIVARIATE CORRELATIVE OPPOSITIONAL BASED ARTIFICIAL FISH SWARM RESOURCE OPTIMIZED TASK SCHEDULING IN CLOUD. - Hemendra Mahendra Naik, Shubham Ashay Vaity, Shannon Nelson D'mello, Saurabh Dadasaheb Patil:
DecenTube: A decentralized video streaming platform (dApp) using Ethereum and IPFS. - Nikhil Kumar, Debopam Acharya, Divya Lohani:
An IoT Enabled Vehicular Decision Fusion Framework for Accident Detection and Classification.
- Shafika Showkat Moni, D. Manivannan:
Privacy-preserving and Authentication in VANETs. - Satinder Bal Gupta, Raj Kumar Yadav, Shivani Gupta:
Analysis of Popular Techniques Used in Educational Data Mining.
- Arun Kumar, Sunil Kumar S. Manvi:
Bounding Box Alignment Based Pedestrian Crossing Collision Avoidance Using Convolution Neural Networks.
Volume 11, Number 3, 2020
Original Research
- Baban A. Mahmood, D. Manivannan:
A Secure Source Routing Protocol for Mobile Ad Hoc Networks. - Anitha P:
Hexagonal Picture Languages Generated By Assembling Hexagonal Tiles. - Prabhat Kumar Upadhyay, Archana Pandita, Nisheeth Joshi:
Fuzzy Logic Based Detection of SLA Violation in Cloud Computing - A Predictive Approach. - Rahul Das, Mona Dwivedi:
Multi-Level Fuzzy Cluster Based Trust Estimation for Hierarchical Wireless Sensor Networks. - Navneet Kaur, Hardeep Singh:
An Empirical Analysis of Threshold Techniques for identifying Faulty Classes.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.