![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
EAI Endorsed Transactions on Scalable Information Systems, Volume 7
Volume 7, Number 24, January 2020
- Jyoti Arora, Meena Tushir:
A new Semi-Supervised Intuitionistic Fuzzy C-means Clustering. e1 - Pooja Kherwa, Poonam Bansal:
Topic Modeling: A Comprehensive Review. e2 - Umer Farooq
, Khalil Ahmad:
Heterogenetic knowledge classification Using Fuzzy inference for unified data clusters. e3 - Asif Ali Laghari, Rashid Ali Laghari, Asif Ali Wagan, Aamir Iqbal Umrani:
Effect of Packet Loss and Reorder on Quality of Audio Streaming. e4 - Shefali Dhingra, Poonam Bansal:
A Competent and Novel Approach of Designing an Intelligent Image Retrieval System. e5 - Raghu Vamsi P.
, Anjali Chahuan:
Machine Learning Based Hybrid Model for Fault Detection in Wireless Sensors Data. e6 - S. Khurana, R. K. Singh:
Workflow scheduling and reliability improvement by hybrid intelligence optimization approach with task ranking. e7 - Kiran Kumar Paidipati
, Arjun Banik:
Forecasting of Rice Cultivation in India-A Comparative Analysis with ARIMA and LSTM-NN Models. e8
Volume 7, Number 25, March 2020
- Satyam Gangwar, Vikram Bali
, Ajay Kumar
:
Comparative Analysis of Wind Speed Forecasting Using LSTM and SVM. e1 - Neha Sharma
, Usha Batra
, Sherin Zafar:
Confine Ingenious Firefly Algorithm Correlating Water Drop Algorithm for Amassment in Networks. e2 - Jyoti Arora, Meena Tushir, R. Kashyap:
Improving Semi-Supervised Classification using Clustering. e3 - Rachhpal Singh:
A Gene Expression Data Classification and Selection Method using Hybrid Meta-heuristic technique. e4 - Lipika Goel
, Mayank Sharma, Sunil Kumar Khatri
, D. Damodaran:
Prediction of Cross Project Defects using Ensemble based Multinomial Classifier. e5 - Gaurav Gupta, Neelesh Kumar, Indu Chhabra:
Optimised Transformation Algorithm For Hadoop Data Loading in Web ETL Framework. e6
Volume 7, Number 26, 2020
- Shilpi Harnal, R. K. Chauhan:
Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud. e1 - Shahan Yamin Siddiqui, Syed Anwar Hussnain, Abdul Hannan Siddiqui, Rimsha Ghufran, Muhammad Saleem Khan, Muhammad Sohail Irshad, Abdul Hannan Khan:
Diagnosis of Arthritis Using Adaptive Hierarchical Mamdani Fuzzy Type-1 Expert System. e2 - Iftikhar Naseer
, Bilal Shoaib Khan, Shazia Saqib, Syed Nadeem Tahir, Sheraz Tariq, Muhammad Saleem Akhter:
Diagnosis Heart Disease Using Mamdani Fuzzy Inference Expert System. e3 - Iqbal H. Sarker
, Md. Faisal Faruque, Hamed AlQahtani, Asra Kalim
:
K-Nearest Neighbor Learning based Diabetes Mellitus Prediction and Analysis for eHealth Services. e4 - S. Venkataramana
, B. V. D. S. Sekhar
, Bhupathiraju V. S. Ramakrishnam Raju, Vedula V. S. S. S. Chakravarthy, Gorla Srinivas:
An Experimental Analysis of Secure-Energy Trade-Off using Optimized Routing Protocol In modern-secure-WSN. e5 - Ritu Singh, Navin Rajpal, Rajesh Mehta:
Wavelet and kernel dimensional reduction on arrhythmia classification of ECG signals. e6 - Pooja Kherwa, Poonam Bansal:
Semantic N-Gram Topic Modeling. e7 - Shalu Mehta, Amita Malik:
A Swarm Intelligence Based Coverage Hole Healing Approach for Wireless Sensor Networks. e8 - Mamata Garanayak, Sipra Sahoo, Sachi Nandan Mohanty
, Alok Kumar Jagadev:
An Automated Recommender System for Educational Institute in India. e9 - R. M. Jindal, Vijay Rana
, S. K. Sharma:
Simplification of Punjabi Sentences: Converting Complex Participial Sentences into Simple Sentences. e10
Volume 7, Number 27, 2020
- Muhammad Abbas
, Kamran Ali Memon
, Noor Ul-Ain, Ekang Francis Ajebesone, Muhammad Usaid
, Zulfiqar Ali Bhutto:
An Improved Weighted Base Classification for Optimum Weighted Nearest Neighbor Classifiers. e1 - Neha Sharma
, Usha Batra
:
Performance analysis of compression algorithms for information security: A Review. e2 - Farhan Khan, Saqib Saqib, Pireh Soomro, Asif Ali Laghari
, Kamran Ali Memon
:
Social Networks Mining and Analysis of Specific Groups (Political and Regional) by using API. e3 - Virendra P. Vishwakarma, Sahil Dalal
:
Neuro-Fuzzy Hybridization using Modified S Membership Function and Kernel Extreme Learning Machine for Robust Face Recognition under Varying Illuminations. e4 - Anshu Kumar Dwivedi
, Awadesh K. Sharma:
FEECA: Fuzzy based Energy Efficient Clustering Approach in Wireless Sensor Network. e5 - A. Suryan, C. Kumar, M. Mehta, R. Juneja, A. Sinha:
Learning Model for Phishing Website Detection. e6 - Shefali Dhingra, Poonam Bansal:
A Novel & Efficient Fusion Based Image Retrieval Model for Speedy Image Recovery. e7 - R. Bala
, R. Manoharan:
Enhanced Bitcoin Protocol with Effective Block Creation and Verification by Trusted Miners. e8 - Sabuzima Nayak, Ripon Patgiri
, Thoudam Doren Singh:
Big Computing: Where are we heading? e9 - Akshay Aggarwal, Aniruddha Chauhan, Deepika Kumar, Mamta Mittal
, Sharad Verma:
Classification of Fake News by Fine-tuning Deep Bidirectional Transformers based Language Model. e10 - Bhargavi B.
, K. Swarupa Rani:
Finding Frequent Subgraphs and Subpaths through Static and Dynamic Window Filtering Techniques. e11 - Guilherme Birckan, Moisés Lima Dutra, Douglas Dyllon Jeronimo de Macedo, Angel Freddy Godoy Viera:
Effects of data protection laws on data brokerage businesses. e12
Volume 7, Number 28, 2020
- Ravi Sharma
, Shiva Prakash:
Eurasian Wolves-Cuckoo Search Optimizer for Localization of Mobile Sensor Nodes using Single Beacon Node in WSN. e1 - Amit Kumar Gautam, Rakesh Kumar:
Secure new node ID assignment for internet integrated wireless body area networks. e2 - Abdul Hannan Khan, Syed Anwer Hasnain, Shahan Yamin Siddiqui, Muhammad Sohail Irshad, Muhammad Sajid, Shahid Iqbal:
Analytical Method to Compute the Cloud Computing Data Security Issues by Using Encryption Algorithms. e3 - Arun Kumar Yadav
, Jay Kant Pratap Singh Yadav
, Divakar Yadav
:
Spatial Ambiguities Optimization in GIR. e4 - Sanjeev Kumar Bhagat
, Naladi Ram Babu, Lalit Chandra Sakia, Dhenuvakonda Koteswara Raju:
Maiden Application of Meta-Heuristic Techniques with Optimized Integral minus Tilt-Derivative Controller for AGC of Multi-area Multi-Source System. e5 - Saleemullah Memon
, Kamlesh Kumar Soothar
, Kamran Ali Memon
, Arif Hussain Magsi, Asif Ali Laghari
, Muhammad Abbas
, Noor Ul-Ain:
The Design of Wireless Portable Electrocardiograph Monitoring System Based on ZigBee. e6 - Noor Ul-Ain, Kamran Ali Memon
, Muhammad Abbas
, Nazish Nawaz Hussaini
, Zulfiqar Ali Bhutto, Kamlesh Kumar Soothar
:
A Visualization Based Analysis on Dynamic Bandwidth Allocation Algorithms for Optical Networks. e7 - Neetu Gupta
, Ritu Vijay, Hemant Kumar Gupta
:
Performance Evaluation of Symmetrical Encryption Algorithms with Wavelet Based Compression Technique. e8 - Amandeep Singh Dhanjal
, Williamjeet Singh:
An Automatic Conversion of Punjabi Text to Indian Sign Language. e9 - Nageen Saleem, Areeba Rahman, Muhammad Rizwan, Shahid Naseem, Fahad Ahmad:
Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution. e10
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.