Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 599 matches
- 2024
- K. G. Shreeharsha, Siddharth R. K., M. H. Vasantha, Kumar Y. B. Nithin:
An Error Bound Particle Swarm Optimization for Analog Circuit Sizing. IEEE Access 12: 50126-50136 (2024) - Prateek Chhikara, Rajkumar Tekchandani, Neeraj Kumar:
Adaptive federated learning scheme for recognition of malicious attacks in an IoT network. Computing 106(4): 1177-1192 (2024) - Swamiraj Nithiyanantha Vasagam, Bhoopalan Ravikumar, Rajkumar Kavibharathi, Jeyasekaran Keerthana, Ramaseshan Sathya Narayanan, Kharbanda Geetika:
Prediction of leather footwear export using learning algorithms based on ANN model. Expert Syst. Appl. 238(Part A): 121809 (2024) - S. R. Sannasi Chakravarthy, Bharanidharan Nagarajan, Vinoth Kumar Venkatesan, T. R. Mahesh, R. Sivakami, Jonnakuti Rajkumar Annad:
Breast Tumor Classification with Enhanced Transfer Learning Features and Selection Using Chaotic Map-Based Optimization. Int. J. Comput. Intell. Syst. 17(1): 18 (2024) - Samiksha Rajkumar Nagrare, Ashwini Ratnoo, Debasish Ghose:
Intersection Planning for Multilane Unmanned Aerial Vehicle Traffic Management. J. Aerosp. Inf. Syst. 21(3): 216-233 (2024) - Ayush Dosaj, Suresh Chandra Satapathy, Rajkumar Soundrapandiyan, Mannat Kaur, Naeem Hannoon:
An efficient cloud based face recognition system for e-health secured login using steerable pyramid transform and local directional pattern. J. Ambient Intell. Humaniz. Comput. 15(1): 1017-1027 (2024) - Sumithra M, Rajkumar N:
A novel weighted deep convolution model - African vultures optimization algorithm for an automated facial emotion recognition system. Multim. Tools Appl. 83(6): 18607-18636 (2024) - Naveen Chandra Gowda, Sunilkumar S. Manvi, A. Bharathi Malakreddy, Rajkumar Buyya:
TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments. J. Supercomput. 80(5): 6855-6890 (2024) - Bhawana, Sushil Kumar, Rajkumar Singh Rathore, Upasana Dohare, Omprakash Kaiwartya, Jaime Lloret, Neeraj Kumar:
BEET: Blockchain Enabled Energy Trading for E-Mobility Oriented Electric Vehicles. IEEE Trans. Mob. Comput. 23(4): 3018-3034 (2024) - Himanshu Sharma, Neeraj Kumar, Rajkumar Tekchandani:
SecBoost: Secrecy-Aware Deep Reinforcement Learning Based Energy-Efficient Scheme for 5G HetNets. IEEE Trans. Mob. Comput. 23(2): 1401-1415 (2024) - K. Rajkumar, U. Hariharan, V. Dhanakoti, N. Muthukumaran:
A secure framework for managing data in cloud storage using rapid asymmetric maximum based dynamic size chunking and fuzzy logic for deduplication. Wirel. Networks 30(1): 321-334 (2024) - Y. Rajkumar, Sripathi Venkata Naga Santhosh Kumar:
An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. Wirel. Networks 30(1): 335-362 (2024) - Neel Kansara, Aadharsh Rajkumar, Pragati Dharmale, Mahesh Khadtare:
Enhancing Autism Spectrum Disorder Recognition in EEG Data through Filtering-Driven CNN Approach. ICCE 2024: 1-7 - Alan Chan, Carson Ezell, Max Kaufmann, Kevin Wei, Lewis Hammond, Herbie Bradley, Emma Bluemke, Nitarshan Rajkumar, David Krueger, Noam Kolt, Lennart Heim, Markus Anderljung:
Visibility into AI Agents. CoRR abs/2401.13138 (2024) - Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim:
Securing Cloud-Based Internet of Things: Challenges and Mitigations. CoRR abs/2402.00356 (2024) - Maria Rodriguez Read, Chinmaya Kumar Dehury, Satish Narayana Srirama, Rajkumar Buyya:
Deep Reinforcement Learning (DRL)-based Methods for Serverless Stream Processing Engines: A Vision, Architectural Elements, and Future Directions. CoRR abs/2402.17117 (2024) - Ankur Nahar, Koustav Kumar Mondal, Debasis Das, Rajkumar Buyya:
qIoV: A Quantum-Driven Internet-of-Vehicles-Based Approach for Environmental Monitoring and Rapid Response Systems. CoRR abs/2403.18622 (2024) - 2023
- Naiwrita Borah, Udayan Baruah, Mahesh Thylore Ramakrishna, Vinoth Kumar Venkatesan, D. Ramya Dorai, Jonnakuti Rajkumar Annad:
Efficient Assamese Word Recognition for Societal Empowerment: A Comparative Feature-Based Analysis. IEEE Access 11: 82302-82326 (2023) - K. G. Shreeharsha, Siddharth R. K., M. H. Vasantha, Y. B. Nithin Kumar:
Partition Bound Random Number-Based Particle Swarm Optimization for Analog Circuit Sizing. IEEE Access 11: 123577-123588 (2023) - Priyashantha Tennakoon, Samikkannu Rajkumar, Dushantha Nalin K. Jayakody:
Game Theory Based Delta-OMA Scheme for VLC Networks. IEEE Access 11: 10777-10791 (2023) - Rajkumar Soundrapandiyan, Himanshu Naidu, Marimuthu Karuppiah, M. Maheswari, Ramesh Chandra Poonia:
AI-based wavelet and stacked deep learning architecture for detecting coronavirus (COVID-19) from chest X-ray images. Comput. Electr. Eng. 108: 108711 (2023) - Yogesh Sharma, Deval Bhamare, Nishanth Sastry, Bahman Javadi, Rajkumar Buyya:
SLA Management in Intent-Driven Service Management Systems: A Taxonomy and Future Directions. ACM Comput. Surv. 55(13s): 292:1-292:38 (2023) - Vigneswara Rao Gannapathy, Vigneswaran Narayanamurthy, Siva Kumar Subramaniam, Ahamed Fayeez Tuani Ibrahim, Ida Syafiza M. Isa, Sujatha Rajkumar:
Mobile and Web-Based Security Guard Patrolling, Monitoring and Reporting System to Maintain Safe and Secure Environment at Premises. Int. J. Interact. Mob. Technol. 17(11): 4-14 (2023) - Asha K. N, R. Rajkumar:
DCF-MLSTM: a deep security content-based filtering scheme using multiplicative BiLSTM for movie recommendation system. Int. J. Syst. Syst. Eng. 13(1) (2023) - R. Rajkumar, Asha K. N:
DCF-MLSTM- A Deep security Content-Based Filtering Scheme Using Multiplicative BiLSTM for Movie Recommendation System. Int. J. Syst. Syst. Eng. 13(1) (2023) - Manikandan Natarajan, Thejasree Pasupuleti, Jayant P. Giri, Neeraj Sunheriya, Lakshmi Narasimhamu Katta, Rajkumar B. Chadge, Chetan Mahatme, Pallavi Giri, Saurav Mallik, Kanad Ray:
Machinability of Titanium Grade 5 Alloy for Wire Electrical Discharge Machining Using a Hybrid Learning Algorithm. Inf. 14(8): 439 (2023) - S. Karthikeyini, R. Sagayaraj, N. Rajkumar, Punitha Kumaresa Pillai:
Security in Medical Image Management Using Ant Colony Optimization. Inf. Technol. Control. 52(2): 276-287 (2023) - Rajkumar Gaur, Shiva Prakash, L. V. Narasimha Prasad, Sanjay Kumar, Kumar Abhishek, Manisha Guduri:
A Secure and Efficient Scheme Based on Unlinkability and Anonymous Traceable Protocol for Cloud-Assisted IoT Environment. J. Circuits Syst. Comput. 32(18): 2350316:1-2350316:21 (2023) - P. Anuradha, Ch. Navitha, G. Renuka, M. Jithender Reddy, K. Rajkumar:
A deep learning framework optimised by Harris Hawks algorithm for intelligent ECG classification in WSN-IoT environment. J. Intell. Fuzzy Syst. 45(5): 8489-8501 (2023) - S. Madhavi, N. C. Santhosh, S. Rajkumar, R. Praveen:
Pythagorean Fuzzy Sets-based VIKOR and TOPSIS-based multi-criteria decision-making model for mitigating resource deletion attacks in WSNs. J. Intell. Fuzzy Syst. 44(6): 9441-9459 (2023)
skipping 569 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-10 15:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint