1 |
Hybrid Blowfish and RSA Algorithms to Secure Data between Cloud Server and Client |
|
|
visibility
|
2 |
A comprehensive study of position based routing protocols in WSNs |
|
2015 |
visibility
|
3 |
Cloud computing service models: A comparative study |
|
2016 |
visibility
|
4 |
Security and privacy issues in cloud computing |
|
2016 |
visibility
|
5 |
A Performance Analysis of Hybrid Technique using DES and RSA algorithms |
|
2017 |
visibility
|
6 |
The Crop Monitoring System-Based on Wireless Sensors Network-(WSN) |
|
2019 |
visibility
|
7 |
Security Issues and Solutions at Different Layers of Cloud Computing |
|
|
visibility
|
8 |
A survey on cloud computing |
|
2018 |
visibility
|
9 |
Reducing the required time and power for data encryption and decryption using K-NN machine learning |
|
2019 |
visibility
|
10 |
Method to implement K-NN machine learningto classify data privacy in IoT environment |
|
2020 |
visibility
|
11 |
Automated brain tumor classification using various deep learning models: a comparative study |
|
2021 |
visibility
|
12 |
Internet of things (IoT): a technology review, security issues, threats, and open challenges |
|
2020 |
visibility
|
13 |
Clustering similar time series data for the prediction the patients with heart disease |
|
2022 |
visibility
|
14 |
Method to implement K-NN machine learning to classify data privacy in IoT environment |
|
2020 |
visibility
|
15 |
A review on symmetric key encryption techniques in cryptography |
|
2016 |
visibility
|
16 |
Evaluation of hybrid encryption technique to secure data during transmission in cloud computing |
|
2017 |
visibility
|
17 |
Intelligent Hybrid Technique to Secure Bluetooth Communications |
|
2020 |
visibility
|
18 |
A comparative study of various routing classes and their key goals in wireless sensor networks |
|
2018 |
visibility
|
19 |
An Optimal LEACH-Based Routing Protocol to Balance the Power Consumption and Extending the Lifetime of the WSNs |
|
2016 |
visibility
|
20 |
Two-step fuzzy logic system to achieve energy efficiency and prolonging the lifetime of WSNs |
|
2017 |
visibility
|
21 |
Hybrid Blowfish and RSA Algorithms to Secure Data between Cloud Server and Client |
|
|
visibility
|
22 |
A comprehensive study of position based routing protocols in WSNs |
2015 4th International Conference on Reliability, Infocom Technologies and … |
2015 |
visibility
|
23 |
Cloud computing service models: A comparative study |
2016 3rd International Conference on Computing for Sustainable Global … |
2016 |
visibility
|
24 |
Security and privacy issues in cloud computing |
2016 3rd International Conference on Computing for Sustainable Global … |
2016 |
visibility
|
25 |
A Performance Analysis of Hybrid Technique using DES and RSA algorithms |
2017 4th International Conference on Computing for Sustainable Global … |
2017 |
visibility
|
26 |
The Crop Monitoring System-Based on Wireless Sensors Network-(WSN) |
AUSrevista |
2019 |
visibility
|
27 |
Security Issues and Solutions at Different Layers of Cloud Computing |
Aligarh, |
|
visibility
|
28 |
A survey on cloud computing |
Big Data Analytics |
2018 |
visibility
|
29 |
Reducing the required time and power for data encryption and decryption using K-NN machine learning |
IETE Journal of Research |
2019 |
visibility
|
30 |
Method to implement K-NN machine learningto classify data privacy in IoT environment |
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS … |
2020 |
visibility
|
31 |
Automated brain tumor classification using various deep learning models: a comparative study |
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS … |
2021 |
visibility
|
32 |
Internet of things (IoT): a technology review, security issues, threats, and open challenges |
Indonesian Journal of Electrical Engineering and Computer Science 20 (2 … |
2020 |
visibility
|
33 |
Clustering similar time series data for the prediction the patients with heart disease |
Indonesian Journal of Electrical Engineering and Computer Science 26 (2 … |
2022 |
visibility
|
34 |
Method to implement K-NN machine learning to classify data privacy in IoT environment |
Institute of Advanced Engineering and Science (IAES) |
2020 |
visibility
|
35 |
A review on symmetric key encryption techniques in cryptography |
International Journal of Computer Applications |
2016 |
visibility
|
36 |
Evaluation of hybrid encryption technique to secure data during transmission in cloud computing |
International Journal of Computer Applications |
2017 |
visibility
|
37 |
Intelligent Hybrid Technique to Secure Bluetooth Communications |
International Symposium on Signal and Image Processing |
2020 |
visibility
|
38 |
A comparative study of various routing classes and their key goals in wireless sensor networks |
Next-Generation Networks |
2018 |
visibility
|
39 |
An Optimal LEACH-Based Routing Protocol to Balance the Power Consumption and Extending the Lifetime of the WSNs |
Proceedings of First International Conference on Information and … |
2016 |
visibility
|
40 |
Two-step fuzzy logic system to achieve energy efficiency and prolonging the lifetime of WSNs |
Wireless Networks |
2017 |
visibility
|