Comparative Analysis of Threat Detection Techniques in Drone Networks
Syed Golam Abid,
Muntezar Rabbani,
Arpita Sarker,
Tasfiq Ahmed Rafi,
Dip Nandi
MiMaLo: Advanced Normalization Method for Mobile Malware Detection
Sriyanto,
Sahib B. Sahrin,
Abdullah Mohd. Faizal,
Nanna Suryana,
Adang Suhendra
Prioritization of Test Cases in Software Testing Using M2 H2 Optimization
Kodepogu Koteswara Rao,
M. Babu Rao,
Chaduvula Kavitha,
Gaddala Lalitha Kumari,
Yalamanchili Surekha
An Intelligent System for Detecting Fake Materials on the Internet
Aya S. Noah,
Naglaa E. Ghannam,
Gaber A. Elsharawy,
Abeer S. Desuky
Effectiveness of English Online Learning Based on Dual Channel Based Capsnet
Raghavendra Kulkarni,
Indrajit Patra,
Neelam Sharma,
Tribhuwan Kumar,
Avula Pavani,
M. Kavitha
STEM Project for Vehicle Image Segmentation Using Fuzzy Logic
Serhiy Balovsyak,
Oleksandr Derevyanchuk,
Vasyl Kovalchuk,
Hanna Kravchenko,
Yuriy Ushenko,
Zhengbing Hu
Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions
Tohfa Niraula,
Aditi Pokharel,
Ashmita Phuyal,
Pratistha Palikhel,
Manish Pokharel
Implementing Video OCR along with SWT Technique for Video indexing and Analysis
Paruchuru Grishman,
Akula Rajitha,
Mohammed Khaja Moinuddin,
Mannava Subhramanaya Sreekar,
Siddam Jayanth
Performance Analysis of IoT Cloud-based Platforms using Quality of Service Metrics
Supreme A. Okoh,
Elizabeth N. Onwuka,
Suleiman Zubairu,
Bala A. Salihu,
Peter Y. Dibal
Privacy Enhancing for Fog Computing based - IoT
Samaa Y. Tarabay,
Ibrahim Yasser,
Ahmed S. Samra,
Abeer T. Khalil