Scientific Research An Academic Publisher
OPEN ACCESS
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets (Articles)
Bhavesh Borisaniya, Dhiren Patel
Journal of Information Security Vol.6 No.3,July 28, 2015
DOI: 10.4236/jis.2015.63025 5,732 Downloads 6,983 Views Citations
A Quantitative Analysis of Collision Resolution Protocol for Wireless Sensor Network (Articles)
Reema Patel, Dhiren Patel
Journal of Software Engineering and Applications Vol.8 No.8,August 13, 2015
DOI: 10.4236/jsea.2015.88036 3,724 Downloads 4,321 Views Citations
Trusted Heartbeat Framework for Cloud Computing (Articles)
Dipen Contractor, Dhiren Patel, Shreya Patel
Journal of Information Security Vol.7 No.3,April 1, 2016
DOI: 10.4236/jis.2016.73007 3,673 Downloads 4,576 Views Citations
K-Means Graph Database Clustering and Matching for Fingerprint Recognition (Articles)
Vaishali Pawar, Mukesh Zaveri
Intelligent Information Management Vol.7 No.4,July 30, 2015
DOI: 10.4236/iim.2015.74019 5,486 Downloads 6,362 Views Citations
Graph Based Filtering and Matching for Symbol Recognition (Articles)
Journal of Signal and Information Processing Vol.9 No.3,August 9, 2018
DOI: 10.4236/jsip.2018.93010 577 Downloads 969 Views Citations
Improved Bat Algorithm Based Energy Efficient Congestion Control Scheme for Wireless Sensor Networks (Articles)
Mukhdeep Singh Manshahia, Mayank Dave, Satya Bir Singh
Wireless Sensor Network Vol.8 No.11,November 30, 2016
DOI: 10.4236/wsn.2016.811018 1,233 Downloads 1,964 Views Citations
Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation (Articles)
Sankita J. Patel, Ankit Chouhan, Devesh C. Jinwala
Journal of Information Security Vol.5 No.1,January 17, 2014
DOI: 10.4236/jis.2014.51002 4,283 Downloads 7,324 Views Citations
Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks (Articles)
Keyur Parmar, Devesh C. Jinwala
Journal of Information Security Vol.6 No.1,January 8, 2015
DOI: 10.4236/jis.2015.61005 3,158 Downloads 4,204 Views Citations
A Novel Technique for Determination of Flow Characteristics of Blast Furnace Slag (Articles)
Supratik Dash, Nachiketa Mohanty, Upendra K. Mohanty, Smarajit Sarkar
Open Journal of Metal Vol.2 No.2,June 26, 2012
DOI: 10.4236/ojmetal.2012.22007 5,144 Downloads 9,297 Views Citations
Transient Stability Improvement of Power System Using Non-Linear Controllers (Articles)
Rekha Chaudhary, Arun Kumar Singh
Energy and Power Engineering Vol.6 No.1,January 22, 2014
DOI: 10.4236/epe.2014.61002 5,236 Downloads 7,628 Views Citations
Experimental Investigations on Fluoride Removal from Water Using Nanoalumina-Carbon Nanotubes Blend (Articles)
K. Smitha, Santosh G. Thampi
Journal of Water Resource and Protection Vol.9 No.7,June 13, 2017
DOI: 10.4236/jwarp.2017.97050 1,034 Downloads 1,501 Views Citations
Automatic Classification of Unstructured Blog Text (Articles)
Mita K. Dalal, Mukesh A. Zaveri
Journal of Intelligent Learning Systems and Applications Vol.5 No.2,May 22, 2013
DOI: 10.4236/jilsa.2013.52012 4,979 Downloads 7,641 Views Citations
Comparison of Different Models for Estimation of Global Solar Radiation in Jharkhand (India) Region (Articles)
Kumari Namrata, S. P. Sharma, S. B. L. Saksena
Smart Grid and Renewable Energy Vol.4 No.4,July 4, 2013
DOI: 10.4236/sgre.2013.44041 4,915 Downloads 7,668 Views Citations
Census and Segmentation-Based Disparity Estimation Algorithm Using Region Merging (Articles)
Viral H. Borisagar, Mukesh A. Zaveri
Journal of Signal and Information Processing Vol.6 No.3,July 15, 2015
DOI: 10.4236/jsip.2015.63018 4,287 Downloads 4,890 Views Citations
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks (Articles)
Vivaksha Jariwala, Vishal Singh, Prafulla Kumar, Devesh C. Jinwala
Journal of Information Security Vol.5 No.1,January 10, 2014
DOI: 10.4236/jis.2014.51001 3,408 Downloads 5,977 Views Citations
Gerber Shiu Function of Markov Modulated Delayed By-Claim Type Risk Model with Random Incomes (Articles)
G. Shija, M. J. Jacob
Journal of Mathematical Finance Vol.6 No.4,September 30, 2016
DOI: 10.4236/jmf.2016.64039 1,200 Downloads 1,610 Views Citations This article belongs to the Special Issue on Portfolio Theory and Risk Management
Pollution Potential Ranking of Industries Using Classical TODIM Method (Articles)
Nisha Soni, Robin A. Christian, Namrata Jariwala
Journal of Environmental Protection Vol.7 No.11,October 31, 2016
DOI: 10.4236/jep.2016.711134 1,305 Downloads 1,814 Views Citations
New Cloud Detection Index (CDI) for Forecasting the Extreme Rain Events (Articles)
Niket Shastri, Kamlesh Kamlesh Pathak
Advances in Remote Sensing Vol.8 No.1,March 11, 2019
DOI: 10.4236/ars.2019.81002 579 Downloads 983 Views Citations
Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack (Articles)
Rakesh Kumar Jha, Idris Z. Bholebawa, Upena D. Dalal, A. Vishal Wankhede
Int'l J. of Communications, Network and System Sciences Vol.5 No.6,June 12, 2012
DOI: 10.4236/ijcns.2012.56046 4,414 Downloads 7,680 Views Citations
Application of AHP/EVAMIX Method for Decision Making in the Industrial Environment (Articles)
Veera P. Darji, Ravipudi V. Rao
American Journal of Operations Research Vol.3 No.6,November 19, 2013
DOI: 10.4236/ajor.2013.36053 5,542 Downloads 9,665 Views Citations