FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network Security Enhancement |
Priyanka and Anoop Kumar |
Networks & Communications |
17, 1, January, 2025 |
Selective Watchdog Technique for Intrusion Detection in Mobile Ad-Hoc Network |
DEEPIKA DUA AND ATUL MISHRA |
Networks & Communications |
6, 3, September, 2014 |
DISTRIBUTED GENERATION TECHNOLOGIES – STATE OF THE ART AND PERSPECTIVES |
Priyadarshi1 Samina Elyas Mubeen2 Rajneesh Karn |
Computer Science & Information Technology |
1, 3, October, 2014 |
Human-ai Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems |
Gaurav Samdani 1 , Ganesh viswanathan 2 and Abirami Dasu Jegadeesh 3 |
Computer Science & Information Technology |
15, 1, February, 2025 |
Designing an Efficient Approach for JK and T Flip-Flop with Power Dissipation Analysis Using QCA |
Shraddha Pandey, Sonali Singh and Subodh Wairya |
Electronics Engineering |
7, 3, June, 2016 |
Low Area FPGA Implementation of DROM-CSLA-QTL Architecture for Cryptographic Applications |
Shailaja A |
Software Engineering & Security |
10, 3, May, 2018 |
Sowing the Seeds of Precision: Innovations in Wireless Sensor Networks for Agricultural Environmental Monitoring |
Sreedeep Dey and Sreejita Das |
Wireless Sensor Networks |
14, 2/3, July, 2024 |
Cost Model for Establishing a Data Center |
Doaa Bliedy, Sherif Mazen and Ehab Ezzat |
Operating Systems |
8, 2/3/4, August, 2018 |
A Comprehensive Analysis of Quantum Clustering : Finding All the Potential Minima |
Aude Maignan |
Data Mining |
11, 1, January, 2021 |
Cognitive and Epistemic Spaces in the CSTA Computer Science Learning Standards |
Gerald Ardito |
Education |
11, 2, June, 2022 |
English to Arabic Machine Translation of Mathematical Documents |
Mustapha Eddahibi and Mohammed Mensouri |
Artificial Intelligence |
14, 6, November, 2023 |
Unveiling Patterns: Advanced Data Mining Techniques for Accurate Predictive Analytics |
Sumi Akter, K M Yaqub Ali |
Computer Science & Information Technology |
16, 6, December, 2024 |
Enhancing Privacy and Security in Rag-Based Generative AI Applications |
Meethun Panda 1 and Soumyodeep Mukherjee 2 |
Networks & Communications |
15, 3, February, 2025 |
Advancing privacy and security in generative AI-driven RAG architectures: a next-generation framework |
Meethun Panda, Soumyodeep Mukherjee |
Artificial Intelligence |
16, 2, March, 2025 |
Separated Inter/Intra-Modal Fusion Prompts for Compositional Zero-Shot Learning |
Sua Jung |
Computer Science & Information Technology |
15, 2, January, 2025 |
Cracking the WTP Metric for Enhancing Pricing Framework and Margin Optimization using Reasoning LLMs, Agents and Langchain Framework |
Chirag Soni1 and Swati Shah2 |
Artificial Intelligence |
15, 2, January, 2025 |
Acceleration of CUDA Kernels through Fusion Measurements for AvgPool2D and ReLU |
Andreas Falkenberg |
Artificial Intelligence |
15, 2, January, 2025 |
Comparison of Training for Hand Gesture Recognition for Synthetic and Real Datasets |
Pranav Vaidik Dhulipala, Samuel Oncken, Steven Claypool and Stavros Kalafatis |
DBWorld: Database Management Systems |
15, 2, January, 2025 |
From Rigid Robo-Advisors to Human-Like Interactions: Revolutionizing Financial Assistance with LLM-Powered Solutions |
Hamza Landolsi1 and Ines Abdeljaoued-Tej1,2 |
DBWorld: Database Management Systems |
15, 2, January, 2025 |
SEASONALVARIATION OFCARRYING CAPACITY ON DISEASED MODEL CAN CAUSE SPECIES EXTINCTION |
Prodip Roy, Banshidhar Sahoo and Swarup Poria |
Soft Computing |
1, 2, December, 2012 |