Your selections:
Process reliability analysis applied for continual improvement of large-scale alumina refineries
- Don, R. Welandage, Chattopadhyay, Gopi, Kamruzzaman, Joarder
Dynamic trust boundary identification for the secure communications of the entities via 6G
- Basri, Rabeya, Karmakar, Gour, Kamruzzaman, Joarder, Newaz, S. H. Shah, Nguyen, Linh, Usman, Muhammad
Identification of fake news : a semantic driven technique for transfer domain
- Ferdush, Jannatul, Kamruzzaman, Joarder, Karmakar, Gour, Gondal, Iqbal, Das, Raj
Quantum particle swarm optimization for task offloading in mobile edge computing
- Dong, Shi, Xia, Yuanjun, Kamruzzaman, Joarder
- Zenia, Nusrat, Kaiser, M. Shamim, Mahmud, Mufti, Ahmed, Muhammad, Kaiwartya, Omprakash, Kamruzzaman, Joarder
A tree-based stacking ensemble technique with feature selection for network intrusion detection
- Rashid, Mamanur, Kamruzzaman, Joarder, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Mehedi Hassan, Mohammad, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven, Fortino, Giancarlo
Failure analysis of Slurry Pump assets in refinery for reduction of risks and costs
- Welandage Don, Chattopadhyay, Gopi, Kahandawa, Gayan, Kamruzzaman, Joarder, Zhang, L.
Security of Internet of Things devices : ethical hacking a drone and its mitigation strategies
- Karmakar, Gour, Petty, Mark, Ahmed, Hassan, Das, Rajkumar, Kamruzzaman, Joarder
Spam email categorization with nlp and using federated deep learning
- Ul Haq, Ikram, Black, Paul, Gondal, Iqbal, Kamruzzaman, Joarder, Watters, Paul, Kayes, A.
Vulnerability assessment framework for a smart grid
- Rashed, Muhammad, Kamruzzaman, Joarder, Gondal, Iqbal, Islam, Syed
A smart priority-based traffic control system for emergency vehicles
- Karmakar, Gour, Chowdhury, Abdullahi, Kamruzzaman, Joarder, Gondal, Iqbal
Assessing reliability of smart grid against cyberattacks using stability index
- Rashed, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Islam, Syed
Assessing trust level of a driverless car using deep learning
- Karmakar, Gour, Chowdhury, Abdullahi, Das, Rajkumar, Kamruzzaman, Joarder, Islam, Syed
Churn prediction in telecom industry using machine learning ensembles with class balancing
- Chowdhury, Abdullahi, Kaisar, Shahriar, Rashid, Md Mamunur, Shafin, Sakib, Kamruzzaman, Joarder
Malware detection in edge devices with fuzzy oversampling and dynamic class weighting
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Islam, Syed
A machine learning approach for prediction of pregnancy outcome following IVF treatment
- Hassan, Md Rafiul, Al-Insaif, Sadiq, Hossain, Muhammad, Kamruzzaman, Joarder
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Friendly jammer against an adaptive eavesdropper in a relay-aided network
- Giti, J. E., Sakzad, A., Srinivasan, B., Kamruzzaman, Joarder, Gaire, R.
Are you sure you would like to clear your session, including search history and login status?