Cloud computing: security issues and research challenges RP Padhy, MR Patra, SC Satapathy International Journal of Computer Science and Information Technology …, 2011 | 334 | 2011 |
Lightweight cryptography for embedded systems–a comparative analysis C Manifavas, G Hatzivasilis, K Fysarakis, K Rantos International Workshop on Data Privacy Management, 333-349, 2013 | 165 | 2013 |
A fuzzy logic based personalized recommender system BA Ojokoh, MO Omisore, OW Samuel, TO Ogunniyi International Journal of Computer Science and Information Technology …, 2012 | 65 | 2012 |
Methods of fractal dimension computation A Annadhason International Journal of Computer Science and Information Technology …, 2012 | 65 | 2012 |
Comparative analysis of inter satellite optical wireless channel for NRZ and RZ modulation formats for different levels of input power P Kaur, A Gupta, M Chaudhary Procedia Computer Science 58, 572-577, 2015 | 61 | 2015 |
Allocation of virtual machines in cloud computing using load balancing algorithm MRMD Shah, MRAA Kariyani, MRDL Agrawal International Journal of Computer Science and Information Technology …, 2013 | 61 | 2013 |
A survey on the applications of fuzzy logic in medical diagnosis V Prasath, N Lakshmi, M Nathiya, N Bharathan, P Neetha International Journal of Scientific & Engineering Research 4 (4), 1199-1203, 2013 | 60 | 2013 |
Design of Wireless Home automation and security system using PIC Microcontroller VS Narayanan, S Gayathri International Journal of Computer Applications in Engineering Sciences 3 (13 …, 2013 | 54 | 2013 |
A survey on gray hole attack in manet V Shanmuganathan, T Anand IRACST–International Journal of Computer Networks and Wireless …, 2012 | 48 | 2012 |
Crop yield prediction using Agro Algorithm in Hadoop AK Kushwaha, S Bhattachrya International Journal of Computer Science and Information Technology …, 2015 | 45 | 2015 |
An efficient algorithm for detection of blackhole attack in aodv based manets N Khemariya, A Khuntetha International Journal of Computer Applications 66 (18), 2013 | 45 | 2013 |
Trust and big data: a roadmap for research J Sänger, C Richthammer, S Hassan, G Pernul 2014 25th international workshop on database and expert systems applications …, 2014 | 37 | 2014 |
Decision support system for malaria and dengue disease diagnosis (DSSMD) P Sharma, DBV Singh, MK Bandil, N Mishra International Journal of Information and Computation Technology 3 (7), 633-640, 2013 | 36 | 2013 |
Study of security issues in cloud computing AW Varsha, S Gupta Int. J. Comput. Sci. Mob. Comput 4 (6), 230-234, 2015 | 35 | 2015 |
Content based news recommendation system based on fuzzy logic MNM Adnan, MR Chowdury, I Taz, T Ahmed, RM Rahman 2014 International Conference on Informatics, Electronics & Vision (ICIEV), 1-6, 2014 | 34 | 2014 |
Hindi named entity recognition by aggregating rule based heuristics and hidden markov model D Chopra, N Jahan, S Morwal International Journal of Information 2 (6), 43-52, 2012 | 34 | 2012 |
An integrated DEMATEL and AHP approach for personnel estimation B Roy, SK Misra, P Gupta, A Goswami International Journal of Computer Science and Information Technology …, 2012 | 34 | 2012 |
Named entity recognition for Punjabi language A Kaur Patiala, 2012 | 32 | 2012 |
Position detection and tracking system M Kadibagil, HS Guruprasad International Journal of Computer Science and Information Technology …, 2014 | 31 | 2014 |
Named entity recognition for nepali language: A semi hybrid approach A Dey, A Paul, BS Purkayastha International Journal of Engineering and Innovative Technology (IJEIT …, 2014 | 30 | 2014 |