Permissions Ranking with Statistical Techniques for Android Malware Detection
Anjali Mishra, Mahima and Anshul Arora
|
PDF |
|
Approximate Graph Edit Distance for Structural Pattern Recognition
Shri Prakash Dwivedi
|
PDF |
|
Data Heterogeneity Handling in SDN-Based IoT Infrastructure
Syeda Zeenat Marshoodulla, Goutam Saha
|
PDF |
|
A Hybrid CNN–LSTM Deep Learning Model for Rainfall Prediction
Deepak Kumar Singh, Abinash Sahoo
|
PDF |
|
Low-Cost Low Power Digital IC Tester using ARM Cortex M0+ Microcontroller
Divesh Kumar
|
PDF |
|
A Novel Ensemble Machine Learning Models for Classification of Brain Tumors from MRI
Nafees Akhter Farooqui, Ritika Mehra
|
PDF |
|
A Review on LNA Topologies for Improved Linearity and Compactness in Chip Area
Manish Kumar, Divesh Kumar
|
PDF |
|
A Survey on Task Scheduling Approaches in the Cloud
Isha Sharma, Ruchika Gupta, Pardeep Singh
|
PDF |
|
A Comprehensive Review on Various Image Dehazing Techniques
Abhishek, Dr. Rajeev Ratan, Mohit Bansal
|
PDF |
|
New Cryptographic Primitives: A Direction to Design the Solutions
Riya Solanki, Payal Chaudhari
|
PDF |
|