System Analysis and Optimization with Applications (Part 1)

Author(s): Gulshan Shrivastava, Anuradha Tomar.

Journal Name: Recent Patents on Computer Science

Volume 12 , Issue 3 , 2019

Become EABM
Become Reviewer

[1]
G. Shrivastava, "Approaches of network forensic model for investigation", Int. J. Forensic Eng., vol. 3, pp. 195-215, 2017.
[2]
P. Kumar, M. Quadri, K. Sharma, N.N. Gia, and P. Ranjan, "Persistent Cellular Telephony: Enhanced Secure GSM Architecture", Recent Pat. Eng., vol. 12, pp. 23-29, April 2018.
[3]
P.K. Srivastava, R.P. Ojha, K. Sharma, S. Awasthi, and G. Sanyal, "Effect of quarantine and recovery on infectious nodes in wireless sensor network", Intl. J. Sensor Commun. Cont, vol. 8, pp. 25-35, 2018.
[4]
G. Shrivastava, P. Kumar, B.B. Gupta, S. Bala, and N. Dey, Handbook of Research on Network Forensics and Analysis Techniques., 2018.
[5]
A. Dureja, and P. Pahwa, "Analysis of Non-linear Activation Functions for Classification Tasks Using Convolutional Neural Networks", Recent Pat. Comput. Sci., vol. 12, pp. 156-161, 2018.
[6]
T.Y.S. Rao, and P.C. Reddy, "Classification and Retrieval of Images Based on Extensive Context and Content Feature Set", Recent Pat. Comput. Sci., vol. 12, pp. 162-170, 2018.
[7]
S. Gupta, and A. Saxena, "Classification of Operational and Financial Variables Affecting the Bullwhip Effect in Indian Sectors: A Machine Learning Approach", Recent Pat. Comput. Sci., vol. 12, pp. 171-179, 2018.
[8]
B. Mahapatra, S. Patnaik, and A. Nayyar, "Effect of Multiple-Agent Deployment in MANET", Recent Pat. on Comput. Sci., vol. 12, pp. 180-190, 2018.
[9]
K. Sharma, F. Rafiqui, and P. Diksha, "Attri and S. Yadav, “A Two-tier Security Solution for Storing Data Across Public Cloud", Recent Pat. Comput. Sci., vol. 12, pp. 191-201, 2018.


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 12
ISSUE: 3
Year: 2019
Page: [154 - 155]
Pages: 2
DOI: 10.2174/221327591203190321100815

Article Metrics

PDF: 45
HTML: 10