Molecular docking and pharmacophore modelling of phytoconstituents of vaccinium secundiflorum for antidiabetic and antioxidant activity. | 0 | 0.34 | 2021 |
Trust Aware Scheme based Malicious Nodes Detection under Cooperative Spectrum Sensing for Cognitive Radio Networks. | 0 | 0.34 | 2021 |
Distribution Key Scheme for Secure Group Management in VANET Using Polynomial Interpolation. | 0 | 0.34 | 2021 |
Service-Based Credit Card Fraud Detection Using Oracle SOA Suite. | 1 | 0.35 | 2021 |
Real time SOA based credit card fraud detection system using machine learning techniques. | 0 | 0.34 | 2021 |
Risk score learning for COVID-19 contact tracing apps. | 0 | 0.34 | 2021 |
3D Logic Cells Design and Results Based on Vertical NWFET Technology Including Tied Compact Model. | 0 | 0.34 | 2020 |
An Economical Methodology to Rhetorical Identifications in Cloud Victimization Virtual Machine Snapshots. | 0 | 0.34 | 2019 |
Language-Agnostic Model for Aspect-Based Sentiment Analysis. | 0 | 0.34 | 2019 |
Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage. | 0 | 0.34 | 2019 |
EvadePDF - Towards Evading Machine Learning Based PDF Malware Classifiers. | 0 | 0.34 | 2018 |
Segmentation of Lung Field in HRCT Images Using U-Net Based Fully Convolutional Networks. | 0 | 0.34 | 2018 |
Convolutional Neural Networks for Efficient Localization of Interstitial Lung Disease Patterns in HRCT Images. | 0 | 0.34 | 2018 |
Detection of Malicious Executables Using Rule Based Classification Algorithms. | 0 | 0.34 | 2017 |
Wallah: design and evaluation of a task-centric mobile-based crowdsourcing platform. | 2 | 0.39 | 2014 |
Prefrontal Cortex Motivated Cognitive Architecture for Multiple Robots. | 0 | 0.34 | 2014 |
PlaceMap: Discovering Human Places of Interest Using Low-Energy Location Interfaces on Mobile Phones. | 3 | 0.41 | 2014 |
Recreational Drug Slang: Identification of New Terms and Populating a Lexical Taxonomy Ontology. | 0 | 0.34 | 2013 |
TxtVect: A Tool for Extracting Features from Clinical Documents. | 0 | 0.34 | 2012 |
Adapting dialog call-flows for pervasive devices | 1 | 0.36 | 2005 |
XCHOKE: Malicious Source Control for Congestion Avoidance at Internet Gateways | 8 | 0.61 | 2002 |