Security improvement and Speed Monitoring of RSA Algorithm RM Pir International Journal of Engineering Development and Research 4 (1), 195-200, 2016 | 9 | 2016 |
Application of an Efficient Genetic Algorithm for Solving n× 𝒎𝒎 Flow Shop Scheduling Problem Comparing it with Branch and Bound Algorithm and Tabu Search Algorithm Rana M Pir, Md. Humayan Ahmed, Romana Rahman Ema, Tajul Islam American Scientific Research Journal for Engineering, Technology, and …, 2018 | 5 | 2018 |
Image mosaicing using MATLAB RMS Pir vol 3, 791-802, 2015 | 5 | 2015 |
Intrusion detection techniques and open source intrusion detection (IDS) tools RM Pir International Journal of Engineering Development and Research 2 (3), 3290-3295, 2014 | 5 | 2014 |
Data Integrity Verification in Cloud Storage without using Trusted Third Party Auditor RM Pir International Journal of Engineering Development and Research 2 (01), 858-863, 2014 | 4 | 2014 |
A Survey on Homomorphic Encryption in Cloud Computing RM Pir, RMS Pir, IU Ahmed International Journal of Engineering Development and Research 2 (02), 2173-2177, 2014 | 2 | 2014 |
Large Language Models (LLM): Need, Methods, And Research Trends RM Pir IJCSPUB-International Journal of Current Scienc (IJCSPUB) 13 (1), 126-132 …, 2023 | | 2023 |
Privacy-Preserving Machine Learning: Need, Methods, And Research Trends RM Pir INTERNATIONAL JOURNAL OF CURRENT SCIENCE 12 (1), 772-778, 2022 | | 2022 |
Implementing Secure Cloud Storage System using OpenNebula VOneCloud RM Pir Journal of Emerging Technologies and Innovative Research 3 (10), 331-337, 2016 | | 2016 |
Cloud Migration Technologies and Implementation RM Pir International Journal of Science & Engineering Development Research 1 (5 …, 2016 | | 2016 |
Implementing Private Cloud Storage and Virtualization using Windows Server 2012 Windows Server 2012 R2 RM Pir INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 3 (3), 1-6, 2015 | | 2015 |
Intrusion Detection Systems with Snort RM Pir INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 3 (01), 479-488, 2015 | | 2015 |
A Survey on Build Private Cloud Computing implementation tools RM Pir, RMS Pir, IU Ahmed Journal of Emerging Technologies and Innovative Research 1 (3), 194-201, 2014 | | 2014 |
Cloud Storage Security Using Encryption and Third-Party Storage Auditing Service RM Pir International Journal of Engineering Development and Research 2 (04), 3444-3450, 2014 | | 2014 |