关注
Dr Jahid Ali
Dr Jahid Ali
Professor of Computer Science
在 srisaigroup.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
A comparative study of various types of image noise and efficient noise removal techniques
R Verma, J Ali
International Journal of advanced research in computer science and software …, 2013
2922013
A-survey of feature extraction and classification techniques in OCR systems
R Verma, J Ali
International Journal of Computer Applications & Information Technology 1 (3 …, 2012
472012
Taylor sailfish optimizer-based deep stacked auto encoder for blackhole attack detection in wireless sensor network
M Kumar, J Ali
Journal of Web Engineering 21 (3), 911-940, 2022
42022
Comparative analysis of advanced classification techniques for multilingual ocr systems
R Verma, J Ali
International Journal Of Scientific & Technology Research (IJRST) 8 (11), 2019
42019
Adaptive Taylor-Sail fish optimization based deep learning for detection of black hole and sybil attack in wireless sensor network
M Kumar, J Ali
2023 International Conference on Sustainable Computing and Data …, 2023
32023
Operational Profile: A Critical Review
PK Chaurasia, J Ali, P SSICMT
Journal of Global Research in Computer Science 4 (8), 57-61, 2013
32013
A Novel Composite Approach for Software Clone Detection
G Singh, J Ali
International Journal of Computer Applications 126 (7), 2015
22015
Jahid Ali―A Comparative Study of Various Types of Image Noise and Efficient Noise Removal Techniques‖ International Journal of Advanced Research in Computer Science and …
R Verma
Issue, 2013
22013
Study and analysis of Object oriented Languages Using Hybrid Clone Detection Technique”
G Sigh, J Ali
Advances in Computational Sciences & Technology, Research India Publications, 2017
12017
A secure worst elite sailfish optimizer based routing and deep learning for black hole attack detection
M Kumar, J Ali
Network: Computation in Neural Systems, 1-26, 2024
2024
Performance Study and Comparative Analysis of Routing Protocols in Wireless Sensor Networks
M Kumar, J Ali
International Conference on Advanced Computational and Communication …, 2023
2023
A comparative study of IP Networking auto-configuration of dual stack and mobile IPv6 co-existence techniques
N Singh, J Ali
2019
Mobile Cloud Computing: Overview and challenges
S Gupta, J Ali
2019
Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks
M Kumar, J Ali
Emerging Security Issues and Challenges in Wireless Sensor Networks
M Kumar, J Ali
Voice recognition studies based on stochastic modeling
J Ali
Jhansi, 0
Performance Enhancement of MANET using Multi Criteria Algorithm (MCA)
N Kumar, J Ali
On Performance Enhancement of MANET using Multi Criteria Genetic Algorithm (MCGA)
N Kumar, J Ali
On Performance Enhancement of MANET using Multi Criteria Algorithm
N Kumar, J Ali
Multicasting Techniques to Enhance the Performance of Routing Protocol in MANETs
N Kumar, J Ali
系统目前无法执行此操作,请稍后再试。
文章 1–20