A comparative study of various types of image noise and efficient noise removal techniques R Verma, J Ali International Journal of advanced research in computer science and software …, 2013 | 292 | 2013 |
A-survey of feature extraction and classification techniques in OCR systems R Verma, J Ali International Journal of Computer Applications & Information Technology 1 (3 …, 2012 | 47 | 2012 |
Taylor sailfish optimizer-based deep stacked auto encoder for blackhole attack detection in wireless sensor network M Kumar, J Ali Journal of Web Engineering 21 (3), 911-940, 2022 | 4 | 2022 |
Comparative analysis of advanced classification techniques for multilingual ocr systems R Verma, J Ali International Journal Of Scientific & Technology Research (IJRST) 8 (11), 2019 | 4 | 2019 |
Adaptive Taylor-Sail fish optimization based deep learning for detection of black hole and sybil attack in wireless sensor network M Kumar, J Ali 2023 International Conference on Sustainable Computing and Data …, 2023 | 3 | 2023 |
Operational Profile: A Critical Review PK Chaurasia, J Ali, P SSICMT Journal of Global Research in Computer Science 4 (8), 57-61, 2013 | 3 | 2013 |
A Novel Composite Approach for Software Clone Detection G Singh, J Ali International Journal of Computer Applications 126 (7), 2015 | 2 | 2015 |
Jahid Ali―A Comparative Study of Various Types of Image Noise and Efficient Noise Removal Techniques‖ International Journal of Advanced Research in Computer Science and … R Verma Issue, 2013 | 2 | 2013 |
Study and analysis of Object oriented Languages Using Hybrid Clone Detection Technique” G Sigh, J Ali Advances in Computational Sciences & Technology, Research India Publications, 2017 | 1 | 2017 |
A secure worst elite sailfish optimizer based routing and deep learning for black hole attack detection M Kumar, J Ali Network: Computation in Neural Systems, 1-26, 2024 | | 2024 |
Performance Study and Comparative Analysis of Routing Protocols in Wireless Sensor Networks M Kumar, J Ali International Conference on Advanced Computational and Communication …, 2023 | | 2023 |
A comparative study of IP Networking auto-configuration of dual stack and mobile IPv6 co-existence techniques N Singh, J Ali | | 2019 |
Mobile Cloud Computing: Overview and challenges S Gupta, J Ali | | 2019 |
Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks M Kumar, J Ali | | |
Emerging Security Issues and Challenges in Wireless Sensor Networks M Kumar, J Ali | | |
Voice recognition studies based on stochastic modeling J Ali Jhansi, 0 | | |
Performance Enhancement of MANET using Multi Criteria Algorithm (MCA) N Kumar, J Ali | | |
On Performance Enhancement of MANET using Multi Criteria Genetic Algorithm (MCGA) N Kumar, J Ali | | |
On Performance Enhancement of MANET using Multi Criteria Algorithm N Kumar, J Ali | | |
Multicasting Techniques to Enhance the Performance of Routing Protocol in MANETs N Kumar, J Ali | | |