关注
KUSHAL ANJARIA
KUSHAL ANJARIA
在 irma.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Negation and entropy: Effectual knowledge management equipment for learning organizations
K Anjaria
Expert Systems with Applications 157, 113497, 2020
702020
Knowledge derivation from Likert scale using Z-numbers
K Anjaria
Information Sciences 590, 234-252, 2022
652022
Applications of game theory in deep learning: a survey
KA Tanmoy Hazra
Multimedia Tools and Applications, 2022
502022
Relating Wiener’s cybernetics aspects and a situation awareness model implementation for information security risk management
K Anjaria, A Mishra
Kybernetes 47 (1), 58-79, 2018
172018
Thread scheduling using ant colony optimization: An intelligent scheduling approach towards minimal information leakage
K Anjaria, A Mishra
Karbala International Journal of Modern Science 3 (4), 241-258, 2017
162017
Quantitative analysis of information leakage in service-oriented architecture-based Web services
K Anjaria, A Mishra
Kybernetes 46 (3), 479-500, 2017
132017
Dempster-shafer theory and linguistic intuitionistic fuzzy number-based framework for blending knowledge from knowledge repositories: An approach for knowledge management
K Anjaria
Expert Systems with Applications 199, 117142, 2022
112022
Relating interactive system design and information theory from information leakage perspective
K Anjaria, A Mishra
International Journal of Engineering and Manufacturing 7 (1), 1, 2017
112017
Information leakage analysis of software: How to make it useful to IT industries?
K Anjaria, A Mishra
Future Computing and Informatics Journal 2 (1), 10-18, 2017
82017
Relation between cybernetics and information security: from Norbert Wiener’s perspectives
K Anjaria, A Mishra
Kybernetes 46 (10), 1654-1673, 2017
52017
A framework for ethical artificial intelligence - from social theories to cybernetics-based implementation
K Anjaria
International Journal of Social and Humanistic Computing 4 (1), 1-28, 2021
42021
Computational implementation and formalism of FAIR data stewardship principles
KA Anjaria
Data Technologies and Applications 54 (2), 193-214, 2020
42020
Dynamic Source ACO algorithm for energy-aware cloudlet-based mobile cloud computing architecture
A Kushal, P Raj, P Naitik, P Tapan, T Anjali
2019 3rd International Conference on Computing Methodologies and …, 2019
42019
Relating Maxwell’s demon and quantitative analysis of information leakage for practical imperative programs
K Anjaria, A Mishra
Chinese Physics B 26 (10), 100507, 2017
42017
Attainment of green computing in cloudlet-based mobile cloud computing model using squirrel search algorithm
K Anjaria, N Patel
Proceedings of 6th International Conference on Recent Trends in Computing …, 2021
32021
Theoretical framework of quantitative analysis based information leakage warning system
K Anjaria, A Mishra
Karbala International Journal of Modern Science 4 (1), 151-163, 2018
32018
Enhancing sustainability integration in Sustainable Enterprise Resource Planning (S-ERP) system: Application of Transaction Cost Theory and case study analysis
K Anjaria
International Journal of Information Management Data Insights 4 (2), 100243, 2024
22024
Information Processing and Security Analysis of Shared System Resource Based Architectures
K Anjaria, A Mishra
International Journal of Cooperative Information Systems 27 (04), 1850009, 2018
22018
Neuroevolution for effective information security training
K Anjaria, A Mishra
2017 International Conference on Soft Computing and its Engineering …, 2017
22017
OS verification-a survey as a source of future challenges
K Anjaria, A Mishra
International Journal of Computer Science and Engineering Survey (IJCSES) 6 …, 2015
22015
系统目前无法执行此操作,请稍后再试。
文章 1–20