Special issue on the current trends in E-learning Assessment

JA Lara, S Aljawarneh, S Pamplona - Journal of Computing in Higher …, 2020 - Springer
In this full review paper, the recent emerging trends in E-learning Assessment have been
reviewed and explored to address the recent topics and contributions in the era of Distance …

An advanced study on the similarity measures of intuitionistic fuzzy sets based on the set pair analysis theory and their application in decision making

H Garg, K Kumar - Soft Computing, 2018 - Springer
Set pair analysis (SPA) is an updated theory for dealing with the uncertainty, which overlaps
with the other existing theories such as vague, fuzzy, intuitionistic fuzzy set (IFS). Keeping …

A feature similarity machine learning model for ddos attack detection in modern network environments for industry 4.0

S Sambangi, L Gondi, S Aljawarneh - Computers and Electrical …, 2022 - Elsevier
Recent advancements in artificial intelligence and machine learning technologies have laid
the flagstone for the fourth industrial revolution, Industry 4.0. The industry 4.0 is at a very …

G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things

SA Aljawarneh, R Vangipuram, VK Puligadda… - Future Generation …, 2017 - Elsevier
Temporal data is one of the most common form of data in internet of things. Data from
various sources such as sensors, smart phones, smart homes and smart vehicles in near …

GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things

SA Aljawarneh, R Vangipuram - The Journal of Supercomputing, 2020 - Springer
The objective of any anomaly detection system is to efficiently detect several types of
malicious traffic patterns that cannot be detected by conventional firewall systems …

Similarity based feature transformation for network anomaly detection

A Nagaraja, U Boregowda, K Khatatneh… - IEEE …, 2020 - ieeexplore.ieee.org
The fundamental objective behind any network intrusion detection system is to automate the
detection process whenever intrusions occur in the network. The problem of the network …

A machine learning approach for imputation and anomaly detection in IoT environment

R Vangipuram, RK Gunupudi, VK Puligadda… - Expert …, 2020 - Wiley Online Library
The problem of anomaly and attack detection in IoT environment is one of the prime
challenges in the domain of internet of things that requires an immediate concern. For …

A novel image encryption scheme based on Arnold scrambling and Lucas series

SI Batool, HM Waseem - Multimedia tools and applications, 2019 - Springer
Secure data transmission over the public channels have high impact and increasingly
important due to theft and manipulation in contents. The requirement of public/private …

CLAPP: A self constructing feature clustering approach for anomaly detection

RK Gunupudi, M Nimmala, N Gugulothu… - Future Generation …, 2017 - Elsevier
The term internet of things is a buzz word these days and as per Google survey conducted
recently, it has even dominated the buzz word big data predominantly. However, IoT area is …

[PDF][PDF] Plant disease classification using deep bilinear CNN

DS Rao, RB Ch, VS Kiran, N Rajasekhar… - Intell. Autom. Soft …, 2022 - it.griet.ac.in
Plant diseases have become a major threat in farming and provision of food. Various plant
diseases have affected the natural growth of the plants and the infected plants are the …