menu

البحوث



# عنوان البحث مكان النشر تاريخ النشر عرض
1 Hybrid Blowfish and RSA Algorithms to Secure Data between Cloud Server and Client visibility
2 A comprehensive study of position based routing protocols in WSNs 2015 visibility
3 Cloud computing service models: A comparative study 2016 visibility
4 Security and privacy issues in cloud computing 2016 visibility
5 A Performance Analysis of Hybrid Technique using DES and RSA algorithms 2017 visibility
6 The Crop Monitoring System-Based on Wireless Sensors Network-(WSN) 2019 visibility
7 Security Issues and Solutions at Different Layers of Cloud Computing visibility
8 A survey on cloud computing 2018 visibility
9 Reducing the required time and power for data encryption and decryption using K-NN machine learning 2019 visibility
10 Method to implement K-NN machine learningto classify data privacy in IoT environment 2020 visibility
11 Automated brain tumor classification using various deep learning models: a comparative study 2021 visibility
12 Internet of things (IoT): a technology review, security issues, threats, and open challenges 2020 visibility
13 Clustering similar time series data for the prediction the patients with heart disease 2022 visibility
14 Method to implement K-NN machine learning to classify data privacy in IoT environment 2020 visibility
15 A review on symmetric key encryption techniques in cryptography 2016 visibility
16 Evaluation of hybrid encryption technique to secure data during transmission in cloud computing 2017 visibility
17 Intelligent Hybrid Technique to Secure Bluetooth Communications 2020 visibility
18 A comparative study of various routing classes and their key goals in wireless sensor networks 2018 visibility
19 An Optimal LEACH-Based Routing Protocol to Balance the Power Consumption and Extending the Lifetime of the WSNs 2016 visibility
20 Two-step fuzzy logic system to achieve energy efficiency and prolonging the lifetime of WSNs 2017 visibility
21 Hybrid Blowfish and RSA Algorithms to Secure Data between Cloud Server and Client visibility
22 A comprehensive study of position based routing protocols in WSNs 2015 4th International Conference on Reliability, Infocom Technologies and … 2015 visibility
23 Cloud computing service models: A comparative study 2016 3rd International Conference on Computing for Sustainable Global … 2016 visibility
24 Security and privacy issues in cloud computing 2016 3rd International Conference on Computing for Sustainable Global … 2016 visibility
25 A Performance Analysis of Hybrid Technique using DES and RSA algorithms 2017 4th International Conference on Computing for Sustainable Global … 2017 visibility
26 The Crop Monitoring System-Based on Wireless Sensors Network-(WSN) AUSrevista 2019 visibility
27 Security Issues and Solutions at Different Layers of Cloud Computing Aligarh, visibility
28 A survey on cloud computing Big Data Analytics 2018 visibility
29 Reducing the required time and power for data encryption and decryption using K-NN machine learning IETE Journal of Research 2019 visibility
30 Method to implement K-NN machine learningto classify data privacy in IoT environment Indonesian Journal of Electrical Engineering and Computer Science (IJEECS … 2020 visibility
31 Automated brain tumor classification using various deep learning models: a comparative study Indonesian Journal of Electrical Engineering and Computer Science (IJEECS … 2021 visibility
32 Internet of things (IoT): a technology review, security issues, threats, and open challenges Indonesian Journal of Electrical Engineering and Computer Science 20 (2 … 2020 visibility
33 Clustering similar time series data for the prediction the patients with heart disease Indonesian Journal of Electrical Engineering and Computer Science 26 (2 … 2022 visibility
34 Method to implement K-NN machine learning to classify data privacy in IoT environment Institute of Advanced Engineering and Science (IAES) 2020 visibility
35 A review on symmetric key encryption techniques in cryptography International Journal of Computer Applications 2016 visibility
36 Evaluation of hybrid encryption technique to secure data during transmission in cloud computing International Journal of Computer Applications 2017 visibility
37 Intelligent Hybrid Technique to Secure Bluetooth Communications International Symposium on Signal and Image Processing 2020 visibility
38 A comparative study of various routing classes and their key goals in wireless sensor networks Next-Generation Networks 2018 visibility
39 An Optimal LEACH-Based Routing Protocol to Balance the Power Consumption and Extending the Lifetime of the WSNs Proceedings of First International Conference on Information and … 2016 visibility
40 Two-step fuzzy logic system to achieve energy efficiency and prolonging the lifetime of WSNs Wireless Networks 2017 visibility