Jaidhar C. D.
According to our database1,
Jaidhar C. D.
authored at least 53 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
3
4
3
1
5
4
2
2
2
1
1
1
1
1
2
5
3
4
3
3
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Video Captioning using Sentence Vector-enabled Convolutional Framework with Short-Connected LSTM.
Multim. Tools Appl., January, 2024
Canopy centre-based fuzzy-C-means clustering for enhancement of soil fertility prediction.
Int. J. Comput. Sci. Eng., 2024
Expert Syst. Appl., 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
1D convolutional neural networks-based soil fertility classification and fertilizer prescription.
Ecol. Informatics, December, 2023
Artif. Intell. Rev., December, 2023
Tomato plant disease classification using Multilevel Feature Fusion with adaptive channel spatial and pixel attention mechanism.
Expert Syst. Appl., October, 2023
Employing Feature Extraction, Feature Selection, and Machine Learning to Classify Electricity Consumption as Normal or Electricity Theft.
SN Comput. Sci., September, 2023
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023
2022
A novel Multi-Layer Attention Framework for visual description prediction using bidirectional LSTM.
J. Big Data, 2022
J. Big Data, 2022
2021
Windows Malware Detector Using Convolutional Neural Network Based on Visualization Images.
IEEE Trans. Emerg. Top. Comput., 2021
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021
2020
Wirel. Networks, 2020
Human gait recognition based on histogram of oriented gradients and Haralick texture descriptor.
Multim. Tools Appl., 2020
Clothing invariant human gait recognition using modified local optimal oriented pattern binary descriptor.
Multim. Tools Appl., 2020
An empirical study to estimate the stability of random forest classifier on the hybrid features recommended by filter based feature selection technique.
Int. J. Mach. Learn. Cybern., 2020
Applicability of machine learning in spam and phishing email filtering: review and approaches.
Artif. Intell. Rev., 2020
Empirical Study on Multi Convolutional Layer-based Convolutional Neural Network Classifier for Plant Leaf Disease Detection.
Proceedings of the 15th IEEE International Conference on Industrial and Information Systems, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
2019
Wirel. Networks, 2019
Experimental analysis of Android malware detection based on combinations of permissions and API-calls.
J. Comput. Virol. Hacking Tech., 2019
J. Comput. Virol. Hacking Tech., 2019
An Approach to Speed Invariant Gait Analysis for Human Recognition using Mutual Information.
Proceedings of the TENCON 2019, 2019
Gaussian Filtered Gait Energy Template and Centroid Corner Distance Features for Human Gait Recognition.
Proceedings of the 14th Conference on Industrial and Information Systems, 2019
An Empirical Study to Detect the Collision Rate in Similarity Hashing Algorithm Using MD5.
Proceedings of the International Conference on Data Science and Engineering, 2019
Frontal Gait Recognition based on Hierarchical Centroid Shape Descriptor and Similarity Measurement.
Proceedings of the International Conference on Data Science and Engineering, 2019
Proceedings of the Hybrid Intelligent Systems, 2019
2018
A Performance Evaluation of Location Prediction Position-Based Routing Using Real GPS Traces for VANET.
Wirel. Pers. Commun., 2018
Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM.
Future Gener. Comput. Syst., 2018
Mobility Aware Routing Protocol Based on DIO Message for Low Power and Lossy Networks.
Proceedings of the Intelligent Systems Design and Applications, 2018
Proceedings of the Intelligent Systems Design and Applications, 2018
Proceedings of the Intelligent Systems Design and Applications, 2018
2017
Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter.
Wirel. Networks, 2017
Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor.
Digit. Investig., 2017
Multimetrics-Based Objective Function for Low-power and Lossy Networks Under Mobility.
Proceedings of the Soft Computing for Problem Solving, 2017
Empirical Study on Features Recommended by LSVC in Classifying Unknown Windows Malware.
Proceedings of the Soft Computing for Problem Solving, 2017
PPRP: Predicted Position Based Routing Protocol Using Kalman Filter for Vehicular Ad-hoc Network.
Proceedings of the 18th International Conference on Distributed Computing and Networking, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
2016
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
Image segmentation using encoder-decoder architecture and region consistency activation.
Proceedings of the 11th International Conference on Industrial and Information Systems, 2016
Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm.
Proceedings of the 11th International Conference on Industrial and Information Systems, 2016
2015
EDAGF: Estimation & Direction Aware Greedy Forwarding for Urban Scenario in Vehicular Ad-Hoc Network.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
2013
Wirel. Pers. Commun., 2013
Informatica (Slovenia), 2013
Proceedings of the Intelligent Computing, 2013
2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
2007
Int. J. Comput. Commun. Control, 2007