Rojali

According to our database1, Rojali authored at least 9 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Time-Based Steganography Image with Dynamic Encryption Key Generation.
Proceedings of the Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, 2023

A Comparative Analysis of Decision Tree and Support Vector Machine on Suicide Ideation Detection.
Proceedings of the Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, 2023

Rust's Memory Safety Model: An Evaluation of Its Effectiveness in Preventing Common Vulnerabilities.
Proceedings of the Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, 2023

Comparing Age Estimation with CNN and EfficientNetV2B1.
Proceedings of the Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, 2023

Drowsy Detection System by Facial Landmark and Light Gradient Boosting Machine Method.
Proceedings of the Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, 2023

2018
Resource-Constrained Project Scheduling Problem using Firefly Algorithm.
Proceedings of the Empowering Smart Technology in Digital Era for a Better Life: The 3rd International Conference on Computer Science and Computational Intelligence, 2018

2017
Stepwise Optimization for Model of Integrated Batch Production and Maintenance Scheduling for Single Item Processed on Flow Shop with Two Machines in JIT Environment.
ICCSCI, 2017

Improvement of Advanced Encryption Standard Algorithm With Shift Row and S.Box Modification Mapping in Mix Column.
ICCSCI, 2017

2014
Steganography Application Program using the ID3v2 in the MP3 audio File on Mobile phone.
J. Comput. Sci., 2014


  Loading...