Jaidhar C. D.

According to our database1, Jaidhar C. D. authored at least 51 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Video Captioning using Sentence Vector-enabled Convolutional Framework with Short-Connected LSTM.
Multim. Tools Appl., January, 2024

Canopy centre-based fuzzy-C-means clustering for enhancement of soil fertility prediction.
Int. J. Comput. Sci. Eng., 2024

2023
1D convolutional neural networks-based soil fertility classification and fertilizer prescription.
Ecol. Informatics, December, 2023

Systematic study on deep learning-based plant disease detection or classification.
Artif. Intell. Rev., December, 2023

Tomato plant disease classification using Multilevel Feature Fusion with adaptive channel spatial and pixel attention mechanism.
Expert Syst. Appl., October, 2023

Employing Feature Extraction, Feature Selection, and Machine Learning to Classify Electricity Consumption as Normal or Electricity Theft.
SN Comput. Sci., September, 2023

Symbolic Deterministic Finite Automata-based Automated Fertilizer Prescription.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
A novel Multi-Layer Attention Framework for visual description prediction using bidirectional LSTM.
J. Big Data, 2022

Semantic context driven language descriptions of videos using deep neural network.
J. Big Data, 2022

Cardamom Plant Disease Detection Approach Using EfficientNetV2.
IEEE Access, 2022

2021
Windows Malware Detector Using Convolutional Neural Network Based on Visualization Images.
IEEE Trans. Emerg. Top. Comput., 2021

Weakly Supervised Image Annotation and Segmentation.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

2020
Enhanced mobility routing protocol for wireless sensor network.
Wirel. Networks, 2020

Human gait recognition based on histogram of oriented gradients and Haralick texture descriptor.
Multim. Tools Appl., 2020

Clothing invariant human gait recognition using modified local optimal oriented pattern binary descriptor.
Multim. Tools Appl., 2020

An empirical study to estimate the stability of random forest classifier on the hybrid features recommended by filter based feature selection technique.
Int. J. Mach. Learn. Cybern., 2020

Applicability of machine learning in spam and phishing email filtering: review and approaches.
Artif. Intell. Rev., 2020

Empirical Study on Multi Convolutional Layer-based Convolutional Neural Network Classifier for Plant Leaf Disease Detection.
Proceedings of the 15th IEEE International Conference on Industrial and Information Systems, 2020

A Novel Bio-inspired Hybrid Metaheuristic for Unsolicited Bulk Email Detection.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
Enhanced mobility aware routing protocol for Low Power and Lossy Networks.
Wirel. Networks, 2019

Experimental analysis of Android malware detection based on combinations of permissions and API-calls.
J. Comput. Virol. Hacking Tech., 2019

Windows malware detection system based on LSVC recommended hybrid features.
J. Comput. Virol. Hacking Tech., 2019

Fuzzy optimised routing metric with mobility support for RPL.
IET Commun., 2019

An Approach to Speed Invariant Gait Analysis for Human Recognition using Mutual Information.
Proceedings of the TENCON 2019, 2019

Gaussian Filtered Gait Energy Template and Centroid Corner Distance Features for Human Gait Recognition.
Proceedings of the 14th Conference on Industrial and Information Systems, 2019

An Empirical Study to Detect the Collision Rate in Similarity Hashing Algorithm Using MD5.
Proceedings of the International Conference on Data Science and Engineering, 2019

Frontal Gait Recognition based on Hierarchical Centroid Shape Descriptor and Similarity Measurement.
Proceedings of the International Conference on Data Science and Engineering, 2019

Three-Layer Security for Password Protection Using RDH, AES and ECC.
Proceedings of the Hybrid Intelligent Systems, 2019

2018
A Performance Evaluation of Location Prediction Position-Based Routing Using Real GPS Traces for VANET.
Wirel. Pers. Commun., 2018

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM.
Future Gener. Comput. Syst., 2018

Mobility Aware Routing Protocol Based on DIO Message for Low Power and Lossy Networks.
Proceedings of the Intelligent Systems Design and Applications, 2018

A Single Program Multiple Data Algorithm for Feature Selection.
Proceedings of the Intelligent Systems Design and Applications, 2018

On Human Identification Using Running Patterns: A Straightforward Approach.
Proceedings of the Intelligent Systems Design and Applications, 2018

2017
Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter.
Wirel. Networks, 2017

Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor.
Digit. Investig., 2017

Multimetrics-Based Objective Function for Low-power and Lossy Networks Under Mobility.
Proceedings of the Soft Computing for Problem Solving, 2017

Empirical Study on Features Recommended by LSVC in Classifying Unknown Windows Malware.
Proceedings of the Soft Computing for Problem Solving, 2017

PPRP: Predicted Position Based Routing Protocol Using Kalman Filter for Vehicular Ad-hoc Network.
Proceedings of the 18th International Conference on Distributed Computing and Networking, 2017

Secure data migration between cloud storage systems.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
VMI Based Automated Real-Time Malware Detector for Virtualized Cloud Environment.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Image segmentation using encoder-decoder architecture and region consistency activation.
Proceedings of the 11th International Conference on Industrial and Information Systems, 2016

Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm.
Proceedings of the 11th International Conference on Industrial and Information Systems, 2016

2015
EDAGF: Estimation & Direction Aware Greedy Forwarding for Urban Scenario in Vehicular Ad-Hoc Network.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

An Applicability of AODV and OLSR Protocols on IEEE 802.11p for City Road in VANET.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2013
Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2013

Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing.
Informatica (Slovenia), 2013

Mechanism for Preventing Registration Flooding Attack in SIP.
Proceedings of the Intelligent Computing, 2013

2012
Secure Key Exchange Scheme for IPTV Broadcasting.
Informatica (Slovenia), 2012

Security Vulnerabilities of User Authentication Scheme Using Smart Card.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

2007
Efficient Variable Length Block Switching Mechanism.
Int. J. Comput. Commun. Control, 2007


  Loading...