Mohammad Najmud Doja
Affiliations:- Jamia Millia Islamia, New Delhi, India
According to our database1,
Mohammad Najmud Doja
authored at least 54 papers
between 2008 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on jmi.ac.in
On csauthors.net:
Bibliography
2022
Data mining and machine learning in cancer survival research: An overview and future recommendations.
J. Biomed. Informatics, 2022
2021
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system.
J. King Saud Univ. Comput. Inf. Sci., 2021
Int. J. Electron. Bus., 2021
EETSP: Energy-efficient two-stage routing protocol for wireless sensor network-assisted Internet of Things.
Int. J. Commun. Syst., 2021
COVID-19 suspected person detection and identification using thermal imaging-based closed circuit television camera and tracking using drone in Internet of Things.
Int. J. Comput. Appl. Technol., 2021
A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map.
EAI Endorsed Trans. Energy Web, 2021
Comput. Intell. Neurosci., 2021
2020
Data Technol. Appl., 2020
Pattern Recognit. Lett., 2020
Movie trailer classification using deer hunting optimization based deep convolutional neural network in video sequences.
Multim. Tools Appl., 2020
Enumerative feature subset based ranking system for learning to rank in presence of implicit user feedback.
J. King Saud Univ. Comput. Inf. Sci., 2020
J. Biomed. Informatics, 2020
Int. J. Inf. Manag., 2020
2019
EAI Endorsed Trans. Scalable Inf. Syst., 2019
Enhanced Clustering Algorithm based on Fuzzy Logic (E-CAFL) for WSN E-CAFL for Homogeneous WSN.
Scalable Comput. Pract. Exp., 2019
A Secure Structure for Hiding Information in a Cryptosystem based on Machine-learning Techniques and Content-based Optimization using Portfolio Selection Data.
Scalable Comput. Pract. Exp., 2019
Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN.
Int. J. Commun. Syst., 2019
2018
Wirel. Pers. Commun., 2018
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos.
Symmetry, 2018
An Optimized Density-based Algorithm for Anomaly Detection in High Dimensional Datasets.
Scalable Comput. Pract. Exp., 2018
Int. J. Inf. Technol. Web Eng., 2018
Entropy, 2018
Stability of Local Information based Centrality Measurements under Degree Preserving Randomizations.
CoRR, 2018
Comput., 2018
IEEE Access, 2018
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Analysis and Investigation of Requirements and Model for Multipurpose Cadastral System in India.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018
2017
E-GENMR: Enhanced Generalized Query Processing using Double Hashing Technique through MapReduce in Cloud Database Management System.
J. Comput. Sci., 2017
Deterministic K-means secure coverage clustering with periodic authentication for wireless sensor networks.
Int. J. Commun. Syst., 2017
2016
GENMR: Generalized Query Processing through Map Reduce In Cloud Database Management System.
CoRR, 2016
Proceedings of the Ninth International Conference on Contemporary Computing, 2016
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
2015
Multi-Objective Meta-Heuristic Approach for Energy-Efficient Secure Data Aggregation in Wireless Sensor Networks.
Wirel. Pers. Commun., 2015
2014
A Refinement of Dijkstra's Algorithm for Extraction of Shortest Paths in generalized Real Time-multigraphs.
J. Comput. Sci., 2014
2013
Real Time multigraphs for Communication Networks: an intuitionistic fuzzy Mathematical Model.
J. Comput. Sci., 2013
Generalization of Dijkstra's Algorithm for Extraction of Shortest Paths in Directed multigraphs.
J. Comput. Sci., 2013
Analysis of tree-based multicast routing in wireless sensor networks with varying network metrics.
Int. J. Commun. Syst., 2013
Appl. Comput. Intell. Soft Comput., 2013
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013
2011
IET Wirel. Sens. Syst., 2011
Mining Sequential Features and Opinion Words in User Generated Contents.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011
2010
Data Warehouse Engineering Process: An Unified Software Development Process Approach.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010
Performance of Structure Based Multicast Routing Protocols in Wireless Ad hoc Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the Pattern Recognition and Machine Intelligence, 2009
2008
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
Virtual Password: Virtual Environment Based User Authentication.
Proceedings of the 2008 International Conference on Security & Management, 2008