Mohammad Najmud Doja

Affiliations:
  • Jamia Millia Islamia, New Delhi, India


According to our database1, Mohammad Najmud Doja authored at least 54 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Data mining and machine learning in cancer survival research: An overview and future recommendations.
J. Biomed. Informatics, 2022

2021
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system.
J. King Saud Univ. Comput. Inf. Sci., 2021

A lossless digital watermarking scheme based on a new 3D-hyper chaotic map.
Int. J. Electron. Bus., 2021

EETSP: Energy-efficient two-stage routing protocol for wireless sensor network-assisted Internet of Things.
Int. J. Commun. Syst., 2021

COVID-19 suspected person detection and identification using thermal imaging-based closed circuit television camera and tracking using drone in Internet of Things.
Int. J. Comput. Appl. Technol., 2021

A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map.
EAI Endorsed Trans. Energy Web, 2021

An Integrated Approach for Cancer Survival Prediction Using Data Mining Techniques.
Comput. Intell. Neurosci., 2021

2020
Age-specific survival in prostate cancer using machine learning.
Data Technol. Appl., 2020

Detecting distraction of drivers using Convolutional Neural Network.
Pattern Recognit. Lett., 2020

Movie trailer classification using deer hunting optimization based deep convolutional neural network in video sequences.
Multim. Tools Appl., 2020

Enumerative feature subset based ranking system for learning to rank in presence of implicit user feedback.
J. King Saud Univ. Comput. Inf. Sci., 2020

Time-range based sequential mining for survival prediction in prostate cancer.
J. Biomed. Informatics, 2020

Land records on Blockchain for implementation of Land Titling in India.
Int. J. Inf. Manag., 2020

Aspect Term Extraction using Graph-based Semi-Supervised Learning.
CoRR, 2020

2019
Stability Enhancement in LEACH (SE-LEACH) for Homogeneous WSN.
EAI Endorsed Trans. Scalable Inf. Syst., 2019

Enhanced Clustering Algorithm based on Fuzzy Logic (E-CAFL) for WSN E-CAFL for Homogeneous WSN.
Scalable Comput. Pract. Exp., 2019

A Secure Structure for Hiding Information in a Cryptosystem based on Machine-learning Techniques and Content-based Optimization using Portfolio Selection Data.
Scalable Comput. Pract. Exp., 2019

Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN.
Int. J. Commun. Syst., 2019

2018
ABC Optimization Based Construction of Strong Substitution-Boxes.
Wirel. Pers. Commun., 2018

Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos.
Symmetry, 2018

An Optimized Density-based Algorithm for Anomaly Detection in High Dimensional Datasets.
Scalable Comput. Pract. Exp., 2018

Skipnet-Octree Based Indexing Technique for Cloud Database Management System.
Int. J. Inf. Technol. Web Eng., 2018

A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes.
Entropy, 2018

Group based Centrality for Immunization of Complex Networks.
CoRR, 2018

Stability of Local Information based Centrality Measurements under Degree Preserving Randomizations.
CoRR, 2018

A Novel Framework for Portfolio Selection Model Using Modified ANFIS and Fuzzy Sets.
Comput., 2018

A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes.
IEEE Access, 2018

A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Analysis and Investigation of Requirements and Model for Multipurpose Cadastral System in India.
Proceedings of the 11th International Conference on Theory and Practice of Electronic Governance, 2018

Group Based Immunization Strategy on Networks with Nonlinear Infectivity.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

2017
ANFIS Aided AODV Routing Protocolfor Mobile Ad Hoc Networks.
J. Comput. Sci., 2017

E-GENMR: Enhanced Generalized Query Processing using Double Hashing Technique through MapReduce in Cloud Database Management System.
J. Comput. Sci., 2017

Deterministic K-means secure coverage clustering with periodic authentication for wireless sensor networks.
Int. J. Commun. Syst., 2017

2016
GENMR: Generalized Query Processing through Map Reduce In Cloud Database Management System.
CoRR, 2016

Review ranking method for spam recognition.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

Neighborhood Topology to Discover Influential Nodes in a Complex Network.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

A Novel Edge Based Chaotic Steganography Method Using Neural Network.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2015
Multi-Objective Meta-Heuristic Approach for Energy-Efficient Secure Data Aggregation in Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

2014
A Refinement of Dijkstra's Algorithm for Extraction of Shortest Paths in generalized Real Time-multigraphs.
J. Comput. Sci., 2014

2013
Real Time multigraphs for Communication Networks: an intuitionistic fuzzy Mathematical Model.
J. Comput. Sci., 2013

Generalization of Dijkstra's Algorithm for Extraction of Shortest Paths in Directed multigraphs.
J. Comput. Sci., 2013

Analysis of tree-based multicast routing in wireless sensor networks with varying network metrics.
Int. J. Commun. Syst., 2013

An Algorithm for Extracting Intuitionistic Fuzzy Shortest Path in a Graph.
Appl. Comput. Intell. Soft Comput., 2013

A Novel Framework for Users' Accountability on Online Social Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

2011
Swarm intelligence-based topology maintenance protocol for wireless sensor networks.
IET Wirel. Sens. Syst., 2011

Mining Sequential Features and Opinion Words in User Generated Contents.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

Computing methodologies for localization techniques in wireless sensor networks.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

2010
Data Warehouse Engineering Process: An Unified Software Development Process Approach.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

Opinion-Based Imprecise Query Answering.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

Performance of Structure Based Multicast Routing Protocols in Wireless Ad hoc Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Electronic Authority Variation
CoRR, 2009

Feature and Opinion Mining for Customer Review Summarization.
Proceedings of the Pattern Recognition and Machine Intelligence, 2009

2008
Image Authentication Schemes against Key-Logger Spyware.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Virtual Password: Virtual Environment Based User Authentication.
Proceedings of the 2008 International Conference on Security & Management, 2008


  Loading...