Smart Home Automation Towards the Development of Smart Cities T Alam, AA Salem, AO Alsharif, AM Alhejaili Computer Science and Information Technologies 1 (1), 17-25, 2020 | 54 | 2020 |
Hand gesture recognition using machine learning algorithms B Abhishek, K Krishi, M Meghana, M Daaniyaal, HS Anupama Computer Science and Information Technologies 1 (3), 116-120, 2020 | 20 | 2020 |
Email phishing: text classification using natural language processing P Verma, A Goyal, Y Gigras Computer Science and Information Technologies 1 (1), 1-12, 2020 | 19 | 2020 |
Survey of wormhole attack in wireless sensor networks U Ghugar, J Pradhan Computer Science and Information Technologies 2 (1), 33-42, 2021 | 11 | 2021 |
Building a multilingual ontology for education domain using monto method M Florrence Computer Science and Information Technologies 1 (2), 47-53, 2020 | 9 | 2020 |
Performance evaluation of blockchains in the internet of things T Alam Computer Science and Information Technologies 1 (2), 93-97, 2020 | 8 | 2020 |
Genome feature optimization and coronary artery disease prediction using cuckoo search E Neelima, MSP Babu Computer Science and Information Technologies 1 (3), 106-115, 2020 | 6 | 2020 |
MLGrafViz: multilingual ontology visualization plug-in for protégé M Florrence Computer Science and Information Technologies 2 (1), 43-48, 2021 | 5 | 2021 |
Feature extraction and classification methods of facial expression: a survey MM Htay Computer Science and Information Technologies 2 (1), 26-32, 2021 | 5 | 2021 |
Model of emergence evacuation route planning with contra flow and zone scheduling in disaster evacuation D Hartama, H Mawengkang, M Zarlis, RW Sembiring Computer Science and Information Technologies 2 (1), 1-10, 2021 | 5 | 2021 |
Feature analysis of ontology visualization methods and tools MF Joseph, R Lourdusamy Computer Science and Information Technologies 1 (2), 61-77, 2020 | 3 | 2020 |
Efficient and scalable multitenant placement approach for in-memory database over supple architecture A Shah, N Patel | 3 | 2020 |
An optimized encryption algorithm and F function with dynamic substitution for creating S-box and P-box entries for blowfish algorithm C Rekha, GN Krishnamurthy Computer Science and Information Technologies 2 (1), 16-25, 2021 | 2 | 2021 |
Insult detection using a partitional CNN-LSTM model MMB Ismail Computer Science and Information Technologies 1 (2), 84-92, 2020 | 2 | 2020 |
High security mechanism: fragmentation and replication in the cloud with auto update in the system S Khobragade, R Bhosale, R Jiwane Computer Science and Information Technologies 1 (2), 78-83, 2020 | 2 | 2020 |
An optimized rubber sheet model for normalization phase of IRIS recognition S Selvamuthukumaran, T Ramkumar, S Shantharajah Computer Science and Information Technologies 1 (3), 126-134, 2020 | 1 | 2020 |
Wheelchair and robotic arm controls using gyro sensor A Sholahuddin, D Novita, D Setiana Computer Science and Information Technologies 1 (3), 121-125, 2020 | 1 | 2020 |
On the performance of switching methods in space division multiplexing based optical networks S Iyer Computer Science and Information Technologies 1 (2), 54-60, 2020 | 1 | 2020 |
Prototype of LPG gas leakage detector using flame sensor and MQ-2 sensor H Gusdevi, A Setya, PH Zulaeha Computer Science and Information Technologies 1 (1), 32-38, 2020 | 1 | 2020 |
Citation Analysis? CR Bank | 1 | 1988 |