| 內容註: |
M. Yunusovna Rasulova, A new method of cryptography providing perfect confidentiality of information -- B. İşler, U. Şener, A. Tokgözlü, Z. Aslan, P. Baumann, Prediction of solar energy potential with machine learning and deep learning models -- S. Doven, Z. Aslan, Total Electron Content and Wavelet Transformation Analysis: Understanding the Role of Modelling -- Muhammad S. Jahan, A. Sharmin, B. M. Walters, T. C. Crosby, Free Radical, Antioxidant and Human health -- M. Premkumar, P. Shirley Muller, Maheswari, J. Jeyapackiam, Prasanna, Prakash, Salim Al Hudafi, Algebraic Properties of Doubt - Fuzzy CI-Sub Algebras and Ideals in CI-Algebra -- R. Sharma, V. Ghlawat, K. Alam, Elastoplastic behavior of transversely isotropic piezoelectric disc made of functionally graded material with variable thickness under rotation -- R. Chanian, H D Arora, Detection and classification of pneumonia from chest x-rays using image based deep learning methods -- Y. Aakriti Kumari, Y. Negi, S. Varshney, Precision agriculture using IoT sensors -- N. G. Tiwari, S. Kumar, A. Routray, On the analysis of a Very Severe Cyclonic Storm Nilofar over the Arabian Sea: A numerical weather prediction model study -- P. Gupta, S. Gupta, S. Srivastav, Crypto-encoding communication with graph theory -- Mangani D. Kazembe, Sudeep Varshney, Keshav Gupta, Cybersecurity incidents in relation to fraudulent SIM card registration in Malawi -- G. Gupta, N. Kumar, P. Tripathi, P. Agarwal, I. Haider, Supply Chain Analysis and Prediction using Machine Learning -- M. Shamsi, F. Marvasti, Optimal Transport: A Promising Technique for Causal Inference Applications -- R. Khurana, M. Sharma, S. Singh, A. Singh, Analysis of a Queueing model with Catastrophe and First Exceptional Service -- R. Kumar, A. Anand, N. Singh, S. Ramamoorthy, M. Alam, CNN-based Mathematical Model for Sub-Classification of Non-Small Cell Lung Cancer into Squamous Cell Carcinoma and Adenocarcinoma -- G. Luugering, Friction dominated flow in gas-networks: modeling, simulation, optimal Control and domain decompositions. |