Author of the publication

A Cognitive Personal Assistant System to Enhance the Individual-Centric Research Capabilities.

, , , and . Int. J. Web Based Learn. Teach. Technol., 16 (4): 1-11 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SGD-Based Cascade Scheme for Higher Degrees Wiener Polynomial Approximation of Large Biomedical Datasets., , , , , and . Mach. Learn. Knowl. Extr., 4 (4): 1088-1106 (December 2022)Quality and Security of Critical Infrastructure Systems., , and . Big Data Cogn. Comput., 8 (1): 10 (January 2024)Paradigm Shift in Adaptive Cyber Defense for Securing the Web Data: The Future Ahead.. J. Web Eng., 21 (4): 1371-1376 (2022)A Cognitive Personal Assistant System to Enhance the Individual-Centric Research Capabilities., , , and . Int. J. Web Based Learn. Teach. Technol., 16 (4): 1-11 (2021)Improvised Model for Blockchain in Distributed Cloud Environment., , , , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 327-341. Springer, (2022)Adaptive Congestion Prediction in Vehicular Ad-hoc Networks (VANET) Using Type-2 Fuzzy Model to Establish Reliable Routes., , and . Wirel. Pers. Commun., 125 (4): 3527-3548 (2022)AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis., , , and . Future Gener. Comput. Syst., (2022)Design and Deployment of Network Testbed for Web Data Security.. J. Cyber Secur. Mobil., (2022)Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms., , and . Concurr. Comput. Pract. Exp., (2023)Applications of cognitive internet of medical things in modern healthcare., , , and . Comput. Electr. Eng., (2022)