A modified Bayesian boosting algorithm with weight-guided optimal feature selection for sentiment analysis S Nayak, YK Sharma Decision Analytics Journal 8, 100289, 2023 | 30 | 2023 |
Cybercrime: a threat to network security A Yassir, S Nayak International Journal of Computer Science and Network Security (IJCSNS) 12 …, 2012 | 29 | 2012 |
Cloud computing as an emerging paradigm S Nayak, A Yassir International Journal of Computer Science and Network Security 12 (1), 61-65, 2012 | 16 | 2012 |
Ethical and Legal Considerations in Machine Learning: Promoting Responsible Data Use in Bioinformatics DA Ajalkar, YK Sharma, JP Shinde, S Nayak Applying Machine Learning Techniques to Bioinformatics: Few-Shot and Zero …, 2024 | 3 | 2024 |
Issues in data mining and information retrieval A Yassir, S Nayak International Journal of Computer Science & Communication Networks 2, 93-98, 2012 | 3 | 2012 |
Efficient Machine Leaning Algorithms for Sentiment Analysis In Car Rental Service S Nayak, YK Sharma 2023 International Conference on Computational Intelligence and Sustainable …, 2023 | 2 | 2023 |
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFID Attacks J Sivakumar, S Nayak, AN Doss International Journal of Engineering and Management Research 10, 2020 | 2 | 2020 |
Bioinformatics in Agriculture and Ecology Using Few-Shots Learning From Field to Conservation JP Shinde, S Nayak, DA Ajalkar, YK Sharma Applying Machine Learning Techniques to Bioinformatics: Few-Shot and Zero …, 2024 | 1 | 2024 |
An Optimized Round Robin Central Processing Unit Scheduling Algorithm with Dynamic Time Quantum S Nayak, YK Sharma, RN Student 2023 Second International Conference On Smart Technologies For Smart Nation …, 2023 | 1 | 2023 |
A Comparative Analysis of Federated Learning and Privacy-Preserving Techniques in Healthcare AI YK Sharma, DA Ajalkar, S Nayak, JP Shinde Federated Learning and Privacy-Preserving in Healthcare AI, 1-14, 2024 | | 2024 |
Analysis of Different Features and the Application of Cisco’s SecureX Architecture in Secure Environment A Yassir, S Nayak IJCSNS 12 (9), 1, 2012 | | 2012 |