Seguir
Jay Bhuyan
Jay Bhuyan
Professor, Computer Science, Tuskegee University
Email confirmado em tuskegee.edu
Título
Citado por
Citado por
Ano
Genetic algorithm for clustering with an ordered representation
JN Bhuyan
Proc. of the fourth International Conf. on Information Retrieval, 408-417, 1991
1911991
Aerial drone: An effective tool to teach information technology and cybersecurity through project based learning to minority high school students in the US
J Bhuyan, F Wu, C Thomas, K Koong, JW Hur, C Wang
TechTrends 64, 899-910, 2020
322020
A combination of genetic algorithm and simulated evolution techniques for clustering
J Bhuyan
Proceedings of the 1995 ACM 23rd annual conference on Computer science, 127-134, 1995
161995
A survey on the use of data clustering for intrusion detection system in cybersecurity
B Bohara, J Bhuyan, F Wu, J Ding
International journal of network security & its applications 12 (1), 1, 2020
152020
Effect of class imbalance on the performance of machine learning-based network intrusion detection
N Tran, H Chen, J Jiang, J Bhuyan, J Ding
International Journal of Performability Engineering 17 (9), 741, 2021
102021
Cluster-based adaptive information retrieval
JN Bhuyan, JS Deogun, VV Raghavan
Proceedings of the Twenty-Fourth Annual Hawaii International Conference on …, 1991
101991
A solution framework for managing internet of things (IOT)
SK Mohapatra, JN Bhuyan, P Asundi, A Singh
International journal of Computer Networks & Communications.—2016.—8.—P …, 2016
92016
Near-Optimal Algorithms for the Boundary Selection Problem in User-Oriented Information Retrieval.
JN Bhuyan, JS Deogun, VV Raghavan
IFIP Congress, 275-280, 1989
91989
Comparative Study between solar dryer and open sun dried tomato under north plateau climatic zone
J Bhuyan, DK Mohanty, D Jayapuria
Journal of Krishi Vigyan 8 (1), 28-33, 2019
72019
Adoption of e-filing: The US journey
S Bai, KS Koong, F Wu, J Bhuyan
International Journal of Revenue Management 11 (1-2), 1-22, 2019
72019
Data curation and quality assurance for machine learning-based cyber intrusion detection
H Chen, N Tran, AS Thumati, J Bhuyan, J Ding
arXiv preprint arXiv:2105.10041, 2021
62021
Genetic-based clustering
J Bhuyan, V Elayavalli, V Raghavan
University of Southwestern, 1990
61990
Algorithms for the boundary selection problem
JN Bhuyan, JS Deogun, VV Raghavan
Algorithmica 17, 133-161, 1997
51997
An Adaptive Information Retrieval System Based on User-Oriented Clustering
J Bhuyan, JS Deogun, VV Raghavan
submitted to ACM Transactions on Information Systems, 1997
51997
A probabilistic retrieval scheme for cluster-based adaptive information retrieval
JN Bhuyan, VV Raghavan
Machine Learning Proceedings 1991, 240-244, 1991
51991
Data Curation and Quality Evaluation for Machine Learning-Based Cyber Intrusion Detection
N Tran, H Chen, J Bhuyan, J Ding
IEEE Access 10, 121900-121923, 2022
42022
Evaluation of different mechanical weed control methods in rice field
DK Mohanty, J Bhuyan
Journal of Krishi Vigyan 8 (2), 115-119, 2020
22020
A conceptual framework for application comprehension
VN Gudivada, J Nandigam, J Bhuyan
Fifth International Conference on Information Technology: New Generations …, 2008
22008
A retrieval technique for virtual reality databases
VN Gudivada, J Bhuyan, R Adusumilli
Proceedings of the 1997 ACM symposium on Applied computing, 328-333, 1997
11997
Retrieval scheme for cluster-based adaptive information retrieval based on term refinement
JN Bhuyan, JS Deogun, VV Raghavan
Applications of Artificial Intelligence 1993: Knowledge-Based Systems in …, 1993
11993
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20