Följ
Jay Bhuyan
Jay Bhuyan
Professor, Computer Science, Tuskegee University
Verifierad e-postadress på tuskegee.edu
Titel
Citeras av
Citeras av
År
Genetic algorithm for clustering with an ordered representation
JN Bhuyan
Proc. of the fourth International Conf. on Information Retrieval, 408-417, 1991
1911991
Aerial drone: An effective tool to teach information technology and cybersecurity through project based learning to minority high school students in the US
J Bhuyan, F Wu, C Thomas, K Koong, JW Hur, C Wang
TechTrends 64, 899-910, 2020
322020
A combination of genetic algorithm and simulated evolution techniques for clustering
J Bhuyan
Proceedings of the 1995 ACM 23rd annual conference on Computer science, 127-134, 1995
161995
A survey on the use of data clustering for intrusion detection system in cybersecurity
B Bohara, J Bhuyan, F Wu, J Ding
International journal of network security & its applications 12 (1), 1, 2020
152020
Effect of class imbalance on the performance of machine learning-based network intrusion detection
N Tran, H Chen, J Jiang, J Bhuyan, J Ding
International Journal of Performability Engineering 17 (9), 741, 2021
102021
Cluster-based adaptive information retrieval
JN Bhuyan, JS Deogun, VV Raghavan
Proceedings of the Twenty-Fourth Annual Hawaii International Conference on …, 1991
101991
A solution framework for managing internet of things (IOT)
SK Mohapatra, JN Bhuyan, P Asundi, A Singh
International journal of Computer Networks & Communications.—2016.—8.—P …, 2016
92016
Near-Optimal Algorithms for the Boundary Selection Problem in User-Oriented Information Retrieval.
JN Bhuyan, JS Deogun, VV Raghavan
IFIP Congress, 275-280, 1989
91989
Comparative Study between solar dryer and open sun dried tomato under north plateau climatic zone
J Bhuyan, DK Mohanty, D Jayapuria
Journal of Krishi Vigyan 8 (1), 28-33, 2019
72019
Adoption of e-filing: The US journey
S Bai, KS Koong, F Wu, J Bhuyan
International Journal of Revenue Management 11 (1-2), 1-22, 2019
72019
Data curation and quality assurance for machine learning-based cyber intrusion detection
H Chen, N Tran, AS Thumati, J Bhuyan, J Ding
arXiv preprint arXiv:2105.10041, 2021
62021
Genetic-based clustering
J Bhuyan, V Elayavalli, V Raghavan
University of Southwestern, 1990
61990
Algorithms for the boundary selection problem
JN Bhuyan, JS Deogun, VV Raghavan
Algorithmica 17, 133-161, 1997
51997
An Adaptive Information Retrieval System Based on User-Oriented Clustering
J Bhuyan, JS Deogun, VV Raghavan
submitted to ACM Transactions on Information Systems, 1997
51997
A probabilistic retrieval scheme for cluster-based adaptive information retrieval
JN Bhuyan, VV Raghavan
Machine Learning Proceedings 1991, 240-244, 1991
51991
Data Curation and Quality Evaluation for Machine Learning-Based Cyber Intrusion Detection
N Tran, H Chen, J Bhuyan, J Ding
IEEE Access 10, 121900-121923, 2022
42022
Evaluation of different mechanical weed control methods in rice field
DK Mohanty, J Bhuyan
Journal of Krishi Vigyan 8 (2), 115-119, 2020
32020
A conceptual framework for application comprehension
VN Gudivada, J Nandigam, J Bhuyan
Fifth International Conference on Information Technology: New Generations …, 2008
22008
A retrieval technique for virtual reality databases
VN Gudivada, J Bhuyan, R Adusumilli
Proceedings of the 1997 ACM symposium on Applied computing, 328-333, 1997
11997
Retrieval scheme for cluster-based adaptive information retrieval based on term refinement
JN Bhuyan, JS Deogun, VV Raghavan
Applications of Artificial Intelligence 1993: Knowledge-Based Systems in …, 1993
11993
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20