default search action
Mohammad Najmud Doja
Person information
- affiliation: Jamia Millia Islamia, New Delhi, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j34]Ishleen Kaur, M. N. Doja, Tanvir Ahmad:
Data mining and machine learning in cancer survival research: An overview and future recommendations. J. Biomed. Informatics 128: 104026 (2022) - 2021
- [j33]Ishleen Kaur, M. N. Doja, Tanvir Ahmad, Musheer Ahmad, Amir Hussain, Ahmed Nadeem, Ahmed A. Abd El-Latif:
An Integrated Approach for Cancer Survival Prediction Using Data Mining Techniques. Comput. Intell. Neurosci. 2021: 6342226:1-6342226:14 (2021) - [j32]Shahzad Alam, Tanvir Ahmad, M. N. Doja:
A Novel Hybrid Watermarking scheme with Image authentication based on frequency domain, 2- Level SVD using chaotic map. EAI Endorsed Trans. Energy Web 8(31): e7 (2021) - [j31]Pawan Singh Mehra, Yogita Bisht Mehra, Arvind Dagur, Anshu Kumar Dwivedi, M. N. Doja, Aatif Jamshed:
COVID-19 suspected person detection and identification using thermal imaging-based closed circuit television camera and tracking using drone in Internet of Things. Int. J. Comput. Appl. Technol. 66(3/4): 340-349 (2021) - [j30]Anshu Kumar Dwivedi, Pawan Singh Mehra, Om Pal, Mohammad Najmud Doja, Bashir Alam:
EETSP: Energy-efficient two-stage routing protocol for wireless sensor network-assisted Internet of Things. Int. J. Commun. Syst. 34(17) (2021) - [j29]Shahzad Alam, Tanvir Ahmad, M. N. Doja:
A lossless digital watermarking scheme based on a new 3D-hyper chaotic map. Int. J. Electron. Bus. 16(1): 88-102 (2021) - [j28]Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J. King Saud Univ. Comput. Inf. Sci. 33(1): 77-85 (2021) - 2020
- [j27]Vinay Thakur, M. N. Doja, Yogesh K. Dwivedi, Tanvir Ahmad, Ganesh Khadanga:
Land records on Blockchain for implementation of Land Titling in India. Int. J. Inf. Manag. 52: 101940 (2020) - [j26]Ishleen Kaur, M. N. Doja, Tanvir Ahmad:
Time-range based sequential mining for survival prediction in prostate cancer. J. Biomed. Informatics 110: 103550 (2020) - [j25]Mohd Wazih Ahmad, M. N. Doja, Tanvir Ahmad:
Enumerative feature subset based ranking system for learning to rank in presence of implicit user feedback. J. King Saud Univ. Comput. Inf. Sci. 32(8): 965-976 (2020) - [j24]Prashant Giridhar Shambharkar, M. N. Doja:
Movie trailer classification using deer hunting optimization based deep convolutional neural network in video sequences. Multim. Tools Appl. 79(29-30): 21197-21222 (2020) - [j23]Sarfaraz Masood, Abhinav Rai, Aakash Aggarwal, Mohammad Najam Doja, Musheer Ahmad:
Detecting distraction of drivers using Convolutional Neural Network. Pattern Recognit. Lett. 139: 79-85 (2020) - [j22]M. N. Doja, Ishleen Kaur, Tanvir Ahmad:
Age-specific survival in prostate cancer using machine learning. Data Technol. Appl. 54(2): 215-234 (2020) - [i5]Gunjan Ansari, Chandni Saxena, Tanvir Ahmad, M. N. Doja:
Aspect Term Extraction using Graph-based Semi-Supervised Learning. CoRR abs/2003.04968 (2020)
2010 – 2019
- 2019
- [j21]Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN. Int. J. Commun. Syst. 32(3) (2019) - [j20]Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Enhanced Clustering Algorithm based on Fuzzy Logic (E-CAFL) for WSN E-CAFL for Homogeneous WSN. Scalable Comput. Pract. Exp. 20(1): 41-54 (2019) - [j19]Chanchal Kumar, Mohammad Najmud Doja:
A Secure Structure for Hiding Information in a Cryptosystem based on Machine-learning Techniques and Content-based Optimization using Portfolio Selection Data. Scalable Comput. Pract. Exp. 20(1): 161-180 (2019) - [j18]Pawan Singh Mehra, Mohammad Najmud Doja, Bashir Alam:
Stability Enhancement in LEACH (SE-LEACH) for Homogeneous WSN. EAI Endorsed Trans. Scalable Inf. Syst. 6(20): e5 (2019) - 2018
- [j17]Amer Awad Alzaidi, Musheer Ahmad, Mohammad Najam Doja, Eesa A. Alsolami, M. M. Sufyan Beg:
A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes. IEEE Access 6: 55405-55418 (2018) - [j16]Chanchal Kumar, Mohammad Najmud Doja:
A Novel Framework for Portfolio Selection Model Using Modified ANFIS and Fuzzy Sets. Comput. 7(4): 57 (2018) - [j15]Eesa A. Alsolami, Musheer Ahmad, Christos K. Volos, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes. Entropy 20(7): 525 (2018) - [j14]Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam:
Skipnet-Octree Based Indexing Technique for Cloud Database Management System. Int. J. Inf. Technol. Web Eng. 13(3): 1-13 (2018) - [j13]Adeel Shiraz Hashmi, Mohammad Najmud Doja, Tanvir Ahmad:
An Optimized Density-based Algorithm for Anomaly Detection in High Dimensional Datasets. Scalable Comput. Pract. Exp. 19(1): 69-77 (2018) - [j12]Musheer Ahmad, Eesa A. Alsolami, Xing-Yuan Wang, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg, Amer Awad Alzaidi:
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. Symmetry 10(7): 266 (2018) - [j11]Musheer Ahmad, Mohammad Najam Doja, Mirza Mohd. Sufyan Beg:
ABC Optimization Based Construction of Strong Substitution-Boxes. Wirel. Pers. Commun. 101(3): 1715-1729 (2018) - [c15]Chandni Saxena, Mohammad Najmud Doja, Tanvir Ahmad:
Group Based Immunization Strategy on Networks with Nonlinear Infectivity. CSoNet 2018: 162-173 - [c14]Vinay Thakur, M. N. Doja, Amir A. A. Faizi:
Analysis and Investigation of Requirements and Model for Multipurpose Cadastral System in India. ICEGOV 2018: 51-58 - [c13]Musheer Ahmad, Mohammad Najam Doja, M. M. Sufyan Beg:
A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation. SSCC 2018: 543-553 - [i4]Chandni Saxena, Mohammad Najmud Doja, Tanvir Ahmad:
Stability of Local Information based Centrality Measurements under Degree Preserving Randomizations. CoRR abs/1812.11461 (2018) - [i3]Chandni Saxena, M. N. Doja, Tanvir Ahmad:
Group based Centrality for Immunization of Complex Networks. CoRR abs/1812.11535 (2018) - 2017
- [j10]M. Bala Krishna, M. N. Doja:
Deterministic K-means secure coverage clustering with periodic authentication for wireless sensor networks. Int. J. Commun. Syst. 30(4) (2017) - [j9]Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam:
E-GENMR: Enhanced Generalized Query Processing using Double Hashing Technique through MapReduce in Cloud Database Management System. J. Comput. Sci. 13(7): 234-246 (2017) - [j8]Vivek Sharma, Bashir Alam, Mohammad Najmud Doja:
ANFIS Aided AODV Routing Protocolfor Mobile Ad Hoc Networks. J. Comput. Sci. 13(10): 514-523 (2017) - 2016
- [c12]Chandni Saxena, Mohammad Najmud Doja, Tanvir Ahmad:
Neighborhood Topology to Discover Influential Nodes in a Complex Network. FICTA (1) 2016: 323-332 - [c11]Shahzad Alam, Tanvir Ahmad, Mohammad Najmud Doja:
A Novel Edge Based Chaotic Steganography Method Using Neural Network. FICTA (2) 2016: 467-475 - [c10]Gunjan Ansari, Tanvir Ahmad, Mohammad Najmud Doja:
Review ranking method for spam recognition. IC3 2016: 1-5 - [i2]Shweta Malhotra, Mohammad Najmud Doja, Bashir Alam, Mansaf Alam:
GENMR: Generalized Query Processing through Map Reduce In Cloud Database Management System. CoRR abs/1603.08102 (2016) - 2015
- [j7]M. Bala Krishna, M. N. Doja:
Multi-Objective Meta-Heuristic Approach for Energy-Efficient Secure Data Aggregation in Wireless Sensor Networks. Wirel. Pers. Commun. 81(1): 1-16 (2015) - 2014
- [j6]Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
A Refinement of Dijkstra's Algorithm for Extraction of Shortest Paths in generalized Real Time-multigraphs. J. Comput. Sci. 10(4): 593-603 (2014) - 2013
- [j5]Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
An Algorithm for Extracting Intuitionistic Fuzzy Shortest Path in a Graph. Appl. Comput. Intell. Soft Comput. 2013: 970197:1-970197:5 (2013) - [j4]M. Bala Krishna, M. N. Doja:
Analysis of tree-based multicast routing in wireless sensor networks with varying network metrics. Int. J. Commun. Syst. 26(10): 1327-1340 (2013) - [j3]Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
Generalization of Dijkstra's Algorithm for Extraction of Shortest Paths in Directed multigraphs. J. Comput. Sci. 9(3): 377-382 (2013) - [j2]Siddhartha Sankar Biswas, Bashir Alam, Mohammad Najmud Doja:
Real Time multigraphs for Communication Networks: an intuitionistic fuzzy Mathematical Model. J. Comput. Sci. 9(7): 847-855 (2013) - [c9]Gambhir Mohit, M. N. Doja, Moinuddin:
A Novel Framework for Users' Accountability on Online Social Networks. QSHINE 2013: 831-841 - 2011
- [j1]M. Bala Krishna, M. N. Doja:
Swarm intelligence-based topology maintenance protocol for wireless sensor networks. IET Wirel. Sens. Syst. 1(4): 181-190 (2011) - [c8]M. Bala Krishna, M. N. Doja:
Computing methodologies for localization techniques in wireless sensor networks. ICWET 2011: 1024-1028 - [c7]Tanvir Ahmad, Mohammad Najmud Doja:
Mining Sequential Features and Opinion Words in User Generated Contents. IICAI 2011: 1113-1124 - 2010
- [c6]M. Bala Krishna, M. N. Doja:
Performance of Structure Based Multicast Routing Protocols in Wireless Ad hoc Networks. CIT 2010: 2684-2691 - [c5]Muhammad Abulaish, Tanvir Ahmad, Jahiruddin, Mohammad Najmud Doja:
Opinion-Based Imprecise Query Answering. PAKDD (2) 2010: 238-248 - [c4]Venkata Vampugani Subrahmanyam, Mohammad Najam Doja:
Data Warehouse Engineering Process: An Unified Software Development Process Approach. Software Engineering Research and Practice 2010: 582-588
2000 – 2009
- 2009
- [c3]Muhammad Abulaish, Jahiruddin, Mohammad Najmud Doja, Tanvir Ahmad:
Feature and Opinion Mining for Customer Review Summarization. PReMI 2009: 219-224 - [i1]M. N. Doja, Dharmender Saini:
Electronic Authority Variation. CoRR abs/0909.1049 (2009) - 2008
- [c2]M. N. Doja, Naveen Kumar:
Virtual Password: Virtual Environment Based User Authentication. Security and Management 2008: 139-144 - [c1]M. N. Doja, Naveen Kumar:
Image Authentication Schemes against Key-Logger Spyware. SNPD 2008: 574-579
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint