Joshi, Hiren J
164  results:
Search for persons X
?
1

Leveraging Business Intelligence and Student Feedback for E..:

, In: Advancements in Smart Computing and Information Security; Communications in Computer and Information Science,
Sharma, Hemant S. ; Joshi, Hiren D. - p. 204-224 , 2024
 
?
4

Implementation of Social Media Fake Profile Identification ..:

, In: 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG),
Shah, Maulik ; Joshi, Hiren ; Gupta, Neha - p. 1-9 , 2023
 
?
5

QoS Based Virtual Machine Consolidation for Energy Efficien..:

, In: 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS),
 
?
6

Optimizing Public Grievance Detection Accuracy Through Hype..:

, In: Soft Computing and Its Engineering Applications; Communications in Computer and Information Science,
Shah, Khushboo ; Joshi, Hardik ; Joshi, Hiren - p. 463-476 , 2023
 
?
7

Artificial Intelligence-Based Internet of Things Security:

, In: Algorithms for Intelligent Systems; Machine Learning and Metaheuristics: Methods and Analysis,
 
?
8

The SHDRA syndrome-associated geneTMEM260encodes a protein-..:

Larsen, Ida Signe Bohse ; Povolo, Lorenzo ; Zhou, Luping...
Proceedings of the National Academy of Sciences.  120 (2023)  21 - p. , 2023
 
?
9

A Study on the Stock Market Trend Predictions:

, In: ICT with Intelligent Applications; Lecture Notes in Networks and Systems,
Thomas, Rosemol ; Joshi, Hiren ; Joshi, Hardik - p. 261-266 , 2023
 
?
 
?
11

Evaluating Binary Classifiers with Word Embedding Technique..:

, In: Soft Computing and its Engineering Applications; Communications in Computer and Information Science,
Shah, Khushboo ; Joshi, Hardik ; Joshi, Hiren - p. 209-221 , 2022
 
?
13

Gujarati Task Oriented Dialogue Slot Tagging Using Deep Neu..:

, In: Soft Computing and its Engineering Applications; Communications in Computer and Information Science,
Parikh, Rachana ; Joshi, Hiren - p. 27-37 , 2021
 
?
15

Applications of Big Data and Internet of Things in Power Sy..:

, In: Architectural Wireless Networks Solutions and Security Issues; Lecture Notes in Networks and Systems,
 
1-15