Ajay Singh

According to our database1, Ajay Singh authored at least 41 papers between 1982 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Real-Time Smart Patient Monitoring and Assessment Amid COVID-19 Pandemic - an Alternative Approach to Remote Monitoring.
J. Medical Syst., 2020

Secure transmission using optimal antenna selection for MIMO underlay CRN with multiple primary users.
IET Commun., 2020

FLC tuned with Gravitational Search Algorithm for Nonlinear Pose Filter.
CoRR, 2020

Secrecy Outage Performance of SWIPT Cognitive Radio Network With Imperfect CSI.
IEEE Access, 2020

Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

Nonlinear Attitude Filter on SO(3): Fast Adaptation and Robustness.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

2019
Secure transmission in underlay cognitive radio network with outdated channel state information.
Phys. Commun., 2019

Three-parent GA: A Global Optimization Algorithm.
J. Multiple Valued Log. Soft Comput., 2019

Secrecy Performance of Cognitive Radio Networks Using Arbitrary Transmit Antenna Selection and Threshold- Based MRC.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Transport API Extensions for the Interconnection of Multiple NFV Infrastructure Points of Presence.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2019

On the Distribution of Molecules for Diffusion Based Molecular Communication System.
Proceedings of the 10th International Conference on Computing, 2019

Malware Classification Using Image Representation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Secrecy performance Analysis for Underlay Cognitive Radio Network with Optimal Antenna Selection and Generalized Receiver Selection.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Secrecy analysis of cognitive radio network with MS-GSC/MRC scheme.
EURASIP J. Wirel. Commun. Netw., 2018

Efficient Means of Achieving Composability Using Object Based Semantics in Transactional Memory Systems.
Proceedings of the Networked Systems - 6th International Conference, 2018

Performance Evaluation of Dual Hop Decode and Forward Relaying Protocol Under Generalized Gamma Fading Channels.
Proceedings of the 9th International Conference on Computing, 2018

Physical Layer Security of Outdated CSI Based CRN.
Proceedings of the 9th International Conference on Computing, 2018

On the Optimal Threshold for Diffusion Based Molecular Communication System.
Proceedings of the 2nd European Conference on Electrical Engineering and Computer Science, 2018

2017
Physical Layer Security of a Multiantenna-Based CR Network With Single and Multiple Primary Users.
IEEE Trans. Veh. Technol., 2017

Secrecy Capacity in CRN With Malicious Energy Harvester Using Game Theoretic Techniques.
IEEE Trans. Cogn. Commun. Netw., 2017

Persistent Memory Programming Abstractions in Context of Concurrent Applications.
CoRR, 2017

Efficient means of Achieving Composability using Transactional Memory.
CoRR, 2017

Performance Comparison of Various STM Concurrency Control Protocols Using Synchrobench.
CoRR, 2017

Analysis of Electrolyte-Insulator-Semiconductor Tunnel Field-Effect Transistor as pH Sensor.
Proceedings of the VLSI Design and Test - 21st International Symposium, 2017

Consumer's Perspective and Retailer's Consideration Towards Purchase of Private Label Brands.
Proceedings of the 5th International Conference on Information Technology and Quantitative Management, 2017

2016
Secrecy Outage of a Simultaneous Wireless Information and Power Transfer Cognitive Radio System.
IEEE Wirel. Commun. Lett., 2016

Performance of an Improved Energy Detector in Multihop Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2016

Color based human detection and tracking algorithm using a non-Gaussian adaptive Particle filter.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Achieving Secure Communication in CRN with Malicious Energy Harvester Using Game Theory.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Image Registration of Medical Images Using Ripplet Transform.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

2014
Novel grounded inductance simulator using single OTRA.
Int. J. Circuit Theory Appl., 2014

2013
Threshold optimization of a finite sample-based cognitive radio network using energy detector.
EURASIP J. Wirel. Commun. Netw., 2013

Performance analysis of multiple sample based improved energy detector in collaborative CR networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

2012
Innovation Approaches of "WhispersInTheCorridors.com" in the Field of Indian Bureaucracy: A Case Study.
Int. J. Innov. Digit. Econ., 2012

Cooperative Spectrum Sensing in Multiple Antenna Based Cognitive Radio Network Using an Improved Energy Detector.
IEEE Commun. Lett., 2012

2011
Optimization of Cooperative Spectrum Sensing with an Improved Energy Detector over Imperfect Reporting Channels.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

2009
Fractional order plasma position control of the STOR-1M tokamak.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

2003
A QoS Routing Scheme by Using Mobile Agents.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003

1997
Buffer allocation for an integer nonlinear network design problem.
Comput. Oper. Res., 1997

1983
An Integrated Instrumentation Environment for Multiprocessors.
IEEE Trans. Computers, 1983

1982
Synthetic Workload Generation for Experimentation with Multiprocessors.
Proceedings of the Proceedings of the 3rd International Conference on Distributed Computing Systems, 1982


  Loading...