Geeta Sikka

Orcid: 0000-0003-4795-1842

According to our database1, Geeta Sikka authored at least 44 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LBATSM: Load Balancing Aware Task Selection and Migration Approach in Fog Computing Environment.
IEEE Syst. J., June, 2024

Classification of COVID-19 on Chest X-Ray Images Using Deep Learning Model with Histogram Equalization and Lung Segmentation.
SN Comput. Sci., April, 2024

Integrating semantic similarity with Dirichlet multinomial mixture model for enhanced web service clustering.
Knowl. Inf. Syst., April, 2024

A Genetic-Algorithm-Based Dynamic Transmission of Data for Communicable Disease in IoMT Environment.
IEEE Internet Things J., January, 2024

Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis.
IEEE Trans. Dependable Secur. Comput., 2024

On the importance of pre-processing in small-scale analyses of twitter: a case study of the 2019 Indian general election.
Multim. Tools Appl., 2024

View adaptive unified self-supervised technique for abdominal organ segmentation.
Comput. Biol. Medicine, 2024

2023
Correction to: Application of Twitter sentiment analysis in election prediction: a case study of 2019 Indian general election.
Soc. Netw. Anal. Min., December, 2023

Application of Twitter sentiment analysis in election prediction: a case study of 2019 Indian general election.
Soc. Netw. Anal. Min., December, 2023

An automatic cascaded approach for pancreas segmentation via an unsupervised localization using 3D CT volumes.
Multim. Syst., August, 2023

WGSDMM+GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding.
Future Gener. Comput. Syst., August, 2023

Multi-agent architecture approach for self-healing systems: Run-time recovery with case-based reasoning.
Concurr. Comput. Pract. Exp., January, 2023

Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review.
ACM Comput. Surv., 2023

Robust Semi-supervised Medical Image Classification: Leveraging Reliable Pseudo-labels.
Proceedings of the Computer Vision and Image Processing - 8th International Conference, 2023

2022
Enriching Module Dependency Graphs for Improved Software Clustering.
Int. J. Syst. Syst. Eng., 2022

A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation.
Comput. Sci. Rev., 2022

A secure energy-efficient routing protocol for disease data transmission using IoMT.
Comput. Electr. Eng., 2022

2021
Multi-agent architecture for fault recovery in self-healing systems.
J. Ambient Intell. Humaniz. Comput., 2021

The emergence of social media data and sentiment analysis in election prediction.
J. Ambient Intell. Humaniz. Comput., 2021

Empirical risk assessment of attack graphs using time to compromise framework.
Int. J. Inf. Comput. Secur., 2021

An ensemble approach for optimization of penetration layout in wide area networks.
Comput. Commun., 2021

Comparative Study of Topic Modeling and Word Embedding Approaches for Web Service Clustering.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

2020
A Reversible Data Hiding Scheme for Interpolated Images Based on Pixel Intensity Range.
Multim. Tools Appl., 2020

Evaluation of web service clustering using Dirichlet Multinomial Mixture model based approach for Dimensionality Reduction in service representation.
Inf. Process. Manag., 2020

Grey relational classification algorithm for software fault proneness with SOM clustering.
Int. J. Data Min. Model. Manag., 2020

A secure data transmission protocol for cloud-assisted edge-Internet of Things environment.
Trans. Emerg. Telecommun. Technol., 2020

Enhancing web service clustering using Length Feature Weight Method for service description document vector space representation.
Expert Syst. Appl., 2020

MRS-DP: Improving Performance and Resource Utilization of Big Data Applications with Deadlines and Priorities.
Big Data, 2020

STDADS: An Efficient Slow Task Detection Algorithm for Deadline Schedulers.
Big Data, 2020

2019
Threshold-based empirical validation of object-oriented metrics on different severity levels.
Int. J. Intell. Eng. Informatics, 2019

Exploration in adaptiveness to achieve automated fault recovery in self-healing software systems: A review.
Intell. Decis. Technol., 2019

A high capacity data hiding scheme using modified AMBTC compression technique.
Int. Arab J. Inf. Technol., 2019

A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments.
Trans. Emerg. Telecommun. Technol., 2019

2018
An AMBTC compression based data hiding scheme using pixel value adjusting strategy.
Multidimens. Syst. Signal Process., 2018

Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities.
Comput. Secur., 2018

Reducing Stage Weight Estimation Error of Slow Task Detection in MapReduce Scheduling.
Proceedings of the International Conference on Advanced Machine Learning Technologies and Applications, 2018

2017
An investigation on the effect of cross project data for prediction accuracy.
Int. J. Syst. Assur. Eng. Manag., 2017

Image interpolation based high capacity reversible data hiding scheme.
Multim. Tools Appl., 2017

A high payload data hiding scheme based on modified AMBTC technique.
Multim. Tools Appl., 2017

An image interpolation based reversible data hiding scheme using pixel value adjusting feature.
Multim. Tools Appl., 2017

2015
Efficient and Scalable Collection of Dynamic Metrics Using MapReduce.
Proceedings of the 2015 Asia-Pacific Software Engineering Conference, 2015

2014
A survey on wireless sensor network clustering protocols optimized via game theory.
SIGBED Rev., 2014

2011
Recent methods for software effort estimation by analogy.
ACM SIGSOFT Softw. Eng. Notes, 2011

2010
A New Image Steganography Based On First Component Alteration Technique
CoRR, 2010


  Loading...