Manish Kumar

According to our database1, Manish Kumar authored at least 95 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
More Precise FPGA Power Estimation and Validation Tool (FPEV_Tool) for Low Power Applications.
Wireless Personal Communications, 2019

IoT Based Multimode Sensing Platform for Underground Coal Mines.
Wireless Personal Communications, 2019

Highly Dispersion Tailored Property of Novel Class of Multimode Surface Plasmon Resonance Biosensor Assisted by Teflon and Metamaterial Layers.
IEEE Trans. Instrumentation and Measurement, 2019

Stochastic demand side management in smart grid system.
IJNVO, 2019

Design and Development of Underwater Vehicle: ANAHITA.
CoRR, 2019

Identifying residues that determine palmitoylation using association rule mining.
Bioinformatics, 2019

A Novel Sampling Frequency Offset Estimation Algorithm for OFDM Systems Based on Cyclostationary Properties.
IEEE Access, 2019

AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

Predicting Customer Churn Using Artificial Neural Network.
Proceedings of the Engineering Applications of Neural Networks, 2019

2018
Hidden Webpages Detection Using Distributed Learning Automata.
J. Web Eng., 2018

Prediction of Rare Palmitoylation Events in Proteins.
Journal of Computational Biology, 2018

Pattern mining for large distributed dataset: A parallel approach (PMLDD).
TIIS, 2018

Securing images with a diffusion mechanism based on Fractional Brownian Motion.
J. Inf. Sec. Appl., 2018

A cryptographic model for better information security.
J. Inf. Sec. Appl., 2018

Wind energy potential estimation with prediction of wind speed distribution.
IJISTA, 2018

Recent Named Entity Recognition and Classification techniques: A systematic review.
Computer Science Review, 2018

A hybrid TLBO-TS algorithm for integrated selection and scheduling of projects.
Computers & Industrial Engineering, 2018

An Efficient Immunization Strategy Using Overlapping Nodes and Its Neighborhoods.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Performance evaluation of a new shuffling cipher model with most used chaotic dynamical systems.
Proceedings of the TENCON 2018, 2018

Investigation of coupled map lattice as a diffusion model for enhanced image security.
Proceedings of the TENCON 2018, 2018

Forecasting of Annual Crime Rate in India: A case Study.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

'Roshini' - Developing a DIY Rural Solar Light: Utilizing Products at End-of-Life (EoL) Stage.
Proceedings of the 2018 IEEE Global Humanitarian Technology Conference, 2018

Applying Big Data Intelligence for Real Time Machine Fault Prediction.
Proceedings of the Big Data Analytics - 6th International Conference, 2018

2017
Analysis of Low Power Consumption Techniques on FPGA for Wireless Devices.
Wireless Personal Communications, 2017

Low Power Synthesis and Validation of an Embedded Multiplier for FPGA Based Wireless Communication Systems.
Wireless Personal Communications, 2017

A survey of Web crawlers for information retrieval.
Wiley Interdiscip. Rev. Data Min. Knowl. Discov., 2017

How does transformational leadership influence proactive customer service behavior of frontline service employees? Examining the mediating roles of psychological empowerment and affective commitment.
J. Enterprise Inf. Management, 2017

A cryptographic model based on logistic map and a 3-D matrix.
J. Inf. Sec. Appl., 2017

Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2.
IJISP, 2017

Frequent Itemset Mining in Large Datasets a Survey.
IJIRR, 2017

Secure solution: One time mobile originated PKI.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

Improved cryptographic model for better information security.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Chaotic dynamical systems based image encryption model.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

2016
A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography.
Signal Processing, 2016

An interlaced secure algorithm for RGB image encryption in wavelet packet domain.
IJWMIP, 2016

Design of a mobile Web crawler for hidden Web.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Lightweight Data Security Model for IoT Applications: A Dynamic Key Approach.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Statistical analysis of load demand distribution at Banaras Hindu University, India.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Mobile Seva-Enabling mGovernance in India.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Business Process Outsourcing: Learning from Cases of a Global Offshore Outsourcing Provider.
Proceedings of the Handbook on Business Process Management 2, 2015

Coronary artery disease risk assessment from unstructured electronic health records using text mining.
Journal of Biomedical Informatics, 2015

An RGB image encryption using diffusion process associated with chaotic map.
J. Inf. Sec. Appl., 2015

Analysis of Stock Volatility Clustering Using ANN.
IRMJ, 2015

iDART-Intruder Detection and Alert in Real Time.
CoRR, 2015

Technical Report on Intruder Detection and Alert System.
CoRR, 2015

TMUNSW: Identification of Disorders and Normalization to SNOMED-CT Terminology in Unstructured Clinical Notes.
Proceedings of the 9th International Workshop on Semantic Evaluation, 2015

Mobile Platform as a Service A Case Study of User Friendly Approach to Mobile Strategy.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

Efficient Use of Voice as a Channel for Delivering Public Services.
Proceedings of the ICEIS 2015, 2015

PerfAugur: Robust diagnostics for performance anomalies in cloud services.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Paradigm shift in mobile communication carriers.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Resource Defragmentation Using Market-Driven Allocation in Virtual Desktop Clouds.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Clock domain crossing aware sequential clock gating.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

Integrated Health Information Architecture to Facilitate State-wide and National Evidence-Based Public Health Monitoring: A Case Study based in India.
Proceedings of the AMIA 2015, 2015

2014
HTNSystem: Hypertension Information Extraction System for Unstructured Clinical Notes.
Proceedings of the Technologies and Applications of Artificial Intelligence, 2014

TMUNSW: Disorder Concept Recognition and Normalization in Clinical Notes for SemEval-2014 Task 7.
Proceedings of the 8th International Workshop on Semantic Evaluation, 2014

Assessment of the performance and efficiency of public services being delivered through mobile seva.
Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, 2014

A newton based distributed optimization method with local interactions for large-scale networked optimization problems.
Proceedings of the American Control Conference, 2014

2013
An ant colony optimization technique for solving min-max Multi-Depot Vehicle Routing Problem.
Swarm and Evolutionary Computation, 2013

Cyclic pursuit in a multi-agent robotic system with double-integrator dynamics under linear interactions.
Robotica, 2013

Design of cell phone operated robot using DTMF for object research.
Proceedings of the Tenth International Conference on Wireless and Optical Communications Networks, 2013

Simultaneous Gene Selection and Cancer Classification Using a Hybrid Intelligent Water Drop Approach.
Proceedings of the Pattern Recognition and Machine Intelligence, 2013

EXPLORES: An integrated learning environment to produce industry ready graduates.
Proceedings of the IEEE Frontiers in Education Conference, 2013

2012
Self-Localization and Tracking of Multiple robots in Experimental setups.
I. J. Robotics and Automation, 2012

Role of variation and jump component in measure, modelling and forecasting S&P CNX NIFTY index volatility.
IJADS, 2012

Variable Selection and Fault Detection Using a Hybrid Intelligent Water Drop Algorithm.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012

Concept of a system for Addressing Bad Publicity in Social Media Using Knowledge in Business Process Models.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Detour attack in OLSR.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Kernel Level Support for Workflow Patterns.
Proceedings of the World Congress on Services, 2011

Process Improvement by Simplification of Policy, and Procedure and Alignment of Organizational Structure.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

A Novel Attack Model Simulation in OLSR.
Proceedings of the Advances in Computing and Communications, 2011

2010
Segregation of Heterogeneous Units in a Swarm of Robotic Agents.
IEEE Trans. Automat. Contr., 2010

Semantic Classification, Keyword Mining and Search Space Optimization for digital ecosystems.
JMPT, 2010

Tunable Multifunction Filter Using Current Conveyor
CoRR, 2010

Current Conveyor Based Multifunction Filter
CoRR, 2010

PhishNet: Predictive Blacklisting to Detect Phishing Attacks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Towards knowledge assisted agile requirements evolution.
Proceedings of the 2nd International Workshop on Recommendation Systems for Software Engineering, 2010

Face Recognition Using Principle Component Analysis, Eigenface and Neural Network.
Proceedings of the 2010 International Conference on Signal Acquisition and Processing, 2010

Degraded character recognition based on gradient pattern.
Proceedings of the Second International Conference on Digital Image Processing, 2010

Applications of Data Mining in e-Governance: A Case Study of Bhoomi Project.
Proceedings of the Data Engineering and Management - Second International Conference, 2010

Discrete Event Monte-Carlo Simulation Based Decision Support System for Business Process Management.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
Intelligent Sensor Uncertainty Modelling Techniques and Data Fusion.
Control and Intelligent Systems, 2009

Enhancing AUTOSAR methodology to a cotsbased development process via mapping to V-Model.
Proceedings of the IEEE Fourth International Symposium on Industrial Embedded Systems, 2009

Discrete Event Monte-Carlo Simulation of Business Process for Capacity Planning: A Case Study.
Proceedings of the Pacific Asia Conference on Information Systems, 2009

Semantic document classification and keyword spotting in digital repositories.
Proceedings of the MEDES '09: International ACM Conference on Management of Emergent Digital EcoSystems, 2009

Performance evaluation of similarity join for real time information integration.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

2008
Neural Controllers.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Security issues in m-government.
IJESDF, 2008

On the Feasibility of Obtaining a Globally Optimal Floorplanning for an L-shaped Layout Problem.
Proceedings of the 9th International Symposium on Quality of Electronic Design (ISQED 2008), 2008

Simulation and Realization of High Input Impedence Biquad with Minimum Number of Passive Elements.
Proceedings of the International Conference on High Performance Computing, 2008

2007
Empirical Investigation of Impact of Organizational Culture, Prosocial Behavior and Organizational Trust on Sharing Mistakes in Knowledge Management Systems.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

Development of a Decision Support System for Computer Aided Process Planning System.
Proceedings of the ICEIS 2007, 2007

Lowpass - Highpass and Highpass - Bandpass Transadmittance Filter Using Operational Amplifier.
Proceedings of the International Conference on High Performance Computing, 2007

2006
Visual Learning of Affordance Based Cues.
Proceedings of the From Animals to Animats 9, 2006

2005
Neuro-fuzzy control applied to multiple cooperating robots.
Industrial Robot, 2005

Building Detection from Mobile Imagery Using Informative SIFT Descriptors.
Proceedings of the Image Analysis, 14th Scandinavian Conference, 2005


  Loading...