Manoj Kumar

According to our database1, Manoj Kumar authored at least 186 papers between 1982 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Image authentication by assessing manipulations using illumination.
Multimedia Tools Appl., 2019

Image Forensics Based on Lighting Estimation.
Int. J. Image Graphics, 2019

Comparison of different RSA variants.
IJAIP, 2019

A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments.
Trans. Emerging Telecommunications Technologies, 2019

VideoFlow: A Flow-Based Generative Model for Video.
CoRR, 2019

A new family of predictor-corrector methods for solving fractional differential equations.
Applied Mathematics and Computation, 2019

LAGraph: A Community Effort to Collect Graph Algorithms Built on Top of the GraphBLAS.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2019

2018
How to Make Analog-to-Information Converters Work in Dynamic Spectrum Environments With Changing Sparsity Conditions.
IEEE Trans. on Circuits and Systems, 2018

Retrieval of head-neck medical images using Gabor filter based on power-law transformation method and rank BHMT.
Signal, Image and Video Processing, 2018

Bayesian inference for Poisson-inverse exponential distribution under progressive type-II censoring with binomial removal.
Int. J. Systems Assurance Engineering and Management, 2018

A length factor artificial neural network method for the numerical solution of the advection dispersion equation characterizing the mass balance of fluid flow in a chemical reactor.
Neural Computing and Applications, 2018

Colour image segmentation with histogram and homogeneity histogram difference using evolutionary algorithms.
Int. J. Machine Learning & Cybernetics, 2018

Record values from exponentiated Pareto type I distribution and associated inference.
MASA, 2018

Energy efficient cognitive body area network (CBAN) using lookup table and energy harvesting.
Journal of Intelligent and Fuzzy Systems, 2018

Graph Programming Interface (GPI): A Linear Algebra Programming Model for Large Scale Graph Computations.
International Journal of Parallel Programming, 2018

A Context Based Tracking for Similar and Deformable Objects.
IJCVIP, 2018

CT image denoising using NLM and correlation-based wavelet packet thresholding.
IET Image Processing, 2018

IBM POWER9 and cognitive computing.
IBM Journal of Research and Development, 2018

Measuring Conversational Productivity in Child Forensic Interviews.
CoRR, 2018

Parallel Architecture and Hyperparameter Search via Successive Halving and Classification.
CoRR, 2018

A review on CT image noise and its denoising.
Biomed. Signal Proc. and Control, 2018

A new iterative technique for a fractional model of nonlinear Zakharov-Kuznetsov equations via Sumudu transform.
Applied Mathematics and Computation, 2018

Implementing the GraphBLAS C API.
Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium Workshops, 2018

Denoising and Raw-waveform Networks for Weakly-Supervised Gender Identification on Noisy Speech.
Proceedings of the Interspeech 2018, 2018

A Knowledge Driven Structural Segmentation Approach for Play-Talk Classification During Autism Assessment.
Proceedings of the Interspeech 2018, 2018

Multimodal Interaction Modeling of Child Forensic Interviewing.
Proceedings of the 2018 on International Conference on Multimodal Interaction, 2018

Depth Aware Portrait Segmentation Using Dual Focus Images.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

IoT Powered Vehicle Tracking System (VTS).
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

Improving Semi-Supervised Classification for Low-Resource Speech Interaction Applications.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Performance of Graph Analytics Applications on Many-Core Processors.
Proceedings of the 2018 IEEE High Performance Extreme Computing Conference, 2018

DeepAttent: Saliency Prediction with Deep Multi-scale Residual Network.
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018

GraphBLAS: handling performance concerns in large graph analytics.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

2017
Evidence for similar patterns of neural activity elicited by picture- and word-based representations of natural scenes.
NeuroImage, 2017

An efficient algorithm based on artificial neural networks and particle swarm optimization for solution of nonlinear Troesch's problem.
Neural Computing and Applications, 2017

A Non-Linear Stiffness Model for Serial and Parallel Manipulators.
IJRAT, 2017

Economic Evaluation of Solar Cooling Schemes.
IJEOE, 2017

Numerical method for solving time-fractional multi-dimensional diffusion equations.
IJCSM, 2017

Crowd Behavior Recognition Using Hybrid Tracking Model and Genetic algorithm Enabled Neural Network.
Int. J. Comput. Intell. Syst., 2017

Profitability of Indian Firms in Foreign Direct Investment.
IJABIM, 2017

A Panel Data Analysis for Exploring the New Determinants of Growth in Small and Medium Sized Enterprises in India.
IJABIM, 2017

An efficient encryption-then-compression technique for encrypted images using SVD.
Digital Signal Processing, 2017

Enabling Massive Deep Neural Networks with the GraphBLAS.
CoRR, 2017

Role of computational efficiency indices and pose clustering in effective decision making: An example of annulated furanones in Pf-DHFR space.
Computational Biology and Chemistry, 2017

Multi-Scale Context Adaptation for Improving Child Automatic Speech Recognition in Child-Adult Spoken Interactions.
Proceedings of the Interspeech 2017, 2017

Enabling massive deep neural networks with the GraphBLAS.
Proceedings of the 2017 IEEE High Performance Extreme Computing Conference, 2017

Determination of PSAP and routing of emergency calls in IP multimedia subsystem.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
Reversible data hiding based on prediction error expansion using adjacent pixels.
Security and Communication Networks, 2016

Eco-Labeling of Suppliers Using Green Production Techniques with Asymmetric Information.
IJSSMET, 2016

Vocational Education and Training in India.
IJAVET, 2016

The Effect of Product Labeling Policies in Supply Chain under Asymmetric Information.
IJAL, 2016

Sub-Supplier's Decision Affect Supply Chain Performance.
IJAL, 2016

The Implications of India's Special Characteristics for FDI Spillovers.
IJABIM, 2016

An Improved Methodology to Overcome Key Issues in Human Fecal Metagenomic DNA Extraction.
Genomics, Proteomics & Bioinformatics, 2016

Bayesian Estimation for Poisson-exponential Model under Progressive Type-II Censoring Data with Binomial Removal and Its Application to Ovarian Cancer Data.
Communications in Statistics - Simulation and Computation, 2016

Mathematical Foundations of the GraphBLAS.
CoRR, 2016

Design and Implementation of an Improved Carry Increment Adder.
CoRR, 2016

A multilayer screening approach toward the discovery of novel Pf-DHFR inhibitors.
Computational Biology and Chemistry, 2016

Objective Language Feature Analysis in Children with Neurodevelopmental Disorders During Autism Assessment.
Proceedings of the Interspeech 2016, 2016

Detection of Microaneurysms and Exudates from Color Fundus Images by using SBGFRLS Algorithm.
Proceedings of the International Conference on Informatics and Analytics, 2016

Supporting On-demand Elasticity in Distributed Graph Processing.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Efficient implementation of scatter-gather operations for large scale graph analytics.
Proceedings of the 2016 IEEE High Performance Extreme Computing Conference, 2016

Mathematical foundations of the GraphBLAS.
Proceedings of the 2016 IEEE High Performance Extreme Computing Conference, 2016

A Local Correlation and Directive Contrast Based Image Fusion.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

Content Aware Image Size Reduction Using Low Energy Maps for Reduced Distortion.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

A Hybrid Method Based CT Image Denoising Using Nonsubsampled Contourlet and Curvelet Transforms.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

Graph programming interface (GPI): a linear algebra programming model for large scale graph computations.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2015
An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-ant colony optimisation approach.
Softw., Pract. Exper., 2015

The Mutual Relationship between Innovative Output and R&D Alliances.
IJTD, 2015

An Unified Analytical Network Process (ANP) and Data Envelopment Analysis (DEA) Approach for Manufacturing Strategy Decision.
IJSDS, 2015

The Behavioural Relationships Between Industrial R&D and University R&D in India.
IJKSR, 2015

R&D Spillovers and the Increasing of a Supplier's Research Activities.
IJEEI, 2015

Self-Selection and Learning by Exporting from Indian Manufacturing Firms.
IJABIM, 2015

Numerical simulation of second-order hyperbolic telegraph type equations with variable coefficients.
Computer Physics Communications, 2015

Numerical method for solving fractional coupled Burgers equations.
Applied Mathematics and Computation, 2015

CT image denoising based on complex wavelet transform using local adaptive thresholding and Bilateral filtering.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

Green logistics optimization model for forward and reverse logistics using genetic algorithm.
Proceedings of the 2015 IEEE International Conference on Industrial Engineering and Engineering Management, 2015

2014
The fuzzy based QMPR selection for OLSR routing protocol.
Wireless Networks, 2014

Impact of gate material engineering(GME) on analog/RF performance of nanowire Schottky-barrier gate all around (GAA) MOSFET for low power wireless applications: 3D T-CAD simulation.
Microelectronics Journal, 2014

Fuzzy entropy-based framework for multi-faceted test case classification and selection: an empirical study.
IET Software, 2014

FeW: A Lightweight Block Cipher.
IACR Cryptology ePrint Archive, 2014

A composite numerical scheme for the numerical simulation of coupled Burgers' equation.
Computer Physics Communications, 2014

A finite element approach for finding positive solutions of a logistic equation with a sign-changing weight function.
Applied Mathematics and Computation, 2014

Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network.
Proceedings of the 2014 International Conference on Information Technology, 2014

2013
Buckling analysis of a beam-column using multilayer perceptron neural network technique.
J. Franklin Institute, 2013

A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks.
I. J. Network Security, 2013

Mathematical modelling and computer simulation of steady state heat conduction in anisotropic multi-layered bodies.
IJCSM, 2013

DREAM_OLSR PROTOCOL (Distance Routing Effective Algorithm for Mobility - Optimized Link State Routing)
CoRR, 2013

Algorithm and approaches to handle large Data- A Survey.
CoRR, 2013

The Wonderful Toy of 20th Century can be a Disaster in 21st Century: Scenario and Policies Regarding Mobile Waste in India.
CoRR, 2013

Services in Android can Share Your Personal Information in Background.
CoRR, 2013

2012
Mathematical Modeling of quintic Duffing equation and numerical simulation using Multiple scales modified Lindstedt-Poincare method.
IJMSSC, 2012

An initial-value technique to solve third-order reaction-diffusion singularly perturbed boundary-value problems.
Int. J. Comput. Math., 2012

A New Approach of Improving CFA Image for Digital Camera's
CoRR, 2012

Phase plane analysis and traveling wave solution of third order nonlinear singular problems arising in thin film evolution.
Computers & Mathematics with Applications, 2012

Mathematical model and computer simulation of three dimensional thin film elliptic interface problems.
Computers & Mathematics with Applications, 2012

Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card.
Central Europ. J. Computer Science, 2012

Numerical simulation of singularly perturbed non-linear elliptic boundary value problems using finite element method.
Applied Mathematics and Computation, 2012

An Iterative Marching with Correctness Criterion Algorithm for Shape from Shading Under Oblique Light Source.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012

An algorithm for fetal heart rate detection using wavelet transform.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2011
Methods for solving singular perturbation problems arising in science and engineering.
Mathematical and Computer Modelling, 2011

Towards Multi-Faceted Test Cases Optimization.
JSEA, 2011

Capacity and interference aware link scheduling with channel assignment in wireless mesh networks.
J. Network and Computer Applications, 2011

An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks.
I. J. Network Security, 2011

Impact of the Evolution of Smart Phones in Education Technology and its Application in Technical and Professional Studies: Indian Perspective.
CoRR, 2011

Multilayer perceptrons and radial basis function neural network methods for the solution of differential equations: A survey.
Computers & Mathematics with Applications, 2011

Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

Improving Accuracy of SMS Based FAQ Retrieval System.
Proceedings of the Multilingual Information Access in South Asian Languages, 2011

2010
A New Secure Remote User Authentication Scheme with Smart Cards.
I. J. Network Security, 2010

An Enhanced Remote User Authentication Scheme with Smart Card.
I. J. Network Security, 2010

Flaws in Differential Cryptanalysis of Reduced Round PRESENT.
IACR Cryptology ePrint Archive, 2010

On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP.
IACR Cryptology ePrint Archive, 2010

Sequential combination of statistics, econometrics and Adaptive Neural-Fuzzy Interface for stock market prediction.
Expert Syst. Appl., 2010

Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing in Wireless Sensor Networks
CoRR, 2010

Modified Adomian Decomposition Method and computer implementation for solving singular boundary value problems arising in various physical problems.
Computers & Chemical Engineering, 2010

Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP.
Proceedings of the Contemporary Computing - Third International Conference, 2010

Text Detection using Multilayer Separation in Real Scene Images.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme.
IACR Cryptology ePrint Archive, 2009

A Registration Scheme to Allocate a Unique Identification Number.
IACR Cryptology ePrint Archive, 2009

On the Security of a Proxy Blind Signature Scheme over Braid Groups.
IACR Cryptology ePrint Archive, 2009

Linkability of Blind Signature Schemes over Braid Groups.
IACR Cryptology ePrint Archive, 2009

Security Analysis of a Proxy Signature Scheme over Braid Groups.
IACR Cryptology ePrint Archive, 2009

Erratum to: "A second order spline finite difference method for singular two-point boundary value problems" [Applied Mathematics and Computation 142 (2003) 283-290].
Applied Mathematics and Computation, 2009

A collection of computational techniques for solving singular boundary-value problems.
Advances in Engineering Software, 2009

A boundary value approach for a class of linear singularly perturbed boundary value problems.
Advances in Engineering Software, 2009

Computational method for finding various solutions for a Quasilinear Elliptic Equation of Kirchhoff type.
Advances in Engineering Software, 2009

Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks.
Proceedings of the First International Conference on Networks and Communications, 2009

Korean Text Extraction by Local Color Quantization and K-means Clustering in Natural Scene.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

2008
A Secure Remote User Authentication Scheme with Smart Cards.
IACR Cryptology ePrint Archive, 2008

A survey on various computational techniques for nonlinear elliptic boundary value problems.
Advances in Engineering Software, 2008

Reconstruction of Polyhedral Objects by Correction of Images and Using Shape from Shading Approach.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2007
Numerical solution of a singularly perturbed three-point boundary value problem.
Int. J. Comput. Math., 2007

A Forward Secure Remote User Authentication Scheme.
IACR Cryptology ePrint Archive, 2007

Security Analysis of a Remote User Authentication Scheme with Smart Cards
CoRR, 2007

Higher order method for singular boundary-value problems by using spline function.
Applied Mathematics and Computation, 2007

2006
A uniform mesh finite difference method for a class of singular two-point boundary value problems.
Applied Mathematics and Computation, 2006

2005
The Modified Scheme is still vulnerable to the parallel Session Attack
CoRR, 2005

An Improved Remote User Authentication Scheme Using Smart Cards
CoRR, 2005

Directed Threshold Multi - Signature Scheme without SDC
CoRR, 2005

Faults and Improvements of an Enhanced Remote User Authentication Scheme Using Smart Cards
CoRR, 2005

A Cryptographic Study of Some Digital Signature Schemes
CoRR, 2005

Negotiation Support in Online Markets, with Competition and Co-Operation.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

2004
Some remarks on a remote user authentication scheme using smart cards with forward secrecy.
IEEE Trans. Consumer Electronics, 2004

New remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electronics, 2004

A non-uniform mesh finite difference method and its convergence for a class of singular two-point boundary value problems.
Int. J. Comput. Math., 2004

A framework for eGovernance solutions.
IBM Journal of Research and Development, 2004

Online marketing research.
IBM Journal of Research and Development, 2004

A Directed Threshold - Signature Scheme
CoRR, 2004

Some Applications of Directed Signature Scheme
CoRR, 2004

A Directed -Threshold Multi-Signature Scheme
CoRR, 2004

A Directed Signature Scheme and its Applications
CoRR, 2004

A Digital Signature with Threshold Generation and Verification
CoRR, 2004

The Password Change Phase is Still Insecure
CoRR, 2004

A fuzzy goal programming approach for vendor selection problem in a supply chain.
Computers & Industrial Engineering, 2004

2003
A fourth-order spline finite difference method for singular two-point boundary value problems.
Int. J. Comput. Math., 2003

A difference scheme based on non-uniform mesh for singular two-point boundary value problems.
Applied Mathematics and Computation, 2003

A difference method for singular two-point boundary value problems.
Applied Mathematics and Computation, 2003

A second order finite difference method and its convergence for a class of singular two-point boundary value problems.
Applied Mathematics and Computation, 2003

A new finite difference method for a class of singular two-point boundary value problems.
Applied Mathematics and Computation, 2003

A second order spline finite difference method for singular two-point boundary value problems.
Applied Mathematics and Computation, 2003

2002
A platform for business-to-business sell-side, private exchanges and marketplaces.
IBM Systems Journal, 2002

A fourth-order finite difference method for a class of singular two-point boundary value problems.
Applied Mathematics and Computation, 2002

Soft Computing in E-Commerce.
Proceedings of the Advances in Soft Computing, 2002

2000
Analysis and design of backbone architecture alternatives for IP optical networking.
IEEE Journal on Selected Areas in Communications, 2000

Electronic Multidimensional Auctions and the Role of Information Feedback.
Proceedings of the 8th European Conference on Information Systems, 2000

1998
Video-server designs for supporting very large numbers of concurrent users.
IBM Journal of Research and Development, 1998

Internet Auctions.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

1996
A high performance software implementation of MPEG audio encoder.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

1995
Irregular Personalized Communication on Distributed Memory Machines.
J. Parallel Distrib. Comput., 1995

1993
The GF11 Parallel Computer.
Parallel Computing, 1993

Personalized Communication Avoiding Node Contention on Distributed Memory Systems.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

1992
Unique design concepts in GF11 and their impact on performance.
IBM Journal of Research and Development, 1992

The GF11 parallel computer: Programming and performance.
Future Generation Comp. Syst., 1992

1990
A wide instruction word architecture for parallel execution of logic programs coded in BSL.
New Generation Comput., 1990

1989
Trace Driven Simulation for Studying MIMD Parallel Computers.
Proceedings of the International Conference on Parallel Processing, 1989

Preventing Congestion in Multistage Networks in the Presence of Hotspots.
Proceedings of the International Conference on Parallel Processing, 1989

1988
Measuring Parallelism in Computation-Intensive Scientific/Engineering Applications.
IEEE Trans. Computers, 1988

A Wide Instruction Word Architecture for Parallel Execution of Logic Programs Coded in BSL.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1988

1987
Effect of Storage Allocation/Reclamation Methods on Parallelism and Storage Requirements.
Proceedings of the 14th Annual International Symposium on Computer Architecture. Pittsburgh, 1987

1986
Performance of Unbuffered Shuffle-Exchange Networks.
IEEE Trans. Computers, 1986

The Onset of Hot-Spot Contention.
Proceedings of the International Conference on Parallel Processing, 1986

1985
Switching Strategies in Shuffle-Exchange Packet-Switched Networks.
IEEE Trans. Computers, 1985

1984
Performance enhancement in buffered delta networks using crossbar switches and multiple links.
J. Parallel Distrib. Comput., 1984

1983
An Efficient Implementation of Batcher's Odd-Even Merge Algorithm and Its Application in Parallel Sorting Schemes.
IEEE Trans. Computers, 1983

Switching Strategies in a Class of Packet Switching Networks
Proceedings of the 10th Annual Symposium on Computer Architecture, 1983, 1983

Generalized Delta Networks.
Proceedings of the International Conference on Parallel Processing, 1983

1982
Comments on "Interference Analysis of Shuffle/Exchange Networks".
IEEE Trans. Computers, 1982


  Loading...