Manoj Kumar

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Selective bin model for reversible data hiding in encrypted images.
Pattern Anal. Appl., March, 2024

Handling illumination variation for motion detection in video through intelligent method: An application for smart surveillance system.
Multim. Tools Appl., March, 2024

Traffic Congestion Prediction Using Feature Series LSTM Neural Network and a New Congestion Index.
Int. J. Artif. Intell. Tools, March, 2024

Dual Field-of-View Off-Axis Spatially Multiplexed Digital Holography Using Fresnel's Bi-Mirror.
Sensors, February, 2024

Live Cell Imaging by Single-Shot Common-Path Wide Field-of-View Reflective Digital Holographic Microscope.
Sensors, February, 2024

Chaotic whale-atom search optimization-based deep stacked auto encoder for crowd behaviour recognition.
J. Exp. Theor. Artif. Intell., February, 2024

Bayesian fuzzy clustering and deep CNN-based automatic video summarization.
Multim. Tools Appl., January, 2024

Competitive Swarm Improved Invasive Weed Optimization-Based Secret Sharing Scheme for Visual Cryptography.
Cybern. Syst., January, 2024

Design Methodology of Multifunctional Balun Filters Based on Modified Coupling Matrix.
IEEE Trans. Instrum. Meas., 2024

Charting the course: exploring the changing terrain of online shopping and future directions for research.
Int. J. Electron. Bus., 2024

Differential Cryptanalysis of a Lightweight Block Cipher LELBC.
IACR Cryptol. ePrint Arch., 2024

Frozen Feature Augmentation for Few-Shot Image Classification.
CoRR, 2024

Spline magnitude disparity cross correlated deep network for gait recognition.
Artif. Intell. Rev., 2024

Energizing an IoT Sensor Using Regenerative Opposite Fringing Fields From an Embedded Communicating Patch Antenna.
IEEE Access, 2024

Unveiling Graph Structures for Machine Learning: Learning, Structuring, and Coarsening.
Proceedings of the 7th Joint International Conference on Data Science & Management of Data (11th ACM IKDD CODS and 29th COMAD), 2024

2023
Alzheimer's Disease Is Associated with Increased Network Assortativity: Evidence from Metabolic Connectivity.
Brain Connect., December, 2023

Conditional autoregressive-tunicate swarm algorithm based generative adversarial network for violent crowd behavior recognition.
Artif. Intell. Rev., November, 2023

Moving human detection and tracking from thermal video through intelligent surveillance system for smart applications.
Multim. Tools Appl., October, 2023

Bayesian Surprise Predicts Human Event Segmentation in Story Listening.
Cogn. Sci., October, 2023

An Interval Type 2 Fuzzy Decision-Making Framework for Exploring Critical Issues for the Sustenance of the Tea Industry.
Axioms, October, 2023

A Novel Algorithm for Optimal Trajectory Generation Using Q Learning.
SN Comput. Sci., September, 2023

Chronological ant lion optimizer-based deep convolutional neural network for panic behavior detection in crowded scenes.
Multim. Tools Appl., September, 2023

Implications of use of different intraoperative ultrasound modalities during glioma surgery - A comparative study of factors affecting outcomes.
Int. J. Medical Informatics, September, 2023

Resonance attacks detection and mitigation control scheme on frequency regulation in multi-area smart grid.
Int. J. Control, September, 2023

Error analysis and numerical solution of generalized Benjamin-Bona-Mahony-Burgers equation using 3-scale Haar wavelets.
Int. J. Model. Simul. Sci. Comput., August, 2023

A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario.
Internet Things, July, 2023

ECG-based heartbeat classification using exponential-political optimizer trained deep learning for arrhythmia detection.
Biomed. Signal Process. Control., July, 2023

Optimization of Slew Mitigation Capacitor in Passive Charge Compensation-Based Delta-Sigma Modulator.
IEEE Trans. Circuits Syst. II Express Briefs, June, 2023

Quasi-exact ground-state extrapolation for the random-field Potts model.
Comput. Phys. Commun., May, 2023

A survey on attribute-based encryption for Internet of Things.
Int. J. Model. Simul. Sci. Comput., April, 2023

Applications of Electronic Nose, Electronic Eye and Electronic Tongue in Quality, Safety and Shelf Life of Meat and Meat Products: A Review.
Sensors, January, 2023

Dual PatchNorm.
Trans. Mach. Learn. Res., 2023

Detection and classification of brain tumor using hybrid feature extraction technique.
Multim. Tools Appl., 2023

Breast cancer prediction and categorization in the molecular era of histologic grade.
Multim. Tools Appl., 2023

Social network analysis for crime rate detection using Spizella swarm optimization based BiLSTM classifier.
Knowl. Based Syst., 2023

A Unified Framework for Optimization-Based Graph Coarsening.
J. Mach. Learn. Res., 2023

Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks: A review.
Int. J. Netw. Manag., 2023

Outsourcing decryption of KP-ABE using elliptic curve cryptography.
Int. J. Inf. Comput. Secur., 2023

A privacy preserving scheme for encrypted medical images using RDH.
Int. J. Inf. Comput. Secur., 2023

INFRDET: IoT network flow regulariser-based detection and classification of IoT botnet.
Int. J. Grid Util. Comput., 2023

In search of cluster-based routing protocol for WSN using consensus algorithm.
Int. J. Commun. Networks Distributed Syst., 2023

A comparative analysis of elliptic curve-based cryptographic techniques for internet of things.
Int. J. Ad Hoc Ubiquitous Comput., 2023

Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT.
IACR Cryptol. ePrint Arch., 2023

Signal Conducting System with Effective Optimization Using Deep Learning for Schizophrenia Classification.
Comput. Syst. Sci. Eng., 2023

Scaling Vision Transformers to 22 Billion Parameters.
CoRR, 2023

Large language models can segment narrative events similarly to humans.
CoRR, 2023

Experimental Investigation and DFT Study of Tin-Oxide for Its Application as Light Absorber Layer in Optoelectronic Devices.
IEEE Access, 2023


Image Captioners Are Scalable Vision Learners Too.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Featured Graph Coarsening with Similarity Guarantees.
Proceedings of the International Conference on Machine Learning, 2023


Diagnostic Classification of ASD Improves with Structural Connectivity of DTI and Logistic Regression.
Proceedings of the Healthcare Transformation with Informatics and Artificial Intelligence, 2023

Leveraging Convolutional Neural Networks for Improved Drug Identification.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

2022
Implementation and Operation of Air Corridors.
Dataset, December, 2022

Necessary conditions for Turing instability in the reaction-diffusion systems associated with replicator dynamics.
Comput. Appl. Math., June, 2022

Communication Quality-Conscious Synthesis of 3-D Coverage Using Switched Multibeam Multi-Sector Array Antenna for V2I Application.
IEEE Trans. Veh. Technol., 2022

Do better ImageNet classifiers assess perceptual similarity better?
Trans. Mach. Learn. Res., 2022

Classification of resource management approaches in fog/edge paradigm and future research prospects: a systematic review.
J. Supercomput., 2022

Analysis of Heat Transfer of Mono and Hybrid Nanofluid Flow between Two Parallel Plates in a Darcy Porous Medium with Thermal Radiation and Heat Generation/Absorption.
Symmetry, 2022

Ti2C-TiO2 MXene Nanocomposite-Based High-Efficiency Non-Enzymatic Glucose Sensing Platform for Diabetes Monitoring.
Sensors, 2022

Bayesian inference for Maxwell Boltzmann distribution on step-stress partially accelerated life test under progressive type-II censoring with binomial removals.
Int. J. Syst. Assur. Eng. Manag., 2022

Room layout estimation in indoor environment: a review.
Multim. Tools Appl., 2022

A novel protocol for efficient authentication in cloud-based IoT devices.
Multim. Tools Appl., 2022

Choice of intraoperative ultrasound adjuncts for brain tumor surgery.
BMC Medical Informatics Decis. Mak., 2022

Global dynamics of an age-structured model for HIV viral dynamics with latently infected T cells.
Math. Comput. Simul., 2022

Nonlinear Reconstruction of Images from Patterns Generated by Deterministic or Random Optical Masks - Concepts and Review of Research.
J. Imaging, 2022

Common Fixed Point Theorems for Generalized Contractive Pair of Mappings in a Metric Space and Their Application to Fractional Calculus.
J. Appl. Math., 2022

Ulam-Hyers stability and analytical approach for m-dimensional Caputo space-time variable fractional order advection-dispersion equation.
Int. J. Model. Simul. Sci. Comput., 2022

A deep learning approach for the early diagnosis of Parkinson's disease using brain MRI scans.
Int. J. Appl. Pattern Recognit., 2022

Design and analysis of SRRC filter in wavelet based multiuser environment of mobile WiMax.
Int. J. Adv. Intell. Paradigms, 2022

A Practical-Quantum Differential Attack on Block Ciphers.
IACR Cryptol. ePrint Arch., 2022

Mapping Phenological Functional Types (PhFT) in the Indian Eastern Himalayas using machine learning algorithm in Google Earth Engine.
Comput. Geosci., 2022

Existence and uniqueness results and analytical solution of the multi-dimensional Riesz space distributed-order advection-diffusion equation via two-step Adomian decomposition method.
Eng. Comput., 2022

Analytical solution with existence and uniqueness conditions of non-linear initial value multi-order fractional differential equations using Caputo derivative.
Eng. Comput., 2022

Exact solution with existence and uniqueness conditions for multi-dimensional time-space tempered fractional diffusion-wave equation.
Eng. Comput., 2022

Error analysis and numerical solution of Burgers-Huxley equation using 3-scale Haar wavelets.
Eng. Comput., 2022

The resilience of Indian Western Himalayan forests to regime shift: Are they reaching towards no return point?
Ecol. Informatics, 2022

Functional Optimization Reinforcement Learning for Real-Time Bidding.
CoRR, 2022

On the surprising tradeoff between ImageNet accuracy and perceptual similarity.
CoRR, 2022

Thermal aware learning based CPU governor.
Concurr. Comput. Pract. Exp., 2022

Inventory routing model for perishable products toward circular economy.
Comput. Ind. Eng., 2022

Energy Savings Through VOD (Ventilation-on-Demand) Analysis in Indian Underground Coal Mine.
IEEE Access, 2022

Modeling Large S-box in MILP and a (Related-Key) Differential Attack on Full Round PIPO-64/128.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

IISERB Brains at SemEval-2022 Task 6: A Deep-learning Framework to Identify Intended Sarcasm in English.
Proceedings of the 16th International Workshop on Semantic Evaluation, SemEval@NAACL 2022, 2022

Let the Big Data Speak: Collaborative Model of Topic Extract and Sentiment Analysis COVID-19 Based on Weibo Data.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Improving Large-Scale Conversational Assistants using Model Interpretation based Training Sample Selection.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing: EMNLP 2022 - Industry Track, Abu Dhabi, UAE, December 7, 2022

Unsupervised training data re-weighting for natural language understanding with local distribution approximation.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing: EMNLP 2022 - Industry Track, Abu Dhabi, UAE, December 7, 2022

Chest X-Ray based Lung Disease Detection using Convolutional Neural Network.
Proceedings of the Joint Proceedings of the Workshop on Computer Vision and Machine Learning for Healthcare (CVMLH 2022) and the Workshop on Technological Innovations in Education and Knowledge Dissemination (WTEK 2022) Co-located with TOOTILL 100 - 6th International Conference on Computing Sciences (ICCS 2022), Hybrid Event, Chennai, India, April 22, 2022

Bird Species Classification from Images Using Deep Learning.
Proceedings of the Computer Vision and Image Processing - 7th International Conference, 2022

Event Segmentation In Story Listening Using Deep Language Models.
Proceedings of the 44th Annual Meeting of the Cognitive Science Society, 2022

2021
Approximate solution of singular IVPs of Lane-Emden type and error estimation via advanced Adomian decomposition method.
J. Appl. Math. Comput., June, 2021

Approximate Analytic Solution of Burger Huxley Equation Using Feed-Forward Artificial Neural Network.
Neural Process. Lett., 2021

An Outsourced Decryption ABE Model using ECC in Internet of Things.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

Analysis on Krasnoselskii's fixed point theorem of fuzzy variable fractional differential equation for a novel coronavirus (COVID-19) model with singular operator.
Int. J. Model. Simul. Sci. Comput., 2021

Positive solutions and stability of fuzzy Atangana-Baleanu variable fractional differential equation model for a novel coronavirus (COVID-19).
Int. J. Model. Simul. Sci. Comput., 2021

An analytical solution of multi-dimensional space fractional diffusion equations with variable coefficients.
Int. J. Model. Simul. Sci. Comput., 2021

Multilayer perceptron and Chebyshev polynomials-based functional link artificial neural network for solving differential equations.
Int. J. Model. Simul. Sci. Comput., 2021

Automating the Indian transportation system through intelligent searching and retrieving with Amazon Elastic Compute Cloud.
IET Networks, 2021

MILES: Modeling Large S-box in MILP Based Differential Characteristic Search.
IACR Cryptol. ePrint Arch., 2021

Numerical solution of singular boundary value problems using advanced Adomian decomposition method.
Eng. Comput., 2021

Optimization free neural network approach for solving ordinary and partial differential equations.
Eng. Comput., 2021

Numerical solution of Bagley-Torvik equations using Legendre artificial neural network method.
Evol. Intell., 2021

Skillful Twelve Hour Precipitation Forecasts using Large Context Neural Networks.
CoRR, 2021

Necessary and Sufficient Condition for Satisfiability of a Boolean Formula in CNF and its Implications on P versus NP problem.
CoRR, 2021

A comparison of different metaheuristics for the quadratic assignment problem in accelerated systems.
Appl. Soft Comput., 2021

KEA: Tuning an Exabyte-Scale Data Infrastructure.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Colorization Transformer.
Proceedings of the 9th International Conference on Learning Representations, 2021

Prostate Cancer Prognosis Using Multi-Layer Perceptron and Class Balancing Techniques.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

IamAlpha: Instant and Adaptive Mobile Network for Alpha Matting.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

2020
Covert communication integrates into wavelet packet transform OFDM system over Rayleigh fading channel.
Wirel. Networks, 2020

A study on the stability behavior of an epidemic model with ratio-dependent incidence and saturated treatment.
Theory Biosci., 2020

BrainIAK tutorials: User-friendly learning materials for advanced fMRI analysis.
PLoS Comput. Biol., 2020

Correction to: Mathematical modeling and intelligent optimization of submerged arc welding process parameters using hybrid PSO-GA evolutionary algorithms.
Neural Comput. Appl., 2020

Mathematical modeling and intelligent optimization of submerged arc welding process parameters using hybrid PSO-GA evolutionary algorithms.
Neural Comput. Appl., 2020

Thermophoresis and suction/injection roles on free convective MHD flow of Ag-kerosene oil nanofluid.
J. Comput. Des. Eng., 2020

An analytical solution with existence and uniqueness conditions for fractional integro-differential equations.
Int. J. Model. Simul. Sci. Comput., 2020

Numerical solution for singular differential equations using Haar wavelet.
Int. J. Model. Simul. Sci. Comput., 2020

Exploiting WiMAX for covert transmission of secret data over fading channel.
Int. J. Commun. Syst., 2020

Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2020

MILP Based Differential Attack on Round Reduced WARP.
IACR Cryptol. ePrint Arch., 2020

A secure data transmission protocol for cloud-assisted edge-Internet of Things environment.
Trans. Emerg. Telecommun. Technol., 2020

Optimal differential trails in lightweight block ciphers ANU and PICO.
Cryptologia, 2020

Numerical computation of blood hemodynamic through constricted human left coronary artery: Pulsatile simulations.
Comput. Methods Programs Biomed., 2020

A review study on blood in human coronary artery: Numerical approach.
Comput. Methods Programs Biomed., 2020

Short-Term Statistical Forecasts of COVID-19 Infections in India.
IEEE Access, 2020

Dynamic and Static Energy Efficient Scheduling of Task Graphs on Multiprocessors: A Heuristic.
IEEE Access, 2020

VideoFlow: A Conditional Flow-Based Model for Stochastic Video Generation.
Proceedings of the 8th International Conference on Learning Representations, 2020

A Two Side Histogram Shifting Based Reversible Data Hiding Technique in Encrypted Images.
Proceedings of the Computer Vision and Image Processing - 5th International Conference, 2020

2019
A wavelet based approach for simultaneous compression and encryption of fused images.
J. King Saud Univ. Comput. Inf. Sci., 2019

A new exponentially directional weighted function based CT image denoising using total variation.
J. King Saud Univ. Comput. Inf. Sci., 2019

Comparison of different RSA variants.
Int. J. Adv. Intell. Paradigms, 2019

Full-Round Differential Attack on DoT Block Cipher.
IACR Cryptol. ePrint Arch., 2019

A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments.
Trans. Emerg. Telecommun. Technol., 2019

VideoFlow: A Flow-Based Generative Model for Video.
CoRR, 2019

A new family of predictor-corrector methods for solving fractional differential equations.
Appl. Math. Comput., 2019

2018
How to Make Analog-to-Information Converters Work in Dynamic Spectrum Environments With Changing Sparsity Conditions.
IEEE Trans. Circuits Syst. I Regul. Pap., 2018

Retrieval of head-neck medical images using Gabor filter based on power-law transformation method and rank BHMT.
Signal Image Video Process., 2018

Covert information sharing with novel fuzzy adaptive edge detection.
Secur. Priv., 2018

Bayesian inference for Poisson-inverse exponential distribution under progressive type-II censoring with binomial removal.
Int. J. Syst. Assur. Eng. Manag., 2018

A length factor artificial neural network method for the numerical solution of the advection dispersion equation characterizing the mass balance of fluid flow in a chemical reactor.
Neural Comput. Appl., 2018

Colour image segmentation with histogram and homogeneity histogram difference using evolutionary algorithms.
Int. J. Mach. Learn. Cybern., 2018

Record values from exponentiated Pareto type I distribution and associated inference.
Model. Assist. Stat. Appl., 2018

CT image denoising using locally adaptive shrinkage rule in tetrolet domain.
J. King Saud Univ. Comput. Inf. Sci., 2018

Energy efficient cognitive body area network (CBAN) using lookup table and energy harvesting.
J. Intell. Fuzzy Syst., 2018

A Context Based Tracking for Similar and Deformable Objects.
Int. J. Comput. Vis. Image Process., 2018

CT image denoising using NLM and correlation-based wavelet packet thresholding.
IET Image Process., 2018

Parallel Architecture and Hyperparameter Search via Successive Halving and Classification.
CoRR, 2018

A review on CT image noise and its denoising.
Biomed. Signal Process. Control., 2018

A new iterative technique for a fractional model of nonlinear Zakharov-Kuznetsov equations via Sumudu transform.
Appl. Math. Comput., 2018

Depth Aware Portrait Segmentation Using Dual Focus Images.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

IoT Powered Vehicle Tracking System (VTS).
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

An Efficient Image Fusion Technique Based on DTCWT.
Proceedings of the Advances in Computing and Data Sciences, 2018

DeepAttent: Saliency Prediction with Deep Multi-scale Residual Network.
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018

2017
Evidence for similar patterns of neural activity elicited by picture- and word-based representations of natural scenes.
NeuroImage, 2017

An efficient algorithm based on artificial neural networks and particle swarm optimization for solution of nonlinear Troesch's problem.
Neural Comput. Appl., 2017

A Non-Linear Stiffness Model for Serial and Parallel Manipulators.
Int. J. Robotics Appl. Technol., 2017

Economic Evaluation of Solar Cooling Schemes.
Int. J. Energy Optim. Eng., 2017

Numerical method for solving time-fractional multi-dimensional diffusion equations.
Int. J. Comput. Sci. Math., 2017

Crowd Behavior Recognition Using Hybrid Tracking Model and Genetic algorithm Enabled Neural Network.
Int. J. Comput. Intell. Syst., 2017

Profitability of Indian Firms in Foreign Direct Investment.
Int. J. Asian Bus. Inf. Manag., 2017

A Panel Data Analysis for Exploring the New Determinants of Growth in Small and Medium Sized Enterprises in India.
Int. J. Asian Bus. Inf. Manag., 2017

An efficient encryption-then-compression technique for encrypted images using SVD.
Digit. Signal Process., 2017

Role of computational efficiency indices and pose clustering in effective decision making: An example of annulated furanones in Pf-DHFR space.
Comput. Biol. Chem., 2017

VHDL Implementation of NOC Architecture for UART Using Round Robin Arbiter.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

Determination of PSAP and routing of emergency calls in IP multimedia subsystem.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
Reversible data hiding based on prediction error expansion using adjacent pixels.
Secur. Commun. Networks, 2016

Eco-Labeling of Suppliers Using Green Production Techniques with Asymmetric Information.
Int. J. Serv. Sci. Manag. Eng. Technol., 2016

Vocational Education and Training in India.
Int. J. Adult Vocat. Educ. Technol., 2016

The Effect of Product Labeling Policies in Supply Chain under Asymmetric Information.
Int. J. Appl. Logist., 2016

Sub-Supplier's Decision Affect Supply Chain Performance.
Int. J. Appl. Logist., 2016

The Implications of India's Special Characteristics for FDI Spillovers.
Int. J. Asian Bus. Inf. Manag., 2016

An Improved Methodology to Overcome Key Issues in Human Fecal Metagenomic DNA Extraction.
Genom. Proteom. Bioinform., 2016

Bayesian Estimation for Poisson-exponential Model under Progressive Type-II Censoring Data with Binomial Removal and Its Application to Ovarian Cancer Data.
Commun. Stat. Simul. Comput., 2016

Design and Implementation of an Improved Carry Increment Adder.
CoRR, 2016

A multilayer screening approach toward the discovery of novel Pf-DHFR inhibitors.
Comput. Biol. Chem., 2016

Smart Cities: A Secure Data Transmission Model.
ICTCS, 2016

Detection of Microaneurysms and Exudates from Color Fundus Images by using SBGFRLS Algorithm.
Proceedings of the International Conference on Informatics and Analytics, 2016

A Comparative Study and Performance Analysis of Classification Techniques: Support Vector Machine, Neural Networks and Decision Trees.
Proceedings of the Advances in Computing and Data Sciences, 2016

Supporting On-demand Elasticity in Distributed Graph Processing.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

A Local Correlation and Directive Contrast Based Image Fusion.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

Content Aware Image Size Reduction Using Low Energy Maps for Reduced Distortion.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

A Hybrid Method Based CT Image Denoising Using Nonsubsampled Contourlet and Curvelet Transforms.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

2015
An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-ant colony optimisation approach.
Softw. Pract. Exp., 2015

The Mutual Relationship between Innovative Output and R&D Alliances.
Int. J. Technol. Diffusion, 2015

An Unified Analytical Network Process (ANP) and Data Envelopment Analysis (DEA) Approach for Manufacturing Strategy Decision.
Int. J. Strateg. Decis. Sci., 2015

The Behavioural Relationships Between Industrial R&D and University R&D in India.
Int. J. Knowl. Soc. Res., 2015

R&D Spillovers and the Increasing of a Supplier's Research Activities.
Int. J. E Entrepreneurship Innov., 2015

Self-Selection and Learning by Exporting from Indian Manufacturing Firms.
Int. J. Asian Bus. Inf. Manag., 2015

Numerical simulation of second-order hyperbolic telegraph type equations with variable coefficients.
Comput. Phys. Commun., 2015

Numerical method for solving fractional coupled Burgers equations.
Appl. Math. Comput., 2015

CT image denoising based on complex wavelet transform using local adaptive thresholding and Bilateral filtering.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

Performance Analysis of DE over K-Means Proposed Model of Soft Computing.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

Optimization of Feature Selection in Face Recognition System Using Differential Evolution and Genetic Algorithm.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

An Efficient Compression of Encrypted Images Using WDR Coding.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

Edge Preservation Based CT Image Denoising Using Wavelet and Curvelet Transforms.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

SVD-Based Fragile Reversible Data Hiding Using DWT.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

A Novel Approach for Market Prediction Using Differential Evolution and Genetic Algorithm.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

Green logistics optimization model for forward and reverse logistics using genetic algorithm.
Proceedings of the 2015 IEEE International Conference on Industrial Engineering and Engineering Management, 2015

Prediction Error Based Compression of Encrypted Images.
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015

Analysis and Characterization of Edge Coupled Coplanar Waveguide Discontinuities for Filter Applications.
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015

2014
The fuzzy based QMPR selection for OLSR routing protocol.
Wirel. Networks, 2014

Impact of gate material engineering(GME) on analog/RF performance of nanowire Schottky-barrier gate all around (GAA) MOSFET for low power wireless applications: 3D T-CAD simulation.
Microelectron. J., 2014

Fuzzy entropy-based framework for multi-faceted test case classification and selection: an empirical study.
IET Softw., 2014

A composite numerical scheme for the numerical simulation of coupled Burgers' equation.
Comput. Phys. Commun., 2014

A finite element approach for finding positive solutions of a logistic equation with a sign-changing weight function.
Appl. Math. Comput., 2014

Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network.
Proceedings of the 2014 International Conference on Information Technology, 2014

Proper Orthogonal Decomposition technique for sub-optimal control of flexible aircraft wings using discrete actuators.
Proceedings of the American Control Conference, 2014

2013
Buckling analysis of a beam-column using multilayer perceptron neural network technique.
J. Frankl. Inst., 2013

Mathematical modelling and computer simulation of steady state heat conduction in anisotropic multi-layered bodies.
Int. J. Comput. Sci. Math., 2013

DREAM_OLSR PROTOCOL (Distance Routing Effective Algorithm for Mobility - Optimized Link State Routing)
CoRR, 2013

Algorithm and approaches to handle large Data- A Survey.
CoRR, 2013

The Wonderful Toy of 20th Century can be a Disaster in 21st Century: Scenario and Policies Regarding Mobile Waste in India.
CoRR, 2013

Services in Android can Share Your Personal Information in Background.
CoRR, 2013

2012
Application of neural network in integration of shape from shading and stereo.
J. King Saud Univ. Comput. Inf. Sci., 2012

Mathematical Modeling of quintic Duffing equation and numerical simulation using Multiple scales modified Lindstedt-Poincare method.
Int. J. Model. Simul. Sci. Comput., 2012

An initial-value technique to solve third-order reaction-diffusion singularly perturbed boundary-value problems.
Int. J. Comput. Math., 2012

A New Approach of Improving CFA Image for Digital Camera's
CoRR, 2012

Phase plane analysis and traveling wave solution of third order nonlinear singular problems arising in thin film evolution.
Comput. Math. Appl., 2012

Mathematical model and computer simulation of three dimensional thin film elliptic interface problems.
Comput. Math. Appl., 2012

Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card.
Central Eur. J. Comput. Sci., 2012

Numerical simulation of singularly perturbed non-linear elliptic boundary value problems using finite element method.
Appl. Math. Comput., 2012

An Iterative Marching with Correctness Criterion Algorithm for Shape from Shading Under Oblique Light Source.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012

An algorithm for fetal heart rate detection using wavelet transform.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2011
Methods for solving singular perturbation problems arising in science and engineering.
Math. Comput. Model., 2011

Towards Multi-Faceted Test Cases Optimization.
J. Softw. Eng. Appl., 2011

An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks.
Int. J. Netw. Secur., 2011

Impact of the Evolution of Smart Phones in Education Technology and its Application in Technical and Professional Studies: Indian Perspective.
CoRR, 2011

Multilayer perceptrons and radial basis function neural network methods for the solution of differential equations: A survey.
Comput. Math. Appl., 2011

Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

Improving Accuracy of SMS Based FAQ Retrieval System.
Proceedings of the Multilingual Information Access in South Asian Languages, 2011

2010
A New Secure Remote User Authentication Scheme with Smart Cards.
Int. J. Netw. Secur., 2010

An Enhanced Remote User Authentication Scheme with Smart Card.
Int. J. Netw. Secur., 2010

Flaws in Differential Cryptanalysis of Reduced Round PRESENT.
IACR Cryptol. ePrint Arch., 2010

On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP.
IACR Cryptol. ePrint Arch., 2010

Sequential combination of statistics, econometrics and Adaptive Neural-Fuzzy Interface for stock market prediction.
Expert Syst. Appl., 2010

Modified Adomian Decomposition Method and computer implementation for solving singular boundary value problems arising in various physical problems.
Comput. Chem. Eng., 2010

Security Vulnerabilities of a Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP.
Proceedings of the Contemporary Computing - Third International Conference, 2010

Text Detection using Multilayer Separation in Real Scene Images.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme.
IACR Cryptol. ePrint Arch., 2009

A Registration Scheme to Allocate a Unique Identification Number.
IACR Cryptol. ePrint Arch., 2009

On the Security of a Proxy Blind Signature Scheme over Braid Groups.
IACR Cryptol. ePrint Arch., 2009

Linkability of Blind Signature Schemes over Braid Groups.
IACR Cryptol. ePrint Arch., 2009

Security Analysis of a Proxy Signature Scheme over Braid Groups.
IACR Cryptol. ePrint Arch., 2009

Erratum to: "A second order spline finite difference method for singular two-point boundary value problems" [Applied Mathematics and Computation 142 (2003) 283-290].
Appl. Math. Comput., 2009

A collection of computational techniques for solving singular boundary-value problems.
Adv. Eng. Softw., 2009

A boundary value approach for a class of linear singularly perturbed boundary value problems.
Adv. Eng. Softw., 2009

Computational method for finding various solutions for a Quasilinear Elliptic Equation of Kirchhoff type.
Adv. Eng. Softw., 2009

Korean Text Extraction by Local Color Quantization and K-means Clustering in Natural Scene.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

2008
A Secure Remote User Authentication Scheme with Smart Cards.
IACR Cryptol. ePrint Arch., 2008

A survey on various computational techniques for nonlinear elliptic boundary value problems.
Adv. Eng. Softw., 2008

Reconstruction of Polyhedral Objects by Correction of Images and Using Shape from Shading Approach.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2007
Numerical solution of a singularly perturbed three-point boundary value problem.
Int. J. Comput. Math., 2007

A Forward Secure Remote User Authentication Scheme.
IACR Cryptol. ePrint Arch., 2007

Security Analysis of a Remote User Authentication Scheme with Smart Cards
CoRR, 2007

Higher order method for singular boundary-value problems by using spline function.
Appl. Math. Comput., 2007

2006
A uniform mesh finite difference method for a class of singular two-point boundary value problems.
Appl. Math. Comput., 2006

2005
The Modified Scheme is still vulnerable to the parallel Session Attack
CoRR, 2005

An Improved Remote User Authentication Scheme Using Smart Cards
CoRR, 2005

Directed Threshold Multi - Signature Scheme without SDC
CoRR, 2005

Faults and Improvements of an Enhanced Remote User Authentication Scheme Using Smart Cards
CoRR, 2005

A Cryptographic Study of Some Digital Signature Schemes
CoRR, 2005

Negotiation Support in Online Markets, with Competition and Co-Operation.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

2004
Some remarks on a remote user authentication scheme using smart cards with forward secrecy.
IEEE Trans. Consumer Electron., 2004

New remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004

A non-uniform mesh finite difference method and its convergence for a class of singular two-point boundary value problems.
Int. J. Comput. Math., 2004

A framework for eGovernance solutions.
IBM J. Res. Dev., 2004

Online marketing research.
IBM J. Res. Dev., 2004

A Directed Threshold - Signature Scheme
CoRR, 2004

Some Applications of Directed Signature Scheme
CoRR, 2004

A Directed -Threshold Multi-Signature Scheme
CoRR, 2004

A Directed Signature Scheme and its Applications
CoRR, 2004

A Digital Signature with Threshold Generation and Verification
CoRR, 2004

The Password Change Phase is Still Insecure
CoRR, 2004

A fuzzy goal programming approach for vendor selection problem in a supply chain.
Comput. Ind. Eng., 2004

2003
A fourth-order spline finite difference method for singular two-point boundary value problems.
Int. J. Comput. Math., 2003

A difference scheme based on non-uniform mesh for singular two-point boundary value problems.
Appl. Math. Comput., 2003

A difference method for singular two-point boundary value problems.
Appl. Math. Comput., 2003

A second order finite difference method and its convergence for a class of singular two-point boundary value problems.
Appl. Math. Comput., 2003

A new finite difference method for a class of singular two-point boundary value problems.
Appl. Math. Comput., 2003

A second order spline finite difference method for singular two-point boundary value problems.
Appl. Math. Comput., 2003

2002
A platform for business-to-business sell-side, private exchanges and marketplaces.
IBM Syst. J., 2002

A fourth-order finite difference method for a class of singular two-point boundary value problems.
Appl. Math. Comput., 2002

Soft Computing in E-Commerce.
Proceedings of the Advances in Soft Computing, 2002

2000
Analysis and design of backbone architecture alternatives for IP optical networking.
IEEE J. Sel. Areas Commun., 2000

Electronic Multidimensional Auctions and the Role of Information Feedback.
Proceedings of the 8th European Conference on Information Systems, 2000

1998
Video-server designs for supporting very large numbers of concurrent users.
IBM J. Res. Dev., 1998

Internet Auctions.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

1996
A high performance software implementation of MPEG audio encoder.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

1995
Irregular Personalized Communication on Distributed Memory Machines.
J. Parallel Distributed Comput., 1995

1993
The GF11 Parallel Computer.
Parallel Comput., 1993

Personalized Communication Avoiding Node Contention on Distributed Memory Systems.
Proceedings of the 1993 International Conference on Parallel Processing, 1993

1992
Unique design concepts in GF11 and their impact on performance.
IBM J. Res. Dev., 1992

The GF11 parallel computer: Programming and performance.
Future Gener. Comput. Syst., 1992

1990
A wide instruction word architecture for parallel execution of logic programs coded in BSL.
New Gener. Comput., 1990

1989
Trace Driven Simulation for Studying MIMD Parallel Computers.
Proceedings of the International Conference on Parallel Processing, 1989

Preventing Congestion in Multistage Networks in the Presence of Hotspots.
Proceedings of the International Conference on Parallel Processing, 1989

1988
Measuring Parallelism in Computation-Intensive Scientific/Engineering Applications.
IEEE Trans. Computers, 1988

1987
Effect of Storage Allocation/Reclamation Methods on Parallelism and Storage Requirements.
Proceedings of the 14th Annual International Symposium on Computer Architecture. Pittsburgh, 1987

1986
Performance of Unbuffered Shuffle-Exchange Networks.
IEEE Trans. Computers, 1986

The Onset of Hot-Spot Contention.
Proceedings of the International Conference on Parallel Processing, 1986

1985
Switching Strategies in Shuffle-Exchange Packet-Switched Networks.
IEEE Trans. Computers, 1985

1984
Performance enhancement in buffered delta networks using crossbar switches and multiple links.
J. Parallel Distributed Comput., 1984

1983
An Efficient Implementation of Batcher's Odd-Even Merge Algorithm and Its Application in Parallel Sorting Schemes.
IEEE Trans. Computers, 1983

Switching Strategies in a Class of Packet Switching Networks
Proceedings of the 10th Annual Symposium on Computer Architecture, 1983, 1983

Generalized Delta Networks.
Proceedings of the International Conference on Parallel Processing, 1983

1982
Comments on "Interference Analysis of Shuffle/Exchange Networks".
IEEE Trans. Computers, 1982


  Loading...