Navdeep Kaur

Orcid: 0000-0003-4583-1687

According to our database1, Navdeep Kaur authored at least 57 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Ti-FCNet: Triple fused convolutional neural network-based automated skin lesion classification.
Multim. Tools Appl., March, 2024

2023
Radiological Report Generation from Chest X-ray Images Using Pre-trained Word Embeddings.
Wirel. Pers. Commun., December, 2023

Node localization and data aggregation scheme using cuckoo search and neural network.
Expert Syst. J. Knowl. Eng., May, 2023

Modelling of Speech Parameters of Punjabi by Pre-trained Deep Neural Network Using Stacked Denoising Autoencoders.
ACM Trans. Asian Low Resour. Lang. Inf. Process., March, 2023

HC-WSN: a Hibernated Clustering based framework for improving energy efficiency of wireless sensor networks.
Multim. Tools Appl., 2023

CheXPrune: sparse chest X-ray report generation model using multi-attention and one-shot global pruning.
J. Ambient Intell. Humaniz. Comput., 2023

Ensembling Textual and Structure-Based Models for Knowledge Graph Completion.
CoRR, 2023

NeuSTIP: A Novel Neuro-Symbolic Model for Link and Time Prediction in Temporal Knowledge Graphs.
CoRR, 2023

Conventional and contemporary approaches used in text to speech synthesis: a review.
Artif. Intell. Rev., 2023

NeuSTIP: A Neuro-Symbolic Model for Link and Time Prediction in Temporal Knowledge Graphs.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Simple Augmentations of Logical Rules for Neuro-Symbolic Knowledge Graph Completion.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2023

2022
Analysis of Melanoma Cancer Detection Techniques.
SN Comput. Sci., 2022

Speech waveform reconstruction from speech parameters for an effective text to speech synthesis system using minimum phase harmonic sinusoidal model for Punjabi.
Multim. Tools Appl., 2022

Methods for automatic generation of radiological reports of chest radiographs: a comprehensive survey.
Multim. Tools Appl., 2022

RadioBERT: A deep learning-based system for medical report generation from chest X-ray images using contextual embeddings.
J. Biomed. Informatics, 2022

Analytical Review of Biometric Technology Employing Vivid Modalities.
Int. J. Image Graph., 2022

CADxReport: Chest x-ray report generation using co-attention mechanism and reinforcement learning.
Comput. Biol. Medicine, 2022

2021
SEEDRP: a Secure Energy Efficient Dynamic Routing Protocol in Fanets.
Wirel. Pers. Commun., 2021

An extended mechanism to prevent distributed denial of service attack in DV-Hop localisation algorithm in wireless sensor networks.
Int. J. Internet Protoc. Technol., 2021

SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2021

An Energy-Efficient Hybrid Scheduling Algorithm for Task Scheduling in the Cloud Computing Environments.
IEEE Access, 2021

2020
On Effects of Frequency Offset on Simulink Model of OFDM.
Wirel. Pers. Commun., 2020

Non-parametric learning of lifted Restricted Boltzmann Machines.
Int. J. Approx. Reason., 2020

A practical approach to energy consumption in wireless sensor networks.
Int. J. Adv. Intell. Paradigms, 2020

Knowledge Graph Alignment using String Edit Distance.
CoRR, 2020

A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics.
IEEE Access, 2020

Optimal Integration of DG for Improvement of Economy and Voltage in Distribution Network.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

2019
Comparative Analysis of ICI Self Cancellation Techniques for Wavelet OFDM Under Different Channels in Simulink.
Wirel. Pers. Commun., 2019

Software effort estimation using FAHP and weighted kernel LSSVM machine.
Soft Comput., 2019

Mitigation of SQL injection vulnerability during development of web applications.
Int. J. Web Sci., 2019

Impact of photonovel interventions among people with low levels of health literacy: A literature review.
Educ. Inf., 2019

Towards a comprehensive Questionnaire Origin and Development Appraisal tool: A literature review and a modified nominal group.
Educ. Inf., 2019

Neural Networks for Relational Data.
Proceedings of the Inductive Logic Programming - 29th International Conference, 2019

Segmentation of Punjabi Text into Prosodic Unit.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

2017
Research patterns and trends in software effort estimation.
Inf. Softw. Technol., 2017

Relational Restricted Boltzmann Machines: A Probabilistic Logic Learning Approach.
Proceedings of the Inductive Logic Programming - 27th International Conference, 2017

2016
Delving into the Security Issues of Mobile Cloud Computing.
CoRR, 2016

2015
Improved neural approach in maximising reliability for increasing networks.
Int. J. Comput. Sci. Eng., 2015

2014
Mitigation of SQL Injection Attacks using Threat Modeling.
ACM SIGSOFT Softw. Eng. Notes, 2014

Analysis of Data Mining Techniques for Software Effort Estimation.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Secret communication in colored images using saliency map as model.
Proceedings of the 2014 IEEE Applied Imagery Pattern Recognition Workshop, 2014

2013
Improved Approach for Maximizing Reliability in Fault Tolerant Networks.
J. Adv. Comput. Intell. Intell. Informatics, 2013

Steganography in coloured images using wavelet domain-based saliency map.
Int. J. Inf. Comput. Secur., 2013

Soft computing techniques for software effort estimation.
CoRR, 2013

Multi criteria decision making approach for selecting effort estimation model.
CoRR, 2013

Achieving maximum reliability in fault tolerant network design for variable networks.
Appl. Soft Comput., 2013

A Comparative Analysis of Various Deployment Based DDoS Defense Schemes.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

2009
Concurrency Control for Multilevel Secure Databases.
Int. J. Netw. Secur., 2009

Biogeography based Satellite Image Classification
CoRR, 2009

Distributed Energy Efficient Key Distribution for Dense Wireless Sensor Networks.
Proceedings of the First International Conference on Computational Intelligence, 2009

2007
Non-Linear Behaviour Compensation and Optimal Control of SCR using Fuzzy Logic Controller Assisted by Genetic Algorithm: A Case Study.
Proceedings of the World Congress on Engineering, 2007

Secure Transaction Management Protocols for MLS/DDBMS.
Proceedings of the Information Systems Security, Third International Conference, 2007

2006
Secure Itineraries Framework for Mobile Agent Systems.
Proceedings of the Information Systems Security, Second International Conference, 2006

Fairness Strategy for Multilevel Secure Concurrency Control Protocol.
Proceedings of the Information Systems Security, Second International Conference, 2006

A Secure Concurrency Control for MLS/DDBSs.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

2005
Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems.
Proceedings of the ICEIS 2005, 2005


  Loading...