Rahul Kumar

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.


An Improved Multifactor User Authentication Scheme for Wireless Sensor Networks.
Wirel. Pers. Commun., 2022

Blood vessel segmentation in retinal fundus images for proliferative diabetic retinopathy screening using deep learning.
Vis. Comput., 2022

RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure.
Sensors, 2022

Computational investigation reveals that the mutant strains of SARS-CoV2 have differential structural and binding properties.
Comput. Methods Programs Biomed., 2022

Graph Multi-Head Convolution for Spatio-Temporal Attention in Origin Destination Tensor Prediction.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

On the Performance of Cooperative Spectrum Sensing Under Binary Erasure Reporting Channels.
Proceedings of the 27th National Conference on Communications, 2022

Many Hands Make Light Work: Using Essay Traits to Automatically Score Essays.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

Deep Recurrent Neural Networks for OYO Hotels Recommendation.
Proceedings of the Artificial Intelligence Applications and Innovations, 2022

Channel Coding for Cooperative Spectrum Sensing Under Imperfect Reporting Channels.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Performance of energy detector based spectrum sensing over millimetre band communication channel with diversity reception.
Wirel. Networks, 2021

Multi-objective Cuckoo Search-based Streaming Feature Selection for Multi-label Dataset.
ACM Trans. Knowl. Discov. Data, 2021

Managing Business in the Digital Era - The use of IT and Analytics for Process Transformation.
J. Decis. Syst., 2021

Attention based multi-agent intrusion detection systems using reinforcement learning.
J. Inf. Secur. Appl., 2021

Implementation of convolutional neural network categorizers in coronary ischemia detection.
Int. J. Imaging Syst. Technol., 2021

Reliability Analysis of Circular Footing by Using GP and MPMR.
Int. J. Appl. Metaheuristic Comput., 2021

Determination of reliability index of cantilever retaining wall by RVM, MPMR and MARS.
Int. J. Adv. Intell. Paradigms, 2021

On some <i>q</i>-series identities related to a generalized divisor function and their implications.
Discret. Math., 2021

An approximate factorization approach to multi-jammer location and range estimation from peer-to-peer connectivity measurements.
Comput. Networks, 2021

On-Device System for Device Directed Speech Detection for Improving Human Computer Interaction.
IEEE Access, 2021

Design, Modeling and Analysis of Cu-Carbon Hybrid Interconnects.
IEEE Access, 2021

Analysis of Parasitics on CMOS based Memristor Crossbar Array for Neuromorphic Systems.
Proceedings of the 64th IEEE International Midwest Symposium on Circuits and Systems, 2021

Reducing False Prediction On COVID-19 Detection Using Deep Learning.
Proceedings of the 64th IEEE International Midwest Symposium on Circuits and Systems, 2021

ECC-Based Three-Factor Authentication Scheme For Multi-Server Environment.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021

Dynamic Modeling of COVID-19 Disease with Impact of Lockdown in Pakistan & Malaysia.
Proceedings of the IEEE International Conference on Signal and Image Processing Applications, 2021

Modeling, Controlling & Stabilization of An Underactuated Air-Cushion Vehicle (ACV).
Proceedings of the IEEE International Conference on Signal and Image Processing Applications, 2021

A Multi-task Learning Scheme for Motor Imagery Signal Classification.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

COrRect: Connection-Oriented Resource Matching for Vehicular Clouds.
Proceedings of the ICC 2021, 2021

An Automated Framework for Migrating Java Applications to Ethereum Solidity Applications.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

iConDet: An Intelligent Portable Healthcare App for the Detection of Conjunctivitis.
AII, 2021

Mutual Coupling Reduction of Microstrip MIMO Antenna Using Microstrip Resonator.
Wirel. Pers. Commun., 2020

Design, Modeling, and Experimental Verification of a Hall-Effect-Based Linear Instrumentation System for Through-Shaft Angle Sensing.
IEEE Trans. Instrum. Meas., 2020

A context-aware robust intrusion detection system: a reinforcement learning-based approach.
Int. J. Inf. Sec., 2020

Wireless information and power transfer using single and multiple path relays.
Int. J. Commun. Syst., 2020

Robotic Motion Planning using Learned Critical Sources and Local Sampling.
CoRR, 2020

The generalized modified Bessel function and its connection with Voigt line profile and Humbert functions.
Adv. Appl. Math., 2020

Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep Reinforcement Learning.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

ROM integrated vibration control of stochastically parametered flexible structures.
Proceedings of the 59th Annual Conference of the Society of Instrument and Control Engineers of Japan, 2020

On-Device detection of sentence completion for voice assistants with low-memory footprint.
Proceedings of the 17th International Conference on Natural Language Processing, 2020

Power Efficient Smart Home with Voice Assistant.
Proceedings of the 11th International Conference on Computing, 2020

Machine Learning based Malware Detection in Cloud Environment using Clustering Approach.
Proceedings of the 11th International Conference on Computing, 2020

Dynamic User Interface Composition.
Proceedings of the Computer Vision and Image Processing - 5th International Conference, 2020

Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

Heuristic and Statistical Power Estimation Model for FPGA Based Wireless Systems.
Wirel. Pers. Commun., 2019

Mathematical modelling for reducing the sensing of redundant information in WSNs based on biologically inspired techniques.
J. Intell. Fuzzy Syst., 2019

Modelling and performance analysis of energy detector-based spectrum sensing with maximum ratio combining over Nakagami-m/log-normal fading channels.
Int. J. Commun. Networks Distributed Syst., 2019

CLB: a multilevel co-operative load balancing algorithm for C-RAN architecture.
Digit. Commun. Networks, 2019

Sentence Similarity Techniques for Short vs Variable Length Text using Word Embeddings.
Computación y Sistemas, 2019

LEGO: Leveraging Experience in Roadmap Generation for Sampling-Based Planning.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

Visualization of Process Model through Process Mining.
Proceedings of the 10th International Conference on Computing, 2019

A Hall Effect Based Through Shaft Angle Sensor - Analysis and Signal Conditioning.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

Smart Grid Energy Management Using RNN-LSTM: A Deep Learning-Based Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Towards Re-Conceptualizing DSS: a Text Mining based Approach.
Proceedings of the 27th European Conference on Information Systems, 2019

A Novel Machine Learning Based Malware Detection and Classification Framework.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Online feature selection for multi-label classification in multi-objective optimization framework.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors.
Telecommun. Syst., 2018

Bus Operations Scheduling Subject to Resource Constraints Using Evolutionary Optimization.
Informatics, 2018

A real time packet classification and allocation approach for C-RAN implementation in 5G network.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

SC-RAN: An Energy-Efficient Solution Toward C-IoT Implementation.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

High Sensitivity Refractometer Based on Reflective Smf-Small Diameter No Core Fiber Structure.
Sensors, 2017

Malware Detection Approach for Android systems Using System Call Logs.
CoRR, 2017

Balancing different fitness levels in competitive exergames based on heart rate and performance.
Proceedings of the 29th Australian Conference on Computer-Human Interaction, 2017

Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities".
Proceedings of the Mathematics and Computing - Third International Conference, 2017

Bird Region Detection in Images with Multi-scale HOG Features and SVM Scoring.
Proceedings of 2nd International Conference on Computer Vision & Image Processing, 2017

Optimal Placement of Centralized BBU (C-BBU) for Fronthaul and Backhaul Optimization in Cloud-RAN Network.
Proceedings of the 2017 International Conference on Information Technology, 2017

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2016

BER analysis over alpha-mu fading channel using proposed novel MGF.
Int. J. Wirel. Mob. Comput., 2016

Ashwin: Plug-and-Play System for Machine-Human Image Annotation.
CoRR, 2016

Low Cost Autonomous Navigation and Control of a Mechanically Balanced Bicycle with Dual Locomotion Mode.
CoRR, 2016

A 60 dB Bulk-Driven Rail-to-Rail Input/Output OTA.
Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems, 2016

On Employing a Highly Mismatched Crowd for Speech Transcription.
Proceedings of the Interspeech 2016, 2016

Blending immersive gameplay with intense exercise using asynchronous exergaming.
Proceedings of the 5th International Workshop on Games and Software Engineering, 2016

An efficient method for contrast enhancement of real world hyper spectral images.
Int. Arab J. Inf. Technol., 2015

ITMS (Intelligent Traffic Management System).
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

Multi-label Learning for Activity Recognition.
Proceedings of the 2015 International Conference on Intelligent Environments, 2015

Ill-formed Sentence Identification And Entity Extraction In Clinical Notes.
Proceedings of the AMIA 2015, 2015

Dell's Channel Transformation: Leveraging Operations Research to Unleash Potential Across the Value Chain.
Interfaces, 2014

Metamorphosis of Fuzzy Regular Expressions to Fuzzy Automata using the Follow Automata.
CoRR, 2014

Optimisation of Mechanical Properties of Wood Dust-reinforced Epoxy Composite Using Grey Relational Analysis.
Proceedings of Fourth International Conference on Soft Computing for Problem Solving, 2014

Implementation of an Adaptive Traffic-aware Firewall.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookies.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

MUX: algorithm selection for software model checkers.
Proceedings of the 11th Working Conference on Mining Software Repositories, 2014

Analytical Model for Inverter Design Using Floating Gate Graphene Field Effect Transistors.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

Notes on "a password-based remote user authentication scheme without smart card".
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Automation of detection of security vulnerabilities in web services using dynamic analysis.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

The economics of static analysis tools.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

An Improved Method for Contrast Enhancement of Real World Hyperspectral Images.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

Effects of Inoculation Based on Structural Centrality on Rumor Dynamics in Social Networks.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'.
J. Medical Syst., 2012

CPPsite: a curated database of cell penetrating peptides.
Database J. Biol. Databases Curation, 2012

Rumor Dynamics with Acceptability Factor and Inoculation of Nodes in Scale Free Networks.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

SLAM2: Static driver verification with under 4% false alarms.
Proceedings of 10th International Conference on Formal Methods in Computer-Aided Design, 2010

The Static Driver Verifier Research Platform.
Proceedings of the Computer Aided Verification, 22nd International Conference, 2010

Discovering Business Process Model from Unstructured Activity Logs.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

Travelled roads.
Educ. Inf. Technol., 2008

Lock-Free Asynchronous Rendezvous Design for MPI Point-to-Point Communication.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2008

Scaling alltoall collective on multi-core systems.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Can software reliability outperform hardware reliability on high performance interconnects?: a case study with MPI over infiniband.
Proceedings of the 22nd Annual International Conference on Supercomputing, 2008

MPI Collectives on Modern Multicore Clusters: Performance Optimizations and Communication Characteristics.
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

One-sided finite-difference approximations suitable for use with Richardson extrapolation.
J. Comput. Phys., 2006

Informatics Curricula and Teaching Methods.
Educ. Inf. Technol., 2006

A Divisive Information-Theoretic Feature Clustering Algorithm for Text Classification.
J. Mach. Learn. Res., 2003

Cyberkids: Children in the Information Age, Sarah L. Holloway and Gill Valentine.
Educ. Inf. Technol., 2003

Book Review.
Educ. Inf. Technol., 2003

Divide-and-Conquer IDDQ Testing for Core-Based System Chips.
Proceedings of the ASPDAC 2002 / VLSI Design 2002, 2002

Leakage Power Estimation for Deep Submicron Circuits in an ASIC Design Environment.
Proceedings of the ASPDAC 2002 / VLSI Design 2002, 2002

Enhanced word clustering for hierarchical text classification.
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002