Raman Kumar

Orcid: 0000-0002-5040-7920

According to our database1, Raman Kumar authored at least 31 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Numerical solutions for Biharmonic interface problems via weak Galerkin finite element methods.
Appl. Math. Comput., April, 2024

Correction: Prediction of Alzheimer's Using Random Forest with Radiomic Features.
Comput. Syst. Sci. Eng., 2024

2023
Driving behavior analysis and classification by vehicle OBD data using machine learning.
J. Supercomput., November, 2023

Optimal A Priori Error Estimates for Elliptic Interface Problems: Weak Galerkin Mixed Finite Element Approximations.
J. Sci. Comput., November, 2023

High-order weak Galerkin scheme for H(div)-elliptic interface problems.
J. Comput. Appl. Math., November, 2023

Weak Galerkin finite element methods for H(curl;Ω) and H(curl,div;Ω)-elliptic problems.
Comput. Math. Appl., October, 2023

A weak Galerkin finite-element method for singularly perturbed convection-diffusion-reaction problems with interface.
Comput. Appl. Math., October, 2023

DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication.
Int. J. Image Graph., July, 2023

Simulative Analysis and Performance Evaluation for Data Variety Aware Power Optimization Technique Using Big Data.
Wirel. Pers. Commun., 2023

Structural modeling and analysis of fuel cell: a graph-theoretic approach.
PeerJ Comput. Sci., 2023

Structural modeling and analysis of fuel cell: a graph-theoretic approach.
PeerJ Comput. Sci., 2023

Artificial neural network based character recognition using SciLab.
Multim. Tools Appl., 2023

Prediction of Alzheimer's Using Random Forest with Radiomic Features.
Comput. Syst. Sci. Eng., 2023

2022
A New Joint Strategy for Multi-Criteria Decision-Making: A Case Study for Prioritizing Solid-State Drive.
Int. J. Comput. Commun. Control, December, 2022

Exploring the Application Sphere of the Internet of Things in Industry 4.0: A Review, Bibliometric and Content Analysis.
Sensors, 2022

Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm.
Sensors, 2022

A hybrid feature extraction technique for content based medical image retrieval using segmentation and clustering techniques.
Multim. Tools Appl., 2022

2021
High-utility and diverse itemset mining.
Appl. Intell., 2021

2020
Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography.
Wirel. Pers. Commun., 2020

2019
Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future.
Proceedings of the Recent Advances in Computational Intelligence, 2019

Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage.
Proceedings of the Recent Advances in Computational Intelligence, 2019

A Gamification Framework for Redesigning the Learning Environment.
Proceedings of the Recent Advances in Computational Intelligence, 2019

Review on Current Trends of Deep Learning.
Proceedings of the Recent Advances in Computational Intelligence, 2019

Enhancing Gadgets for Blinds Through Scale Invariant Feature Transform.
Proceedings of the Recent Advances in Computational Intelligence, 2019

Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach.
Proceedings of the Recent Advances in Computational Intelligence, 2019

A Variant of Secret Sharing Protected with Poly-1305.
Proceedings of the Recent Advances in Computational Intelligence, 2019

2016
Effect of Randomization for Privacy Preservation on Classification Tasks.
Proceedings of the International Conference on Informatics and Analytics, 2016

2015
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers.
Wirel. Pers. Commun., 2015

2013
Measuring the Utilization Index of Advanced Manufacturing Technologies: A Case Study.
Proceedings of the 7th IFAC Conference on Manufacturing Modelling, Management, and Control, 2013

2009
Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack
CoRR, 2009

2008
Comparison of Threshold Proxy Signature Schemes.
Proceedings of the 2008 International Conference on Security & Management, 2008


  Loading...