Ravneet Kaur

According to our database1, Ravneet Kaur authored at least 25 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Low-power multi-cloud deployment of large distributed service applications with response-time constraints.
J. Cloud Comput., 2023

Analysis of Tweets with Emoticons for Sentiment Detection Using Classification Techniques.
Proceedings of the Distributed Computing and Intelligent Technology, 2023

Deep CNN based online image deduplication technique for cloud storage system.
Multim. Tools Appl., 2022

Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing.
Clust. Comput., 2022

An intrinsic authorship verification technique for compromised account detection in social networks.
Soft Comput., 2021

A smart learning assistance tool for inclusive education.
J. Intell. Fuzzy Syst., 2021

A decision support system to define, evaluate and guide the lean assessment and implementation at the shop-floor level.
Int. J. Manuf. Res., 2021

The importance of selecting clustering parameters in VANETs: A survey.
Comput. Sci. Rev., 2021

Pre-processing for Improving the Recognition of Mobile based Gurmukhi Text Recognition System.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Probabilistic data structures for big data analytics: A comprehensive review.
Knowl. Based Syst., 2020

Having Our "Omic" Cake and Eating It Too?: Evaluating User Response to Using Blockchain Technology for Private and Secure Health Data Management and Sharing.
Frontiers Blockchain, 2020

Having our omic cake and eating it too: Evaluating User Response to using Blockchain Technology for Private & Secure Health Data Management and Sharing.
CoRR, 2020

TB-CoAuth: Text based continuous authentication for detecting compromised accounts in social networks.
Appl. Soft Comput., 2020

Resource Allocation and QoS Guarantees for Real World IP Traffic in Integrated XG-PON and IEEE802.11e EDCA Networks.
IEEE Access, 2020

Neo-Bedside Monitoring Device for Integrated Neonatal Intensive Care Unit (iNICU).
IEEE Access, 2019

MetaCom: Profiling Meta Data to Detect Compromised Accounts in Online Social Networks.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Data deduplication techniques for efficient cloud storage management: a systematic review.
J. Supercomput., 2018

Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches.
J. Netw. Comput. Appl., 2018

AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique.
Expert Syst. Appl., 2018

Performance Analysis of Fairness Oriented Dynamic Bandwidth Algorithm in Integrated Fiber-Wireless Architecture Based on XG-PON and Wi-Fi.
Proceedings of the 2018 20th International Conference on Transparent Optical Networks (ICTON), 2018

A comparative analysis of structural graph metrics to identify anomalies in online social networks.
Comput. Electr. Eng., 2017

Automatic Separation of Basal Cell Carcinoma from Benign Lesions in Dermoscopy Images with Border Thresholding Techniques.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 4: VISAPP, Porto, Portugal, February 27, 2017

A review of social network centric anomaly detection techniques.
Int. J. Commun. Networks Distributed Syst., 2016

Effect of Imperfect Debugging on Prediction of Remaining Faults in Software.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

Advances in Intrusion Detection System for WLAN.
Adv. Internet Things, 2011