Displaying 201 - 250 of 277 publications

2015

  1. R Shyam, and Yogendra Narain Singh Identifying Individuals using Multimodal Face Recognition Techniques, Procedia Computer Science, , vol. 48, pp. 666-672, 2015. DOI : https://doi.org/10.1016/j.procs.2015.04.150
  2. Natthan Singh, Manik Chandra Divakar Yadav Formal specification of asynchronous checkpointing using Event-B, 2015 International Conference on Advances in Computer Engineering and Applications, , , pp. 659-664, 2015. DOI : 10.1109/ICACEA.2015.7164773
  3. Girish Chandra, Raghuraj Suryavanshi Divakar Yadav Formal verification of Distributed Checkpointing using Event-B, International Journal of Computer Science and Information Technology, , , pp. 59-73, 2015. DOI : 10.5121/ijcsit.2015.7504
  4. A Pal, A K Gautam and Yogendra Narain Singh Evaluation of Bioelectrical signals for Human Recognition, Procedia Computer Science, , vol. 48, pp. 746-752, 2015. DOI : https://doi.org/10.1016/j.procs.2015.04.211
  5. Arun Kumar Singh, Divakar Yadav Formal specifications and verification of total order broadcast through destination agreement using Event-B, International Journal of Computer Science and Information Technology, , , , 2015.
  6. R Shyam, and Y N Singh Face recognition using augmented local binary pattern and Bray Curtis dissimilarity metric, 2nd International Conference on Signal Processing and Integrated Networks , , vol. 2015, pp. 779-784, 2015. DOI : 10.1109/SPIN.2015.7095267
  7. Mahima Shanker Pandey, Rajitha.B Suneeta Agarwal Computer Assisted Automated Detection of Knee Osteoarthritis using X-ray Images, International Conference on Electrical, Electronics, Engineering Trends, Communication, Optimization and Sciences, , , pp. 74-79, 2015.
  8. Y N Singh, Human Recognition using Fisher's Discriminant Analysis of Heartbeat Interval Features and ECG Morphology, Elsevier, , vol. 167, pp. 322-335, 2015. DOI : https://doi.org/10.1016/j.neucom.2015.04.063
  9. P Bahadur , Divakar Yadav Computer Forensics: Digitized Science, 2015 SAI Intelligent Systems Conference , , , , 2015. DOI : 10.1109/IntelliSys.2015.7361269
  10. R Shyam, and Y N Singh Recognition Individuals from Unconstrained Facial Images, Advances in Intelligent Systems and Computing ,Springer , , vol. 384, pp. 383-392, 2015.
  11. A Agarwal, and Y N Singh Evaluation of Face Recognition Methods in Unconstrained Environments, Procedia Computer Science, , vol. 48, pp. 644-651, 2015. DOI : https://doi.org/10.1016/j.procs.2015.04.147
  12. Pawan Kumar Tiwari, Arun K. Srivastava Zadeh extension principle: A note, Annals of Fuzzy Mathematics and Informatics, , , pp. 37-41, 2015. DOI : http://afmi.or.kr/papers/2015/Vol-09_No-01/Vol._9,_No._1/PDF/AFMI-9-1(37-41)-H-140129R1.pdf Impact Factor : NA
  13. Natthan Singh, Manik Chandra Divakar Yadav Formal Specifications of Asynchronous checkpointing using Event-B, 2015 International Conference on Advances in Computer Engineering and Applications, , , , 2015. DOI : 10.1109/ICACEA.2015.7164773
  14. Manish Gaur and Parul Yadav and Nehan Mumtaz, Distance Based Angular Multicast Routing Protocol for Mobile Ad Hoc Networks (DA-MRP), 2015 Fifth International Conference on Communication Systems and Network Technologies, , , pp. 253-257, 2015. DOI : 10.1109/CSNT.2015.231
  15. Subodh Kumar, Girish Chandra Divakar Yadav Formal Verification of Security Protocol using B Method, 2014 International Conference on Computer and Communication Technology, , , , 2015. DOI : 10.1109/ICCCT.2014.7001486
  16. Manish Gaur and Rama Kant, A Survey on Process Algebraic Stochastic Modelling of Large Distributed Systems for Its Performance Analysis, 2014 3rd International Conference on Eco-friendly Computing and Communication Systems, , , pp. 206-211, 2015. DOI : 10.1109/Eco-friendly.2014.49
  17. Manish Gaur, Simon Gay and Ian Mackie, A routing calculus with flooding updates, Lecture Notes in Computer Science , , , pp. (896)181-186, 2015. DOI : https://doi.org/10.1007/978-3-319-14977-6_12

2014

  1. R Shyam, and Yogendra Narain Singh A taxonomy of 2D and 3D face recognition methods, In Proc. of International Conference on Signal Processing & Integrated Networks, SPIN 2014, , vol. 2014, pp. 749-754, 2014. DOI : 10.1109/SPIN.2014.6777054.
  2. Singh, A.K, Divakar Yadav V K Singh Modeling of DSDV Routing Protocol for Ad Hoc networks Using Event-B, International Journal of Computer Engineering & Technology, , , pp. 108-116 , 2014.
  3. Y N Singh, Individual Identification Using Linear Projection of Heartbeat Features, Applied Computational Intelligence and Soft Computing, , vol. 2014, pp. 1-14, 2014. DOI : https://doi.org/10.1155/2014/602813
  4. R Shyam, and Yogendra Narain Singh Evaluation of Eigenfaces and Fisherfaces using Bray Curtis dissimilarity metric, in Proc. of 9th International Conference on Industrial and Information Systems ICIIS-2014, , vol. 2014, pp. 1-6, 2014. DOI : 10.1109/ICIINFS.2014.7036600.
  5. Dr. V.S. Dhaka, Aditi Sharma Design and implementation of Information Retrieval Using Ontology, Global U.S.A, , vol. 142, , 2014.
  6. Dr. V S Dhaka, Aditi Sharma Performance evaluation of ontology based Information Retrieval, International Journal of All Research Education and Scientific Methods , , vol. 24, , 2014. Impact Factor : 7.429
  7. Pawan Kumar Tiwari, D P Vidyarthi Observing the effect of interprocess communication in auto controlled ant colony optimization‐based scheduling on computational grid, Concurrency and Computation Practice and Experience, , , pp. 241-270, 2014. DOI : https://doi.org/10.1002/cpe.3133 Impact Factor : 1.5
  8. Yogendra Narain Singh, Biometrics: Seek to Eliminate Computer Passwords, in Proc. of 9th International Conference on Industrial and Information Systems ICIIS-2014, , vol. 2014, pp. 1-6, 2014.

2013

  1. Manish Gaur and S. Arun Kumar, On efficiency preorders (Revised and Edited), Lecture Notes in Computer Science , , , pp. vol 8161, 83-94, 2013. DOI : https://doi.org/10.1007/978-3-642-40213-5
  2. Manish Gaur and S. Arun Kumar, On efficiency preorders (Pre-proceedings), 5th IPM International Conference on Fundamentals of Software Engineering FSEN 2013, , , pp. 84-95, 2013.
  3. Sanjay Kumar, Gurmit Singh Divakar Yadav Analysis of Database Replication Algorithm in Local and Global Networks, International Journal of Computer Applications, , , , 2013.
  4. Yogendra Narain Singh, Discriminant Analysis for Identifying Individuals of Electrocardiogram, In: Maji, P., Ghosh, A., Murty, M.N., Ghosh, K., Pal, S.K. eds Pattern Recognition and Machine Intelligence. PReMI 2013. Lecture Notes in Computer Science, vol 8251, , vol. 8251, pp. 94-99, 2013. DOI : https://doi.org/10.1007/978-3-642-45062-4_12
  5. Sanjay Kumar, Gurmit Singh Divakar Yadav Throughput and Delay Analysis of Database Replication Algorithms, International Journal of Modern Education and Computer Science , , , pp. 47-53, 2013. DOI : 10.5815/ijmecs.2013.12.07
  6. Yogendra Narain Singh, and S K Singh Identifying Individuals Using Eigenbeat Features of Electrocardiogram, Journal of Engineering, , vol. 2013, pp. 1-8, 2013. DOI : https://doi.org/10.1155/2013/539284
  7. Sanjay Kumar, Gurmit Singh Divakar Yadav Mathematical Framework for a Novel Database Replication Algorithm, International Journal of Modern Education and Computer Science , , , pp. 1-10, 2013. DOI : 10.5815/ijmecs.2013.09.01
  8. Yogendra Narain Singh, and S K Singh A taxonomy of biometric system vulnerabilities and defences, International Journal of Biometrics, , vol. 2013, pp. 137-159, 2013. DOI : https://doi.org/10.1504/IJBM.2013.052964
  9. N Phulmare, P Chakravorty Divakar Yadav Understanding and Estimation of Emotional Expression using acoustic analysis of natural speech, International Journal on Natural Language Computing , , , pp. 37-46, 2013. DOI : 10.5121/ijnlc.2013.2503
  10. Yogendra Narain Singh, and S K Singh Persons Recognition Using Heartbeat Features and Maximum a Posteriori Decision Rule, ISBA International Workshop/Conference on Bayesian Theory and Applications IWCBTA, , vol. 2013, pp. 1-10, 2013.

2012

  1. Manish Gaur and Rama Kant, Article: DRwp F : A Fault Tolerant Distributed Routing Calculi, International Journal of Computer Applications , , , pp. 40(7):1-7, 2012. DOI : 10.5120/4973-7239
  2. Girish Chandra, Divakar Yadav

    Analyzing Data Flow in Trustworthy Electronic Payment Systems Using Event-B

    , Data Engineering and Management, , , pp. 325-332, 2012.
  3. Raghuraj Suryavanshi, Divakar Yadav Formal Development of Byzantine Immune Total Order Broadcast System Using Event-B, Data Engineering and Management , , , pp. 317-324, 2012.
  4. Aditi sharma, Personalised information access based on ontology and collaborative filtering, International Journal of Engineering Research and Technology, , 1, pp. 1-8, 2012.
  5. Aditi sharma, Design and implementation of Personalised Information Retrieval Using User Profile and Ontology, International Journal of Scientific and Engineering Research, , vol. 3, pp. 1-6, 2012.
  6. Raghuraj Suryavanshi, Divakar Yadav Rigorous Design of Lazy Replication System Using Event-B, Contemporary Computing, , , pp. 407-418, 2012.
  7. Yogendra Narain Singh, and S K Singh Human Identification Using Heartbeat Interval Features and ECG Morphology, In: Bansal, J., Singh, P., Deep, K., Pant, M., Nagar, A. eds Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications BIC-TA 2012, , vol. 201, pp. 87-98, 2012. DOI : https://doi.org/10.1007/978-81-322-1038-2_8
  8. Yogendra Narain Singh, S K Singh and Phalguni Gupta Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system, Pattern Recognition Letters, , vol. 3314, pp. 1932-1941, 2012. DOI : https://doi.org/10.1016/j.patrec.2012.03.010
  9. Yogendra Narain Singh, and S K Singh Challenges of Biometrics: Evaluation of System Attacks and Defences, Journal of Information Assurance & Security, , vol. 74, pp. 207-221, 2012.
  10. Pawan Kumar Tiwari, D P Vidyarthi Evolutionary Computation and Its Applications: A Survey, Information Engineering Letters, , , pp. 1-10, 2012. Impact Factor : NA
  11. Yogendra Narain Singh, S K Singh and A K Ray Bioelectrical Signals as Emerging Biometrics: Issues and Challenges, ISRN Signal Processing, , vol. 2012, pp. 1-6, 2012. DOI : doi:10.5402/2012/712032
  12. Yogendra Narain Singh, and S K Singh Evaluation of Electrocardiogram for Biometric Authentication, Journal of Information Security, , vol. 31, pp. 39-48, 2012. DOI : 10.4236/jis.2012.31005
  13. Girish Chandra, Divakar Yadav

    Verification of Money Atomicity in Digital Cash Based Payment System

    , Information Systems Security, , , pp. 249-264, 2012.

2011

  1. Manish Gaur, Formal methods in adoption of industrial automation, In Proceedings of the Seminar on Challenges in Adoption of Industrial Automation in Indian Perspective, , , , 2011.
  2. Yogendra Narain Singh, and S K Singh The State of Information Security, In: Proc. National Conference on Artificial Intelligence and Agents: Theory and Applications AIATA-2011, , vol. 2011, pp. 1-10, 2011.