Displaying 101 - 150 of 216 publications

2019

  1. A Singh, R Srivastava and Y N Singh Prevention of Payment Card Frauds using Biometrics, International Journal of Recent Technology and Engineering, , vol. 83S, pp. 516 - 525, 2019.
  2. A Pal, and Y N Singh Biometric Recognition using Area under Curve Analysis of Electrocardiogram, International Journal of Advanced Computer Science and Applications, , vol. 101, pp. 533 - 545, 2019.
  3. R Srivastava, and Y N Singh ECG analysis for human recognition using non-fiducial methods, IET Biometrics, , vol. 85, pp. 295-305, 2019.

2018

  1. Singh, N., Pant, M. Goel, A ANN embedded data envelopment analysis approach for measuring the efficiency of state boards in India, International Journal of System Assurance Engineering and Management, Springer, , , , 2018. DOI : https://doi.org/10.1007/s13198-018-0743-8
  2. Johari, N., Singh, N. Bone Fracture Detection Using Edge Detection Technique., Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, Springer, Singapore, , , pp. 11-19, 2018. DOI : https://doi.org/10.1007/978-981-10-5699-4_2
  3. Singh, N., Goyal, S. Determination and Segmentation of Brain Tumor Using Threshold Segmentation with Morphological Operations, Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, Springer, Singapore, , , pp. 715-726, 2018. DOI : https://doi.org/10.1007/978-981-10-5699-4_68
  4. Singh, N., Pant, M. Evaluating the efficiency of higher secondary education state boards in India: a DEA-ANN approach, Intelligent Systems Design and Applications. ISDA 2017. Advances in Intelligent Systems and Computing, Springer, Cham, , , pp. 942-951, 2018. DOI : https://doi.org/10.1007/978-3-319-76348-4_90
  5. Manish Gaur and Parul Yadav, Process calculi for intrusion detection system in mobile ad-hoc networks, JCM Journal of Communications, , , pp. 13(635-647), 2018. DOI : 10.12720/jcm.13.11.635-647
  6. Manish Gaur and Parul Yadav, A Behavioural Theory for Intrusion Detection System in Mobile Ad-Hoc Networks, Proceedings of 2nd the International Conference on High Performance Compilation, Computing and Communications, , , pp. 51–60, 2018. DOI : 10.1145/3195612.3195617
  7. Manish Gaur and Priyanka Gupta, A Routing Calculus with Distance Vector Routing Updates, International Journal of Advanced Computer Science and Applications, , , pp. Vol 9(10) 554-564, 2018. DOI : 10.14569/IJACSA.2018.091067
  8. Eram Fatima, Mohd Ashfaq Afrah Nazir Muneeb Hasan Khan; M. Sarosh Umar A Shoulder Surfing Resistant Technique for Login on Mobile Devices, 4th International Conference on Computing Communication and Automation , , , pp. 1-4, 2018. DOI : 10.1109/CCAA.2018.8777590
  9. Alok Misra, Improved Cluster Head Determination in Heterogeneous Wireless Network, International Journal of Applied Engineering Research ISSN 0973-4562, , , pp. 5418-5422, 2018.
  10. A Misra, Divakar Yadav Improved Cluster Head Determination in Heterogeneous Wireless Network, International Journal of Applied Engineering Research , , , pp. 5418-5422 , 2018.
  11. R Srivastava, and Y N Singh Identifying Individuals using Fourier and Discriminant Analysis of Electrocardiogram, International Conference on Mathematics and Computing India, , vol. 834, pp. 286-295, 2018. DOI : https://doi.org/10.1007/978-981-13-0023-3_27
  12. A Pal, and Y N Singh ECG Biometric Recognition, 4th International Conference on Mathematics and Computing , India, , vol. 834, pp. 61-71, 2018. DOI : https://doi.org/10.1007/978-981-13-0023-3_7
  13. R Srivastava, and Y N Singh ECG Biometric Analysis using Walsh Hadamard Transform, Advances in Data and Information Sciences, Lecture Notes in Networks and Systems, , vol. 38, pp. 201-210, 2018. DOI : https://doi.org/10.1007/978-981-10-8360-0_19

2017

  1. Mahima Shanker Pandey, Sudhir Singh Soam Surya Prakash Tripathi A Framework for Mathematical Methods in Medical Image Processing, International Journal of Innovations & Advancement in Computer Science, , , pp. 375-379, 2017. Impact Factor : 3.14
  2. A. Kishor, Manik Chandra P K Singh An astute artificial bee colony algorithm, Proceedings of Sixth International Conference on Soft Computing for Problem Solving, , , pp. 153-162, 2017.
  3. Heeralal , Divakar Yadav ICT in Governance; Study of ICT Projects in governance in India, International Journal of Academic Research and Development, , , , 2017.
  4. A Agarwal, and Y N Singh An Efficient Approach for Face Recognition in Unconstrained Environment, Multimedia Tools and Applications, , vol. 763, pp. 3751 - 3760, 2017.
  5. R Srivastava , and Y N Singh Human Recognition Using Discrete Cosine Transform and Discriminant Analysis of ECG, IEEE Proc. of 2017 Fourth International Conference on Image Information Processing, , vol. 2, pp. 1-5, 2017. DOI : 10.1109/ICIIP.2017.8313742

2016

  1. Pawan Kumar Tiwari, D P Vidyarthi Improved auto control ant colony optimization using lazy ant approach for grid scheduling problem, Future Generation Computer Systems, , , pp. 78-89, 2016. DOI : https://www.sciencedirect.com/science/article/abs/pii/S0167739X16300012 Impact Factor : 7.307
  2. Deepa Verma, A Novel of Data Warehousing Queries in split Execution Environment(SEE) for Efficient Operation, International journal of computer science & wireless security, , , pp. 219-224, 2016. Impact Factor : 3.4
  3. Manik Chandra, A. Kishor R. Niyogi Web service selection with global constraints using modified gray wolf optimizer, International Conference on Advances in Computing, Communications and Informatics, , , , 2016.
  4. Manik Chandra, R. Niyogi Web services based path guidance to rescue team alert system during flood, In Ninth International Conference on Contemporary Computing , , , pp. 1-6, 2016.
  5. Sanjay Kumar, Gurmit Singh Divakar Yadav Analysis of a Database Replication Algorithm under load sharing in network, Journal of Engineering Science and Technology, , , , 2016.
  6. Sunil Kumar, Akash Divakar Singh Yadav Analysis of lane detection techniques using open CV, 2015 Annual IEEE India Conference , , , , 2016. DOI : 10.1109/INDICON.2015.7443166
  7. R Shyam, and Y N Singh Multialgorithmic Frameworks for Human Face Recognition, Journal of Electrical and Computer Engineering, Hindawi, , vol. 2016, pp. 1-9, 2016. DOI : https://doi.org/10.1155/2016/4645971
  8. Sakshi Srivastava, Urvashi Rahul Saxena Efficient Sound Source Localization based on Estimation using Time Difference of Arrival (for Blind)., ugc, , vol. 34, , 2016.
  9. Sakshi K Srivastava, Urvashi Rahul Saxena Proficient method for acoustic sound source location estimation using time difference of arrival, "IEEE Conference, , , , 2016. DOI : 10.1109/SYSMART.2016.7894503

2015

  1. Natthan Singh, Manik Chandra Divakar Yadav Formal specification of asynchronous checkpointing using Event-B, 2015 International Conference on Advances in Computer Engineering and Applications, , , pp. 659-664, 2015. DOI : 10.1109/ICACEA.2015.7164773
  2. Mahima Shanker Pandey, Rajitha.B Suneeta Agarwal Computer Assisted Automated Detection of Knee Osteoarthritis using X-ray Images, International Conference on Electrical, Electronics, Engineering Trends, Communication, Optimization and Sciences, , , pp. 74-79, 2015.
  3. Manish Gaur, Simon Gay and Ian Mackie, A routing calculus with flooding updates, Lecture Notes in Computer Science , , , pp. (896)181-186, 2015. DOI : https://doi.org/10.1007/978-3-319-14977-6_12
  4. Pawan Kumar Tiwari, Arun K. Srivastava Zadeh extension principle: A note, Annals of Fuzzy Mathematics and Informatics, , , pp. 37-41, 2015. DOI : http://afmi.or.kr/papers/2015/Vol-09_No-01/Vol._9,_No._1/PDF/AFMI-9-1(37-41)-H-140129R1.pdf Impact Factor : NA
  5. Manish Gaur and Parul Yadav and Nehan Mumtaz, Distance Based Angular Multicast Routing Protocol for Mobile Ad Hoc Networks (DA-MRP), 2015 Fifth International Conference on Communication Systems and Network Technologies, , , pp. 253-257, 2015. DOI : 10.1109/CSNT.2015.231
  6. Manish Gaur and Rama Kant, A Survey on Process Algebraic Stochastic Modelling of Large Distributed Systems for Its Performance Analysis, 2014 3rd International Conference on Eco-friendly Computing and Communication Systems, , , pp. 206-211, 2015. DOI : 10.1109/Eco-friendly.2014.49
  7. Manish Gaur and Parul Yadav, Article: A Survey on Formal Modelling for Secure Routing in Mobile Ad hoc Networks, IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, , , pp. ICDCIT 2015 (1):18-23, 2015.
  8. Manish Gaur and Rama Kant, Article: A Stochastic Extension of the Routing Calculi, {IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, , , pp. ICDCIT 2015(1):13-17, 2015.
  9. N Singh, Manik Chandra Divakar Yadav Formal specification of asynchronous checkpointing using Event-B, 2015 International Conference on Advances in Computer Engineering and Applications, , , pp. 659-664, 2015.
  10. Girish Chandra , Divakar Yadav Formal Development of Basic Timestamp Concurrency Control Mechanism using Event-B, International Journal of Computer Application, , , , 2015. DOI : 10.5120/ijca2015905409
  11. Singh, A.K, Divakar Yadav V K Singh Formal development of path discovery in AODV Routing Protocol using Event-B, International Journal of Computer Applications, , , , 2015.
  12. Girish Chandra, Raghuraj Suryavanshi Divakar Yadav Formal verification of Distributed Checkpointing using Event-B, International Journal of Computer Science and Information Technology, , , pp. 59-73, 2015. DOI : 10.5121/ijcsit.2015.7504
  13. Arun Kumar Singh, Divakar Yadav Formal specifications and verification of total order broadcast through destination agreement using Event-B, International Journal of Computer Science and Information Technology, , , , 2015.
  14. P Bahadur , Divakar Yadav Computer Forensics: Digitized Science, 2015 SAI Intelligent Systems Conference , , , , 2015. DOI : 10.1109/IntelliSys.2015.7361269
  15. Natthan Singh, Manik Chandra Divakar Yadav Formal Specifications of Asynchronous checkpointing using Event-B, 2015 International Conference on Advances in Computer Engineering and Applications, , , , 2015. DOI : 10.1109/ICACEA.2015.7164773
  16. Subodh Kumar, Girish Chandra Divakar Yadav Formal Verification of Security Protocol using B Method, 2014 International Conference on Computer and Communication Technology, , , , 2015. DOI : 10.1109/ICCCT.2014.7001486
  17. Y N Singh, Human Recognition using Fisher's Discriminant Analysis of Heartbeat Interval Features and ECG Morphology, Elsevier, , vol. 167, pp. 322-335, 2015. DOI : https://doi.org/10.1016/j.neucom.2015.04.063
  18. R Shyam, and Y N Singh Recognition Individuals from Unconstrained Facial Images, Advances in Intelligent Systems and Computing ,Springer , , vol. 384, pp. 383-392, 2015.
  19. R Shyam, and Yogendra Narain Singh Robustness of Score Normalization in Multibiometric Systems, "In: Jajoda, S., Mazumdar, C. Eds. Information Systems Security. ICISS 2015, , vol. 9478, pp. 542-550, 2015.
  20. R Shyam, and Y N Singh Analysis of Local Descriptors for Human Face Recognition, In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, , vol. 43, pp. 263-269, 2015. DOI : https://doi.org/10.1007/978-81-322-2538-6_27