Harsh Kumar Verma

According to our database1, Harsh Kumar Verma authored at least 41 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MF-DLB: Multimetric forwarding and directed acyclic graph-based load balancing for geographic routing in FANETs.
Concurr. Comput. Pract. Exp., May, 2024

A systematic study on the challenges, characteristics and security issues in vehicular networks.
Int. J. Pervasive Comput. Commun., 2024

2022
ABNT: Adaptive beaconing and neighbor timeout for geographical routing in UAV networks.
Peer-to-Peer Netw. Appl., 2022

Effective Parallel Processing Social Media Analytics Framework.
J. King Saud Univ. Comput. Inf. Sci., 2022

Lengthening of average path length in social networks due to the effect of community structure.
J. King Saud Univ. Comput. Inf. Sci., 2022

User Activity Classification and Domain-Wise Ranking Through Social Interactions.
Int. J. Syst. Dyn. Appl., 2022

Gravitational community detection by predicting diameter.
Discret. Math. Algorithms Appl., 2022

Redis-Based Messaging Queue and Cache-Enabled Parallel Processing Social Media Analytics Framework.
Comput. J., 2022

2021
Energy-efficient relay node selection scheme for sustainable wireless body area networks.
Sustain. Comput. Informatics Syst., 2021

hPSO-SA: hybrid particle swarm optimization-simulated annealing algorithm for relay node selection in wireless body area networks.
Appl. Intell., 2021

2020
An Energy Efficient Health Monitoring System using Relay Node in Wireless Body Area Networks.
EAI Endorsed Trans. Pervasive Health Technol., 2020

A Reversible Data Hiding Scheme for Interpolated Images Based on Pixel Intensity Range.
Multim. Tools Appl., 2020

Influence of Social Media Analytics on Online Food Delivery Systems.
Int. J. Inf. Syst. Model. Des., 2020

A secure data transmission protocol for cloud-assisted edge-Internet of Things environment.
Trans. Emerg. Telecommun. Technol., 2020

AHP-neutrosophic decision model for selection of relay node in wireless body area network.
CAAI Trans. Intell. Technol., 2020

2019
Community detection in social networks based on fire propagation.
Swarm Evol. Comput., 2019

A high capacity data hiding scheme using modified AMBTC compression technique.
Int. Arab J. Inf. Technol., 2019

A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments.
Trans. Emerg. Telecommun. Technol., 2019

2018
An AMBTC compression based data hiding scheme using pixel value adjusting strategy.
Multidimens. Syst. Signal Process., 2018

2017
Image interpolation based high capacity reversible data hiding scheme.
Multim. Tools Appl., 2017

A high payload data hiding scheme based on modified AMBTC technique.
Multim. Tools Appl., 2017

An image interpolation based reversible data hiding scheme using pixel value adjusting feature.
Multim. Tools Appl., 2017

2016
On the Energy Efficiency of WSN Communications Operating Under Non-coherent M-FSK and M-QAM Modulations.
Int. J. Wirel. Inf. Networks, 2016

Comparative Analysis of Cloudlet Completion Time in Time and Space Shared Allocation Policies During Attack on Smart Grid Cloud.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

2015
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers.
Wirel. Pers. Commun., 2015

On the Energy Utilization of WSN Communications Using Space-Time Block Coding Over BPSK and M-QAM Modulations.
Int. J. Wirel. Inf. Networks, 2015

Analysis of cloudlet completion time during attack on smart grid cloud.
Int. J. Cloud Comput., 2015

2014
On the energy utilization for WSN based on BPSK over the Generalized-K shadowed fading channel.
Wirel. Networks, 2014

2013
A hybrid framework for registration of carotid ultrasound images combining iconic and geometric features.
Medical Biol. Eng. Comput., 2013

Bi-directional Pixel-Value Differencing Approach for Steganography.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

3D - Playfair cipher using LFSR based unique random number generator.
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

Bi-directional pixel-value differencing approach for RGB color image.
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

2012
A comparative study of bayesian and fuzzy approach to assess and predict maintainability of the software using activity-based quality model.
ACM SIGSOFT Softw. Eng. Notes, 2012

Technology and research developments in carotid image registration.
Biomed. Signal Process. Control., 2012

2011
Recent methods for software effort estimation by analogy.
ACM SIGSOFT Softw. Eng. Notes, 2011

2010
Optimized Fuzzy Logic Based Framework for Effort Estimation in Software Development
CoRR, 2010

2009
Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack
CoRR, 2009

2008
Comparison of Threshold Proxy Signature Schemes.
Proceedings of the 2008 International Conference on Security & Management, 2008

Product Integration Methods for First Kind Abel Integral Equations Using Cubic B-Spline.
Proceedings of the 2008 International Conference on Scientific Computing, 2008

2007
Numerical Solution of Volterra Integro-Diffrential Equations With Weakly Singular Kernels.
Proceedings of the 2007 International Conference on Scientific Computing, 2007

Numerical Methods Of Volterra Integro-Differential Equations With Two Point Boundary Conditions And Weakly Singular Kernels.
Proceedings of the 2007 International Conference on Scientific Computing, 2007


  Loading...