Harsh Kumar Verma
According to our database1,
Harsh Kumar Verma
authored at least 41 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
MF-DLB: Multimetric forwarding and directed acyclic graph-based load balancing for geographic routing in FANETs.
Concurr. Comput. Pract. Exp., May, 2024
A systematic study on the challenges, characteristics and security issues in vehicular networks.
Int. J. Pervasive Comput. Commun., 2024
2022
ABNT: Adaptive beaconing and neighbor timeout for geographical routing in UAV networks.
Peer-to-Peer Netw. Appl., 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Lengthening of average path length in social networks due to the effect of community structure.
J. King Saud Univ. Comput. Inf. Sci., 2022
Int. J. Syst. Dyn. Appl., 2022
Discret. Math. Algorithms Appl., 2022
Redis-Based Messaging Queue and Cache-Enabled Parallel Processing Social Media Analytics Framework.
Comput. J., 2022
2021
Energy-efficient relay node selection scheme for sustainable wireless body area networks.
Sustain. Comput. Informatics Syst., 2021
hPSO-SA: hybrid particle swarm optimization-simulated annealing algorithm for relay node selection in wireless body area networks.
Appl. Intell., 2021
2020
An Energy Efficient Health Monitoring System using Relay Node in Wireless Body Area Networks.
EAI Endorsed Trans. Pervasive Health Technol., 2020
A Reversible Data Hiding Scheme for Interpolated Images Based on Pixel Intensity Range.
Multim. Tools Appl., 2020
Int. J. Inf. Syst. Model. Des., 2020
A secure data transmission protocol for cloud-assisted edge-Internet of Things environment.
Trans. Emerg. Telecommun. Technol., 2020
AHP-neutrosophic decision model for selection of relay node in wireless body area network.
CAAI Trans. Intell. Technol., 2020
2019
Swarm Evol. Comput., 2019
Int. Arab J. Inf. Technol., 2019
A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments.
Trans. Emerg. Telecommun. Technol., 2019
2018
Multidimens. Syst. Signal Process., 2018
2017
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
An image interpolation based reversible data hiding scheme using pixel value adjusting feature.
Multim. Tools Appl., 2017
2016
On the Energy Efficiency of WSN Communications Operating Under Non-coherent M-FSK and M-QAM Modulations.
Int. J. Wirel. Inf. Networks, 2016
Comparative Analysis of Cloudlet Completion Time in Time and Space Shared Allocation Policies During Attack on Smart Grid Cloud.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016
2015
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers.
Wirel. Pers. Commun., 2015
On the Energy Utilization of WSN Communications Using Space-Time Block Coding Over BPSK and M-QAM Modulations.
Int. J. Wirel. Inf. Networks, 2015
Int. J. Cloud Comput., 2015
2014
On the energy utilization for WSN based on BPSK over the Generalized-K shadowed fading channel.
Wirel. Networks, 2014
2013
A hybrid framework for registration of carotid ultrasound images combining iconic and geometric features.
Medical Biol. Eng. Comput., 2013
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013
Proceedings of the Sixth International Conference on Contemporary Computing, 2013
Proceedings of the Sixth International Conference on Contemporary Computing, 2013
2012
A comparative study of bayesian and fuzzy approach to assess and predict maintainability of the software using activity-based quality model.
ACM SIGSOFT Softw. Eng. Notes, 2012
Biomed. Signal Process. Control., 2012
2011
ACM SIGSOFT Softw. Eng. Notes, 2011
2010
CoRR, 2010
2009
Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack
CoRR, 2009
2008
Comparison of Threshold Proxy Signature Schemes.
Proceedings of the 2008 International Conference on Security & Management, 2008
Product Integration Methods for First Kind Abel Integral Equations Using Cubic B-Spline.
Proceedings of the 2008 International Conference on Scientific Computing, 2008
2007
Numerical Solution of Volterra Integro-Diffrential Equations With Weakly Singular Kernels.
Proceedings of the 2007 International Conference on Scientific Computing, 2007
Numerical Methods Of Volterra Integro-Differential Equations With Two Point Boundary Conditions And Weakly Singular Kernels.
Proceedings of the 2007 International Conference on Scientific Computing, 2007