Mahesh Chandra Govil

According to our database1, Mahesh Chandra Govil authored at least 62 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SpAtNet: a spatial feature attention network for hand gesture recognition.
Multim. Tools Appl., April, 2024

A better and fast cloud intrusion detection system using improved squirrel search algorithm and modified deep belief network.
Clust. Comput., April, 2024

Local Extrema Min-Max Pattern: A novel descriptor for extracting compact and discrete features for hand gesture recognition.
Biomed. Signal Process. Control., 2024

Delay-sensitive task offloading and efficient resource allocation in intelligent edge-cloud environments: A discretized differential evolution-based approach.
Appl. Soft Comput., 2024

2023
Rapid A*: a robust path planning scheme for UAVs.
Int. J. Intell. Robotics Appl., December, 2023

Revisiting of peer-to-peer traffic: taxonomy, applications, identification techniques, new trends and challenges.
Knowl. Inf. Syst., November, 2023

Nature-inspired intrusion detection system for protecting software-defined networks controller.
Comput. Secur., November, 2023

Identification of vulnerable selfish peer in P2P network using nature-inspired optimization techniques.
Phys. Commun., August, 2023

A fuzzy based hierarchical flash crowd controller for live video streaming in P2P network.
Peer Peer Netw. Appl., March, 2023

An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques.
Neural Comput. Appl., March, 2023

A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification.
Multim. Tools Appl., March, 2023

HyFiNet: Hybrid feature attention network for hand gesture recognition.
Multim. Tools Appl., February, 2023

DeepPose: An Integrated Deep Learning Model for Posture Detection Using Image and Skeletal Data.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
ExtriDeNet: an intensive feature extrication deep network for hand gesture recognition.
Vis. Comput., 2022

Congestion control in Internet of Things: Classification, challenges, and future directions.
Sustain. Comput. Informatics Syst., 2022

CONTAIN4n6: a systematic evaluation of container artifacts.
J. Cloud Comput., 2022

Energy-aware scientific workflow scheduling in cloud environment.
Clust. Comput., 2022

2021
Score-based Incentive Mechanism (SIM) for live multimedia streaming in peer-to-peer network.
Multim. Tools Appl., 2021

A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO-PSO-RF model.
J. Reliab. Intell. Environ., 2021

Design of fuzzy controlled routing protocol to save energy in ad hoc networks.
Int. J. Serv. Technol. Manag., 2021

An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN.
Int. J. Digit. Crime Forensics, 2021

2020
High Throughput and Resource Efficient Pipelined Decoder Designs for Projective Geometry LDPC Codes.
Period. Polytech. Electr. Eng. Comput. Sci., 2020

Conserving Thangka - A technical approach unto the preservation of Buddhist Thangka through automation.
Digit. Appl. Archaeol. Cult. Heritage, 2020

Storage, partitioning, indexing and retrieval in Big RDF frameworks: A survey.
Comput. Sci. Rev., 2020

Evidence Building for Ad Click or Web Access on Cloud.
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020

A Hybrid Symmetric Key Cryptography Method to Provide Secure Data Transmission.
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020

Buddhist Hasta Mudra Recognition Using Morphological Features.
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020

Design of Pass Transistor based Phase Frequency Detector for Fast Frequency Acquisition Phase Locked Loop.
Proceedings of the 3rd International Symposium on Devices, Circuits and Systems, 2020

A Taxonomy of Hypervisor Forensic Tools.
Proceedings of the Advances in Digital Forensics XVI, 2020

CrossFeat: Multi-scale Cross Feature Aggregation Network for Hand Gesture Recognition.
Proceedings of the 15th IEEE International Conference on Industrial and Information Systems, 2020

2019
FLHyO: fuzzy logic based hybrid overlay for P2P live video streaming.
Multim. Tools Appl., 2019

Brokering in interconnected cloud computing environments: A survey.
J. Parallel Distributed Comput., 2019

Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation.
Int. J. Grid Util. Comput., 2019

Fuzzy based Data Fusion for Energy Efficient Internet of Things.
Int. J. Grid High Perform. Comput., 2019

SOD-CED: salient object detection for noisy images using convolution encoder-decoder.
IET Comput. Vis., 2019

2018
Priority-based scheduling scheme for live video streaming in peer-to-peer network.
Multim. Tools Appl., 2018

Text-Mining and Pattern-Matching based Prediction Models for Detecting Vulnerable Files in Web Applications.
J. Web Eng., 2018

Slack time-based scheduling scheme for live video streaming in P2P network.
Int. J. Commun. Syst., 2018

CHACT: Convex Hull Enabled Active Contour Technique for Salient Object Detection.
IEEE Access, 2018

A Taxonomy of Cloud Endpoint Forensic Tools.
Proceedings of the Advances in Digital Forensics XIV, 2018

A Novel Methodology for Effective Requirements Elicitation and Modeling.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
A critical survey of live virtual machine migration techniques.
J. Cloud Comput., 2017

2016
Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities.
Int. J. Secur. Networks, 2016

Security Requirements Elicitation and Modeling Authorizations.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

Modeling Software Security Requirements Through Functionality Rank Diagrams.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

A secure software design methodology.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Salient Object Detection in Noisy Images.
Proceedings of the Advances in Artificial Intelligence, 2016

2015
A Secure Hybrid Cloud Enabled architecture for Internet of Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Base Station Controlled and Energy Efficient Centralized Hierarchical Routing Protocol (BSEECH).
Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems, 2015

A new hybrid approach for overlay construction in P2P live streaming.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Security Requirements Elicitation and Assessment Mechanism (SecREAM).
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
An approach for a reduced response time and Energy consumption in mixed task set using a Priority Exchange Server.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

LevelSync: A hierarchical time synchronization mechanism for wireless sensor networks.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2012
On Stability Problems of Omega and 3-Disjoint Paths Omega Multi-stage Interconnection Networks
CoRR, 2012

Disjoint Paths Multi-stage Interconnection Networks Stability Problem
CoRR, 2012

2011
Personalised search - a hybrid approach for web information retrieval and its evaluation.
Int. J. Knowl. Web Intell., 2011

Reputation-Based Trust for Mobile Agents.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

2010
A Hybrid Approach of Personalized Web Information Retrieval.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Recommender System Framework Using Clustering and Collaborative Filtering.
Proceedings of the 3rd International Conference on Emerging Trends in Engineering and Technology, 2010

Evaluation of a hybrid approach of personalized web information retrieval using the FIRE data set.
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, 2010


  Loading...