Raman Kumar

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Holistic in silico developability assessment of novel classes of small proteins using publicly available sequence-based predictors.
J. Comput. Aided Mol. Des., December, 2024

Analysis and computation of a weak Galerkin scheme for solving the 2D/3D stationary Stokes interface problems with high-order elements.
J. Num. Math., November, 2024

Finite element analysis megatrends: A road less traveled.
Comput. Appl. Eng. Educ., May, 2024

Numerical solutions for Biharmonic interface problems via weak Galerkin finite element methods.
Appl. Math. Comput., April, 2024

Correction: Prediction of Alzheimer's Using Random Forest with Radiomic Features.
Comput. Syst. Sci. Eng., 2024

Machine and deep learning methods for concrete strength Prediction: A bibliometric and content analysis review of research trends and future directions.
Appl. Soft Comput., 2024

2023
Driving behavior analysis and classification by vehicle OBD data using machine learning.
J. Supercomput., November, 2023

Optimal A Priori Error Estimates for Elliptic Interface Problems: Weak Galerkin Mixed Finite Element Approximations.
J. Sci. Comput., November, 2023

High-order weak Galerkin scheme for H(div)-elliptic interface problems.
J. Comput. Appl. Math., November, 2023

Weak Galerkin finite element methods for H(curl;Ω) and H(curl,div;Ω)-elliptic problems.
Comput. Math. Appl., October, 2023

A weak Galerkin finite-element method for singularly perturbed convection-diffusion-reaction problems with interface.
Comput. Appl. Math., October, 2023

DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication.
Int. J. Image Graph., July, 2023

Simulative Analysis and Performance Evaluation for Data Variety Aware Power Optimization Technique Using Big Data.
Wirel. Pers. Commun., 2023

Structural modeling and analysis of fuel cell: a graph-theoretic approach.
PeerJ Comput. Sci., 2023

Structural modeling and analysis of fuel cell: a graph-theoretic approach.
PeerJ Comput. Sci., 2023

Artificial neural network based character recognition using SciLab.
Multim. Tools Appl., 2023

Prediction of Alzheimer's Using Random Forest with Radiomic Features.
Comput. Syst. Sci. Eng., 2023

2022
A New Joint Strategy for Multi-Criteria Decision-Making: A Case Study for Prioritizing Solid-State Drive.
Int. J. Comput. Commun. Control, December, 2022

Exploring the Application Sphere of the Internet of Things in Industry 4.0: A Review, Bibliometric and Content Analysis.
Sensors, 2022

Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm.
Sensors, 2022

A hybrid feature extraction technique for content based medical image retrieval using segmentation and clustering techniques.
Multim. Tools Appl., 2022

2021
High-utility and diverse itemset mining.
Appl. Intell., 2021

2020
Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography.
Wirel. Pers. Commun., 2020

2019
Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future.
Proceedings of the Recent Advances in Computational Intelligence, 2019

Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage.
Proceedings of the Recent Advances in Computational Intelligence, 2019

A Gamification Framework for Redesigning the Learning Environment.
Proceedings of the Recent Advances in Computational Intelligence, 2019

Review on Current Trends of Deep Learning.
Proceedings of the Recent Advances in Computational Intelligence, 2019

Enhancing Gadgets for Blinds Through Scale Invariant Feature Transform.
Proceedings of the Recent Advances in Computational Intelligence, 2019

Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach.
Proceedings of the Recent Advances in Computational Intelligence, 2019

A Variant of Secret Sharing Protected with Poly-1305.
Proceedings of the Recent Advances in Computational Intelligence, 2019

2016
Effect of Randomization for Privacy Preservation on Classification Tasks.
Proceedings of the International Conference on Informatics and Analytics, 2016

2015
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers.
Wirel. Pers. Commun., 2015

2013
Measuring the Utilization Index of Advanced Manufacturing Technologies: A Case Study.
Proceedings of the 7th IFAC Conference on Manufacturing Modelling, Management, and Control, 2013

2009
Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack
CoRR, 2009

2008
Comparison of Threshold Proxy Signature Schemes.
Proceedings of the 2008 International Conference on Security & Management, 2008


  Loading...