Raman Kumar
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Holistic in silico developability assessment of novel classes of small proteins using publicly available sequence-based predictors.
J. Comput. Aided Mol. Des., December, 2024
Analysis and computation of a weak Galerkin scheme for solving the 2D/3D stationary Stokes interface problems with high-order elements.
J. Num. Math., November, 2024
Comput. Appl. Eng. Educ., May, 2024
Numerical solutions for Biharmonic interface problems via weak Galerkin finite element methods.
Appl. Math. Comput., April, 2024
Comput. Syst. Sci. Eng., 2024
Machine and deep learning methods for concrete strength Prediction: A bibliometric and content analysis review of research trends and future directions.
Appl. Soft Comput., 2024
2023
Driving behavior analysis and classification by vehicle OBD data using machine learning.
J. Supercomput., November, 2023
Optimal A Priori Error Estimates for Elliptic Interface Problems: Weak Galerkin Mixed Finite Element Approximations.
J. Sci. Comput., November, 2023
J. Comput. Appl. Math., November, 2023
Weak Galerkin finite element methods for H(curl;Ω) and H(curl,div;Ω)-elliptic problems.
Comput. Math. Appl., October, 2023
A weak Galerkin finite-element method for singularly perturbed convection-diffusion-reaction problems with interface.
Comput. Appl. Math., October, 2023
DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication.
Int. J. Image Graph., July, 2023
Simulative Analysis and Performance Evaluation for Data Variety Aware Power Optimization Technique Using Big Data.
Wirel. Pers. Commun., 2023
PeerJ Comput. Sci., 2023
PeerJ Comput. Sci., 2023
Multim. Tools Appl., 2023
Comput. Syst. Sci. Eng., 2023
2022
A New Joint Strategy for Multi-Criteria Decision-Making: A Case Study for Prioritizing Solid-State Drive.
Int. J. Comput. Commun. Control, December, 2022
Exploring the Application Sphere of the Internet of Things in Industry 4.0: A Review, Bibliometric and Content Analysis.
Sensors, 2022
Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm.
Sensors, 2022
A hybrid feature extraction technique for content based medical image retrieval using segmentation and clustering techniques.
Multim. Tools Appl., 2022
2021
2020
Cryptanalytic Performance Appraisal of Improved HLL, KUOCHEN, GENGVRF, FENGVRF Secure Signature with TKIP Digital Workspaces: For Financial Cryptography.
Wirel. Pers. Commun., 2020
2019
Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future.
Proceedings of the Recent Advances in Computational Intelligence, 2019
Proceedings of the Recent Advances in Computational Intelligence, 2019
Proceedings of the Recent Advances in Computational Intelligence, 2019
Proceedings of the Recent Advances in Computational Intelligence, 2019
Proceedings of the Recent Advances in Computational Intelligence, 2019
Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach.
Proceedings of the Recent Advances in Computational Intelligence, 2019
Proceedings of the Recent Advances in Computational Intelligence, 2019
2016
Proceedings of the International Conference on Informatics and Analytics, 2016
2015
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers.
Wirel. Pers. Commun., 2015
2013
Measuring the Utilization Index of Advanced Manufacturing Technologies: A Case Study.
Proceedings of the 7th IFAC Conference on Manufacturing Modelling, Management, and Control, 2013
2009
Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack
CoRR, 2009
2008
Comparison of Threshold Proxy Signature Schemes.
Proceedings of the 2008 International Conference on Security & Management, 2008