Ravneet Kaur

Orcid: 0000-0001-6900-9511

According to our database1, Ravneet Kaur authored at least 34 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep learning to quantify care manipulation activities in neonatal intensive care units.
npj Digit. Medicine, 2024

An Efficient Pending Interest Table Content Search In NDN through Stable Bloom Filter.
Comput. J., 2024

A Comprehensive Framework for Emergency Message Dissemination in Urban VANET Scenarios: A Comparative Analysis of Clustering-Based Routing Protocols.
IEEE Access, 2024

Automatic License Plate Detection and Recognition using Deep Learning and Image Processing.
Proceedings of the International Symposium on Computing and Intelligent Systems (SCI 2024), 2024

2023
Bridging gaps in antenatal care: Implementation of the WHO ANC model using a web-based mobile application at different levels of the healthcare system.
Int. J. Medical Informatics, December, 2023

Multilayer extreme learning machine: a systematic review.
Multim. Tools Appl., November, 2023

A hybrid deep learning CNN-ELM approach for parking space detection in Smart Cities.
Neural Comput. Appl., June, 2023

Low-power multi-cloud deployment of large distributed service applications with response-time constraints.
J. Cloud Comput., 2023

An Ontology and Rule-Based Clinical Decision Support System for Personalized Nutrition Recommendations in the Neonatal Intensive Care Unit.
IEEE Access, 2023

Analysis of Tweets with Emoticons for Sentiment Detection Using Classification Techniques.
Proceedings of the Distributed Computing and Intelligent Technology, 2023

Role of VANETs in Machine Learning and Deep Learning.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

2022
Deep CNN based online image deduplication technique for cloud storage system.
Multim. Tools Appl., 2022

Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing.
Clust. Comput., 2022

2021
An intrinsic authorship verification technique for compromised account detection in social networks.
Soft Comput., 2021

A smart learning assistance tool for inclusive education.
J. Intell. Fuzzy Syst., 2021

A decision support system to define, evaluate and guide the lean assessment and implementation at the shop-floor level.
Int. J. Manuf. Res., 2021

The importance of selecting clustering parameters in VANETs: A survey.
Comput. Sci. Rev., 2021

Pre-processing for Improving the Recognition of Mobile based Gurmukhi Text Recognition System.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

2020
Probabilistic data structures for big data analytics: A comprehensive review.
Knowl. Based Syst., 2020

Having Our "Omic" Cake and Eating It Too?: Evaluating User Response to Using Blockchain Technology for Private and Secure Health Data Management and Sharing.
Frontiers Blockchain, 2020

Having our omic cake and eating it too: Evaluating User Response to using Blockchain Technology for Private & Secure Health Data Management and Sharing.
CoRR, 2020

TB-CoAuth: Text based continuous authentication for detecting compromised accounts in social networks.
Appl. Soft Comput., 2020

Resource Allocation and QoS Guarantees for Real World IP Traffic in Integrated XG-PON and IEEE802.11e EDCA Networks.
IEEE Access, 2020

2019
Neo-Bedside Monitoring Device for Integrated Neonatal Intensive Care Unit (iNICU).
IEEE Access, 2019

MetaCom: Profiling Meta Data to Detect Compromised Accounts in Online Social Networks.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

2018
Data deduplication techniques for efficient cloud storage management: a systematic review.
J. Supercomput., 2018

Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches.
J. Netw. Comput. Appl., 2018

AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique.
Expert Syst. Appl., 2018

Performance Analysis of Fairness Oriented Dynamic Bandwidth Algorithm in Integrated Fiber-Wireless Architecture Based on XG-PON and Wi-Fi.
Proceedings of the 2018 20th International Conference on Transparent Optical Networks (ICTON), 2018

2017
A comparative analysis of structural graph metrics to identify anomalies in online social networks.
Comput. Electr. Eng., 2017

Automatic Separation of Basal Cell Carcinoma from Benign Lesions in Dermoscopy Images with Border Thresholding Techniques.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 4: VISAPP, Porto, Portugal, February 27, 2017

2016
A review of social network centric anomaly detection techniques.
Int. J. Commun. Networks Distributed Syst., 2016

2015
Effect of Imperfect Debugging on Prediction of Remaining Faults in Software.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

2011
Advances in Intrusion Detection System for WLAN.
Adv. Internet Things, 2011


  Loading...