Richa Sharma

Orcid: 0000-0002-7405-0110

According to our database1, Richa Sharma authored at least 128 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A novel approach for Enhancing Mammographic Images.
Int. J. Syst. Syst. Eng., 2025

2024
MMHFND: Fusing Modalities for Multimodal Multiclass Hindi Fake News Detection via Contrastive Learning.
ACM Trans. Asian Low Resour. Lang. Inf. Process., November, 2024

UAV Swarm Objectives: A Critical Analysis and Comprehensive Review.
SN Comput. Sci., August, 2024

Binary Peacock Algorithm: A Novel Metaheuristic Approach for Feature Selection.
J. Classif., July, 2024

An automated face mask detection system using transfer learning based neural network to preventing viral infection.
Expert Syst. J. Knowl. Eng., March, 2024

StrokeClassifier: ischemic stroke etiology classification by ensemble consensus modeling using electronic health records.
npj Digit. Medicine, 2024

Design And Flight Testing Of LQRi Attitude Control For Quadcopter UAV.
CoRR, 2024

Adversarial Label Flipping Attack on Supervised Machine Learning-Based HT Detection Systems.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2024

2023
Smith predictor controller design for TCP/AQM.
Int. J. Syst. Assur. Eng. Manag., December, 2023

Blockchain-Enabled Intelligent Solution Using Structured Equation Modelling Based on the UTAUT Framework.
SN Comput. Sci., November, 2023

Convexity analysis and cost optimization of a retrial queue with Bernoulli vacation and delayed phase mending.
Int. J. Syst. Assur. Eng. Manag., October, 2023

An approach to optimize performance of controller in networked control system.
Int. J. Syst. Assur. Eng. Manag., October, 2023

Structural and SCOAP Features Based Approach for Hardware Trojan Detection Using SHAP and Light Gradient Boosting Model.
J. Electron. Test., August, 2023

LFWE: Linguistic Feature Based Word Embedding for Hindi Fake News Detection.
ACM Trans. Asian Low Resour. Lang. Inf. Process., June, 2023

Technology Enabled Intelligent Solution in Human Resource Management for Smart Cities.
Scalable Comput. Pract. Exp., April, 2023

Ransomware detection, prevention and protection in IoT devices using ML techniques based on dynamic analysis approach.
Int. J. Syst. Assur. Eng. Manag., February, 2023

Activities tracking by smartphone and smartwatch biometric sensors using fuzzy set theory.
Multim. Tools Appl., 2023

Managing Employees Attendance using Real Time Face Recognition.
Int. J. Syst. Syst. Eng., 2023

An automated system to detect crop diseases using deep learning.
Int. J. Comput. Vis. Robotics, 2023

Application of intelligent adaptive neuro fuzzy method for reusability of component based software system.
Int. Arab J. Inf. Technol., 2023

DWAEF: a deep weighted average ensemble framework harnessing novel indicators for sarcasm detection1.
Data Sci., 2023

Optimizing Knowledge Transfer in Sequential Models: Leveraging Residual Connections in Flow Transfer Learning for Lung Cancer Classification.
Proceedings of the Fourteenth Indian Conference on Computer Vision, 2023

Brain Tumor Detection and Localization from MRI Scan Images.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Machine Learning Techniques for Fake News Detection in Low-Resource Hindi Language: A Comparative Study.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Development of a Machine Learning Based Decision Support System for Rice Fungal Disease Management.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

A Review on CLAHE Based Enhancement Techniques.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

Intersection of Machine Learning, Deep Learning and Transformers to Combat Fake News in Kannada Language.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

Novel Label Flipping Dataset Poisoning Attack Against ML-Based HT Detection Systems.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2023

2022
A CatBoost Based Approach to Detect Label Flipping Poisoning Attack in Hardware Trojan Detection Systems.
J. Electron. Test., December, 2022

Design and Analysis of Circular Microstrip Patch Antenna for White Space TV Band Application.
Wirel. Pers. Commun., 2022

Performance Assessment of Fuzzy Logic Control Approach for MR-Damper Based-Transfemoral Prosthetic Leg.
IEEE Trans. Artif. Intell., 2022

Active control of ripple energy in single-phase pulse width modulated rectifier.
Int. J. Syst. Assur. Eng. Manag., 2022

Optimized clustering using soft computing approaches in wireless sensor networks: research dimensions and contributions.
Int. J. Syst. Assur. Eng. Manag., 2022

Design and analysis of permitted specific absorption rate (SAR) antennas for IOT applications.
Int. J. Syst. Assur. Eng. Manag., 2022

Fuzzy modelling based energy aware clustering in wireless sensor networks using modified invasive weed optimization.
J. King Saud Univ. Comput. Inf. Sci., 2022

Studies on the Role of Knowledge Management in Performance Enhancement and Promotion of Renewable Energy Industries in India.
J. Inf. Knowl. Manag., 2022

Student engagement and course motivation through experiential learning pedagogy.
Int. J. Syst. Syst. Eng., 2022

Trust assessment-based stable and attack resistant grouping strategy for data dissemination in IoV.
Int. J. Sens. Networks, 2022

Towards Accurate Heart Disease Prediction System: An Enhanced Machine Learning Approach.
Int. J. Perform. Eng., 2022

Neuro-fuzzy computing and optimisation results for batch discrete time retrial queue.
Int. J. Math. Oper. Res., 2022

Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles.
Int. J. Cloud Appl. Comput., 2022

eeFFA/DE - a fuzzy-based clustering algorithm using hybrid technique for wireless sensor networks.
Int. J. Adv. Intell. Paradigms, 2022

Named entity recognition using neural language model and CRF for Hindi language.
Comput. Speech Lang., 2022

A low leakage substrate bias-assisted technique for low voltage dual bit-line SRAM.
Comput. Electr. Eng., 2022

Relating Human Value Philosophy To Vedic Philosophies With Special Focus On The Concepts Of Body, Self (I) And Intellect As The Ultimate Tool In The Hands Of Human Beings.
Proceedings of the International Conference on Research in Management & Technovation, 2022

2021
SAGRO-Lite: A Light Weight Agent Based Semantic Model for the Internet of Things for Smart Agriculture in Developing Countries.
Proceedings of the Semantic IoT: Theory and Applications, 2021

Analysis and Optimization of Low Power Wide Area IoT Network.
Trans. Comput. Sci., 2021

Quantified Self: From Self-Learning to Machine Learning.
IT Prof., 2021

A new hardware Trojan detection technique using deep convolutional neural network.
Integr., 2021

TVDD: topology based vehicular data dissemination scheme for stability optimisation in IoV.
Int. J. Sens. Networks, 2021

Entity-Extraction Using Hybrid Deep-Learning Approach for Hindi text.
Int. J. Cogn. Informatics Nat. Intell., 2021

Analysis of Heterogeneous Data Storage and Access Control Management for Cloud Computing Under M/M/c Queueing Model.
Int. J. Cloud Appl. Comput., 2021

Optimal fuzzy logic-based control strategy for lower limb rehabilitation exoskeleton.
Appl. Soft Comput., 2021

A Few Shot Learning based Approach for Hardware Trojan Detection using Deep Siamese CNN.
Proceedings of the 34th International Conference on VLSI Design and 20th International Conference on Embedded Systems, 2021

The Good, The Bad, The Ugly & The Futile: The Memory & Their Impact On Human Beings.
Proceedings of the International Conference on Research in Management & Technovation, 2021

COVID-19: Geospatial Analysis of the Pandemic - A Case Study of Bihar State, India, Using Data Derived from Remote Sensing Satellites and COVID-19 National Geoportal.
Proceedings of the Intelligent Data Engineering and Analytics, 2021

2020
eeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks.
Telecommun. Syst., 2020

A deep neural network-based model for named entity recognition for Hindi language.
Neural Comput. Appl., 2020

A smart approach for fire prediction under uncertain conditions using machine learning.
Multim. Tools Appl., 2020

Metaheuristics-based energy efficient clustering in WSNs: challenges and research contributions.
IET Wirel. Sens. Syst., 2020

Modelling and simulation frameworks for wireless sensor networks: a comparative study.
IET Wirel. Sens. Syst., 2020

WOATCA: A secure and energy aware scheme based on whale optimisation in clustered wireless sensor networks.
IET Commun., 2020

Naturalization of Text by the Insertion of Pauses and Filler Words.
CoRR, 2020

An optimal interval type-2 fuzzy logic control based closed-loop drug administration to regulate the mean arterial blood pressure.
Comput. Methods Programs Biomed., 2020

A New Hardware Trojan Detection Technique using Class Weighted XGBoost Classifier.
Proceedings of the 2020 24th International Symposium on VLSI Design and Test (VDAT), 2020

2019
Data mining classification techniques - comparison for better accuracy in prediction of cardiovascular disease.
Int. J. Data Anal. Tech. Strateg., 2019

EEFCM-DE: energy-efficient clustering based on fuzzy C means and differential evolution algorithm in WSNs.
IET Commun., 2019

NetClus: A Scalable Framework to Mine Top-K Locations for Placement of Trajectory-Aware Services.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019

2018
About Auteuring Requirements - Lessons from Filmmaking.
Proceedings of the 1st International Workshop on Learning from other Disciplines for Requirements Engineering, 2018

Towards automating disambiguation of regulations: using the wisdom of crowds.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

A Naive Deep Nets Based Approach for Authenticating Viral Textual Content on Social Media.
Proceedings of the Intelligent Systems and Applications, 2018

Moving Disambiguation of Regulations from the Cathedral to the Bazaar.
Proceedings of the HCOMP 2018 Works in Progress and Demonstration Papers Track of the sixth AAAI Conference on Human Computation and Crowdsourcing (HCOMP 2018), 2018

2017
Comparative Analysis of Texture Classification Using Local Binary Pattern and Its Variants.
Int. J. Inf. Syst. Model. Des., 2017

Testing the limits of unsupervised learning for semantic similarity.
CoRR, 2017

Corrigendum to "Design of two-layered fractional order fuzzy logic controllers applied to robotic manipulator with variable payload" [Appl. Soft Comput. 47(2016) 565-576].
Appl. Soft Comput., 2017

Markovian queue with multi stage service, finite capacity and breakdowns.
Proceedings of the 2nd International Conference on System Reliability and Safety, 2017

Analysis of software reliability growth model under two types of fault and warranty cost.
Proceedings of the 2nd International Conference on System Reliability and Safety, 2017

NetClus: A Scalable Framework for Locating Top-K Sites for Placement of Trajectory-Aware Services.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Keystroke dynamics based authentication using fuzzy logic.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

CRUISE: A platform for crowdsourcing Requirements Elicitation and evolution.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

Keystroke dynamics based authentication system with unrestricted data collection.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

Enriching Frame-based Structured Representations for Requirements using Case Frames - An Approach Towards Handling Incompleteness in Informal Requirements.
Proceedings of the ENASE 2017, 2017

Machine Learning for Detecting Pronominal Anaphora Ambiguity in NL Requirements.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

2016
A Nine Year Story of the India Software Engineering Conference from 2008 to 2016.
ACM SIGSOFT Softw. Eng. Notes, 2016

Insights from Mining Eleven Years of Scholarly Paper Publications in Requirements Engineering (RE) Series of Conferences.
ACM SIGSOFT Softw. Eng. Notes, 2016

Design of two-layered fractional order fuzzy logic controllers applied to robotic manipulator with variable payload.
Appl. Soft Comput., 2016

Lexical and Syntactic cues to identify Reference Scope of Citance.
Proceedings of the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries (BIRNDL) co-located with the Joint Conference on Digital Libraries 2016 (JCDL 2016), 2016

2015
Crowdsourcing to elicit requirements for MyERP application.
Proceedings of the 1st IEEE International Workshop on Crowd-Based Requirements Engineering, 2015

From natural language requirements to UML class diagrams.
Proceedings of the 2015 IEEE Second International Workshop on Artificial Intelligence for Requirements Engineering, 2015

Generating Logical Representations for Natural Language Requirements Using Syntactic Dependencies and Norm Analysis Patterns.
Proceedings of the Natural Language Processing and Information Systems, 2015

Recognizing Textual Entailment using Dependency Analysis and Machine Learning.
Proceedings of the NAACL HLT 2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, USA, May 31, 2015

User interest expansion using spreading activation for generating recommendations.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Functional Requirements Categorization - Grounded Theory Approach.
Proceedings of the ENASE 2015, 2015

Towards Adapting Sakai for e-Learning Provider.
Proceedings of the CSEDU 2015, 2015

2014
Performance analysis of fractional order fuzzy PID controllers applied to a robotic manipulator.
Expert Syst. Appl., 2014

Polarity detection movie reviews in hindi language.
CoRR, 2014

Opinion mining of movie reviews at document level.
CoRR, 2014

Mining of product reviews at aspect level.
CoRR, 2014

Opinion Mining In Hindi Language: A Survey.
CoRR, 2014

Accurate merging of images for predictive analysis using combined image.
CoRR, 2014

Merging and Shifting of Images with Prominence Coefficient for Predictive Analysis using Combined Image.
CoRR, 2014

Mathematical Analysis of Queue with Phase Service: An Overview.
Adv. Oper. Res., 2014

Machine learning for constituency test of coordinating conjunctions in requirements specifications.
Proceedings of the 3rd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, 2014

Automated Generation of Activity and Sequence Diagrams from Natural Language Requirements.
Proceedings of the ENASE 2014, 2014

Natural Language Generation Approach for Automated Generation of Test Cases from Logical Specification of Requirements.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2014

Automated Generation of Test Cases from Logical Specification of Software Requirements.
Proceedings of the ENASE 2014, 2014

2013
Analysis of diabetic retinopathy data using shared inverse Gaussian frailty model.
Model. Assist. Stat. Appl., 2013

Modeling heterogeneity for bivariate survival data by shared gamma frailty regression model.
Model. Assist. Stat. Appl., 2013

Trust and context view-based knowledge sharing in MANets.
Int. J. Trust. Manag. Comput. Commun., 2013

Unreliable server M/G/1 queue with multi-optional services and multi-optional vacations.
Int. J. Math. Oper. Res., 2013

Stigmergic agent-based adaptive content sequencing in an e-learning environment.
Int. J. Adv. Intell. Paradigms, 2013

Comparative Study of Controller Optimization Techniques for a Robotic Manipulator.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

Development of a Genetic Algorithm Toolkit in LabVIEW.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

Using Grammatical Knowledge Patterns for structuring requirements specifications.
Proceedings of the Third IEEE International Workshop on Requirements Patterns, RePa 2013, 2013

Resolving Inconsistency and Incompleteness Issues in Software Requirements.
Proceedings of the Managing Requirements Knowledge., 2013

2012
A bivariate Gompertz regression model with shared gamma frailty for censored data.
Model. Assist. Stat. Appl., 2012

Optimal control of (N, F) policy for unreliable server queue with multi-optional phase repair and start-up.
Int. J. Math. Oper. Res., 2012

Maximum Entropy Approach for discrete-time unreliable server Geo<sup>X</sup>/Geo/1 queue with working vacation.
Int. J. Math. Oper. Res., 2012

Building Socially-Aware E-Learning Systems Through Knowledge Management.
Int. J. Knowl. Manag., 2012

A batch arrival retrial queuing system for essential and optional services with server breakdown and Bernoulli vacation.
Int. J. Internet Enterp. Manag., 2012

Using norm analysis patterns for automated requirements validation.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012

An opinion-based framework for designing socially aware e-learning systems.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

A Framework of the Wireless Sensor Based Railway Signal System.
Proceedings of the International Conference on IT Convergence and Security, 2012

A Semi-automated Approach towards Handling Inconsistencies in Software Requirements.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2012

Handling Inconsistency in Software Requirements.
Proceedings of the ENASE 2012, 2012

2011
Adaptive Content Sequencing for e-Learning Courses Using Ant Colony Optimization.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

Using courteous logic based representations for requirements specification.
Proceedings of the 4th International Workshop on Managing Requirements Knowledge, 2011

Can Ontologies Be Sufficient Solution to Requirement Engineering Problem?.
Proceedings of the KEOD 2011, 2011


  Loading...