default search action
Harsh Kumar Verma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Vikramjit Singh, Krishna Pal Sharma, Harsh Kumar Verma:
MF-DLB: Multimetric forwarding and directed acyclic graph-based load balancing for geographic routing in FANETs. Concurr. Comput. Pract. Exp. 36(11) (2024) - [j30]Faisal Rasheed Lone, Harsh Kumar Verma, Krishna Pal Sharma:
A systematic study on the challenges, characteristics and security issues in vehicular networks. Int. J. Pervasive Comput. Commun. 20(1): 56-98 (2024) - 2022
- [j29]Ravindra Kumar Singh, Harsh Kumar Verma:
Redis-Based Messaging Queue and Cache-Enabled Parallel Processing Social Media Analytics Framework. Comput. J. 65(4): 843-857 (2022) - [j28]Himansu Sekhar Pattanayak, Harsh Kumar Verma, Amrit Lal Sangal:
Gravitational community detection by predicting diameter. Discret. Math. Algorithms Appl. 14(4): 2150145:1-2150145:29 (2022) - [j27]Ravindra Kumar Singh, Harsh Kumar Verma:
User Activity Classification and Domain-Wise Ranking Through Social Interactions. Int. J. Syst. Dyn. Appl. 11(2): 1-15 (2022) - [j26]Ravindra Kumar Singh, Harsh Kumar Verma:
Effective Parallel Processing Social Media Analytics Framework. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 2860-2870 (2022) - [j25]Himansu Sekhar Pattanayak, Harsh Kumar Verma, Amrit Lal Sangal:
Lengthening of average path length in social networks due to the effect of community structure. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8401-8421 (2022) - [j24]Vikramjit Singh, Krishna Pal Sharma, Harsh Kumar Verma:
ABNT: Adaptive beaconing and neighbor timeout for geographical routing in UAV networks. Peer-to-Peer Netw. Appl. 15(4): 2079-2100 (2022) - 2021
- [j23]Naveen Bilandi, Harsh Kumar Verma, Renu Dhir:
hPSO-SA: hybrid particle swarm optimization-simulated annealing algorithm for relay node selection in wireless body area networks. Appl. Intell. 51(3): 1410-1438 (2021) - [j22]Naveen Bilandi, Harsh Kumar Verma, Renu Dhir:
Energy-efficient relay node selection scheme for sustainable wireless body area networks. Sustain. Comput. Informatics Syst. 30: 100516 (2021) - 2020
- [j21]Naveen Bilandi, Harsh Kumar Verma, Renu Dhir:
AHP-neutrosophic decision model for selection of relay node in wireless body area network. CAAI Trans. Intell. Technol. 5(3): 222-229 (2020) - [j20]Manoj Kumar, Harsh Kumar Verma, Geeta Sikka:
A secure data transmission protocol for cloud-assisted edge-Internet of Things environment. Trans. Emerg. Telecommun. Technol. 31(6) (2020) - [j19]Ravindra Kumar Singh, Harsh Kumar Verma:
Influence of Social Media Analytics on Online Food Delivery Systems. Int. J. Inf. Syst. Model. Des. 11(3): 1-21 (2020) - [j18]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
A Reversible Data Hiding Scheme for Interpolated Images Based on Pixel Intensity Range. Multim. Tools Appl. 79(25-26): 18005-18031 (2020) - [j17]Naveen Bilandi, Harsh Kumar Verma, Renu Dhir:
An Energy Efficient Health Monitoring System using Relay Node in Wireless Body Area Networks. EAI Endorsed Trans. Pervasive Health Technol. 5(20): e6 (2020)
2010 – 2019
- 2019
- [j16]Manoj Kumar, Harsh Kumar Verma, Geeta Sikka:
A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments. Trans. Emerg. Telecommun. Technol. 30(4) (2019) - [j15]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
A high capacity data hiding scheme using modified AMBTC compression technique. Int. Arab J. Inf. Technol. 16(1): 148-155 (2019) - [j14]Himansu Sekhar Pattanayak, Amrit Lal Sangal, Harsh Kumar Verma:
Community detection in social networks based on fire propagation. Swarm Evol. Comput. 44: 31-48 (2019) - 2018
- [j13]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidimens. Syst. Signal Process. 29(4): 1801-1818 (2018) - 2017
- [j12]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multim. Tools Appl. 76(11): 13025-13046 (2017) - [j11]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
A high payload data hiding scheme based on modified AMBTC technique. Multim. Tools Appl. 76(12): 14151-14167 (2017) - [j10]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
Image interpolation based high capacity reversible data hiding scheme. Multim. Tools Appl. 76(22): 24107-24123 (2017) - 2016
- [j9]Nischay Bahl, Ajay K. Sharma, Harsh Kumar Verma:
On the Energy Efficiency of WSN Communications Operating Under Non-coherent M-FSK and M-QAM Modulations. Int. J. Wirel. Inf. Networks 23(3): 222-230 (2016) - [c8]Sandeep Mehmi, Harsh Kumar Verma, Amrit Lal Sangal:
Comparative Analysis of Cloudlet Completion Time in Time and Space Shared Allocation Policies During Attack on Smart Grid Cloud. FNC/MobiSPC 2016: 435-440 - 2015
- [j8]Sandeep Mehmi, Harsh Kumar Verma, Amrit Lal Sangal:
Analysis of cloudlet completion time during attack on smart grid cloud. Int. J. Cloud Comput. 4(4): 353-376 (2015) - [j7]Nischay Bahl, Ajay K. Sharma, Harsh Kumar Verma:
On the Energy Utilization of WSN Communications Using Space-Time Block Coding Over BPSK and M-QAM Modulations. Int. J. Wirel. Inf. Networks 22(3): 180-187 (2015) - [j6]Raman Kumar, Harsh Kumar Verma, Renu Dhir:
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers. Wirel. Pers. Commun. 80(3): 1281-1345 (2015) - 2014
- [j5]Nischay Bahl, Ajay K. Sharma, Harsh Kumar Verma:
On the energy utilization for WSN based on BPSK over the Generalized-K shadowed fading channel. Wirel. Networks 20(8): 2385-2393 (2014) - 2013
- [j4]Anupama Gupta, Harsh Kumar Verma, Savita Gupta:
A hybrid framework for registration of carotid ultrasound images combining iconic and geometric features. Medical Biol. Eng. Comput. 51(9): 1043-1050 (2013) - [c7]Amandeep Kaur, Harsh Kumar Verma, Ravindra Kumar Singh:
3D - Playfair cipher using LFSR based unique random number generator. IC3 2013: 18-23 - [c6]Himakshi, Ravindra Kumar Singh, Harsh Kumar Verma, Charan Kamaljit Singh:
Bi-directional pixel-value differencing approach for RGB color image. IC3 2013: 47-52 - [c5]Himakshi, Harsh Kumar Verma, Ravindra Kumar Singh, Charan Kamaljit Singh:
Bi-directional Pixel-Value Differencing Approach for Steganography. SocProS (1) 2013: 109-120 - 2012
- [j3]Anupama Gupta, Harsh Kumar Verma, Savita Gupta:
Technology and research developments in carotid image registration. Biomed. Signal Process. Control. 7(6): 560-570 (2012) - [j2]Kawal Jeet, Renu Dhir, Harsh Kumar Verma:
A comparative study of bayesian and fuzzy approach to assess and predict maintainability of the software using activity-based quality model. ACM SIGSOFT Softw. Eng. Notes 37(3): 1-9 (2012) - 2011
- [j1]Syona Gupta, Geeta Sikka, Harsh Kumar Verma:
Recent methods for software effort estimation by analogy. ACM SIGSOFT Softw. Eng. Notes 36(4): 1-5 (2011) - 2010
- [i2]Vishal Sharma, Harsh Kumar Verma:
Optimized Fuzzy Logic Based Framework for Effort Estimation in Software Development. CoRR abs/1004.3270 (2010)
2000 – 2009
- 2009
- [i1]Harsh Kumar Verma, Abhishek Narain Singh, Raman Kumar:
Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack. CoRR abs/0909.3554 (2009) - 2008
- [c4]Sheo Kumar, Harsh Kumar Verma:
Product Integration Methods for First Kind Abel Integral Equations Using Cubic B-Spline. CSC 2008: 338-341 - [c3]Harsh Kumar Verma, Kamalpreet Kaur, Raman Kumar:
Comparison of Threshold Proxy Signature Schemes. Security and Management 2008: 227-231 - 2007
- [c2]Sheo Kumar, Harsh Kumar Verma:
Numerical Methods Of Volterra Integro-Differential Equations With Two Point Boundary Conditions And Weakly Singular Kernels. CSC 2007: 213-217 - [c1]Sheo Kumar, Harsh Kumar Verma:
Numerical Solution of Volterra Integro-Diffrential Equations With Weakly Singular Kernels. CSC 2007: 247-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint