default search action
Shishir Kumar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Amit Kumar Srivastava, Shishir Kumar, Masoumeh Zareapoor:
Self-organized design of virtual reality simulator for identification and optimization of healthcare software components. J. Ambient Intell. Humaniz. Comput. 15(1): 1001-1015 (2024) - 2023
- [c12]Narasimhulu Pillutla, Shishir Kumar:
FPGA Implementation of Multi-RT Protocol for Avionics Simulation. SysCon 2023: 1-4 - 2022
- [j39]Utkarsh Sharma, Prateek Pandey, Shishir Kumar:
A Transformer-Based Model for Evaluation of Information Relevance in Online Social-Media: A Case Study of Covid-19 Media Posts. New Gener. Comput. 40(4): 1029-1052 (2022) - 2021
- [j38]Prerana Rai, Dinesh Kumar Verma, Shishir Kumar:
A hybrid model for prediction of software effort based on team size. IET Softw. 15(6): 365-375 (2021) - 2020
- [j37]Anju Shukla, Shishir Kumar, Harikesh Singh:
Fault tolerance based load balancing approach for web resources in cloud environment. Int. Arab J. Inf. Technol. 17(2): 225-232 (2020) - [j36]Anju Shukla, Shishir Kumar, Harikesh Singh:
ANN based execution time prediction model and assessment of input parameters through ISM. Int. Arab J. Inf. Technol. 17(5): 683-691 (2020) - [j35]Kush Shrivastava, Shishir Kumar:
A sentiment analysis system for the hindi language by integrating gated recurrent unit with genetic algorithm. Int. Arab J. Inf. Technol. 17(6): 954-964 (2020) - [c11]Prerana Rai, Shishir Kumar, Dinesh Kumar Verma:
A Hybrid Machine Learning Framework for Prediction of Software Effort at the Initial Phase of Software Development. ICACDS 2020: 187-200
2010 – 2019
- 2019
- [j34]Shishir Kumar, Prabhat Mahanti, Su-Jing Wang:
Intelligent computational techniques for multimodal data. Multim. Tools Appl. 78(17): 23809-23814 (2019) - [j33]Neha Jain, Shishir Kumar, Amit Kumar:
Effective approach for facial expression recognition using hybrid square-based diagonal pattern geometric model. Multim. Tools Appl. 78(20): 29555-29571 (2019) - [j32]Kush Shrivastava, Shishir Kumar, Deepak Kumar Jain:
An effective approach for emotion detection in multimedia text data using sequence based convolutional neural network. Multim. Tools Appl. 78(20): 29607-29639 (2019) - [c10]Amit Kumar Srivastava, Shishir Kumar:
An Experimental Analysis of Similarity Measures Effect for Identification of Software Component Composition of Services Based on Use-Cases. ICACDS (1) 2019: 487-499 - [c9]Ekta Prajapati, Shishir Kumar:
Microfluidic Large Scale Integration with Miniaturized Lensless Microscope. IEEE SENSORS 2019: 1-4 - 2018
- [j31]Nileshkumar R. Patel, Shishir Kumar:
Energy-Efficient Approach for Effective Estimation of Delimited Node Position with Limited References. Comput. J. 61(6): 881-895 (2018) - [j30]Vinay Kumar Jain, Shishir Kumar, Prabhat Mahanti:
Sentiment Recognition in Customer Reviews Using Deep Learning. Int. J. Enterp. Inf. Syst. 14(2): 77-86 (2018) - [j29]Ajay Kumar, Shishir Kumar:
A Support Based Initialization Algorithm for Categorical Data Clustering. J. Inf. Technol. Res. 11(2): 53-67 (2018) - [j28]Shishir Kumar, Prabhat Mahanti, Su-Jing Wang:
Intelligent computational techniques. J. Comput. Sci. 25: 201-203 (2018) - [j27]Amit Kumar Srivastava, Shishir Kumar:
An effective computational technique for taxonomic position of security vulnerability in software development. J. Comput. Sci. 25: 388-396 (2018) - [j26]Deepak Kumar Jain, Neha Jain, Shishir Kumar, Amit Kumar, Raj Kumar, Haoxiang Wang:
An approach for behavior analysis using correlation spectral embedding method. J. Comput. Sci. 25: 397-405 (2018) - [j25]Vinay Kumar Jain, Shishir Kumar:
Effective surveillance and predictive mapping of mosquito-borne diseases using social media. J. Comput. Sci. 25: 406-415 (2018) - [j24]Zubair Khan, Shishir Kumar, Edel B. García Reyes, Prabhat Mahanti:
Multimodal fusion for pattern recognition. Pattern Recognit. Lett. 115: 1-3 (2018) - [j23]Neha Jain, Shishir Kumar, Amit Kumar, Pourya Shamsolmoali, Masoumeh Zareapoor:
Hybrid deep neural networks for face emotion recognition. Pattern Recognit. Lett. 115: 101-106 (2018) - 2017
- [j22]Prateek Pandey, Shishir Kumar, Sandeep Shrivastava:
An Efficient Time Series Forecasting Method Exploiting Fuzziness and Turbulences in Data. Int. J. Fuzzy Syst. Appl. 6(4): 83-98 (2017) - [j21]Shishir Kumar, Neha Jain, Steven Lawrence Fernandes:
Rough set based effective technique of image watermarking. J. Comput. Sci. 19: 121-137 (2017) - [j20]Vinay Kumar Jain, Shishir Kumar, Steven Lawrence Fernandes:
Extraction of emotions from multilingual text using intelligent text processing and computational linguistics. J. Comput. Sci. 21: 316-326 (2017) - [j19]Dinesh Kumar Verma, Shishir Kumar:
Prediction of Defect Density for Open Source Software using Repository Metrics. J. Web Eng. 16(3&4): 294-311 (2017) - [j18]Nileshkumar R. Patel, Shishir Kumar:
Enhanced Clear Channel Assessment for Slotted CSMA/CA in IEEE 802.15.4. Wirel. Pers. Commun. 95(4): 4063-4081 (2017) - 2015
- [j17]Prateek Pandey, Shishir Kumar, Sandeep Shrivastava:
A fuzzy decision making approach for analogy detection in new product forecasting. J. Intell. Fuzzy Syst. 28(5): 2047-2057 (2015) - [j16]Harikesh Singh, Shishir Kumar:
WSQ: Web Server Queueing Algorithm for Dynamic Load Balancing. Wirel. Pers. Commun. 80(1): 229-245 (2015) - 2014
- [j15]Dinesh Kumar Verma, Shishir Kumar:
An Improved Approach for Reduction of Defect Density Using Optimal Module Sizes. Adv. Softw. Eng. 2014: 803530:1-803530:7 (2014) - [j14]Harikesh Singh, Shishir Kumar:
Analysis & Minimization of the Effect of Delay on Load Balancing for Efficient Web Server Queueing Model. Int. J. Syst. Dyn. Appl. 3(4): 1-16 (2014) - [j13]Punit Pandey, Shishir Kumar, Satish Kumar Singh:
Rightful ownership through image adaptive DWT-SVD watermarking algorithm and perceptual tweaking. Multim. Tools Appl. 72(1): 723-748 (2014) - [j12]Punit Pandey, Shishir Kumar, Satish Kumar Singh:
A robust logo watermarking technique in divisive normalization transform domain. Multim. Tools Appl. 72(3): 2653-2677 (2014) - [j11]Mahesh Kumar, Shishir Kumar:
Improving routing in large networks inside autonomous system. Int. J. Syst. Assur. Eng. Manag. 5(3): 383-390 (2014) - [c8]Shaifali Bhatnagar, Shishir Kumar, Ashish Gupta:
An approach of efficient and resistive digital watermarking using SVD. ICACCI 2014: 2470-2475 - 2013
- [j10]Mahesh Kumar, Shishir Kumar:
An approach to stabilize interdomain routing protocol after failure. Comput. Electr. Eng. 39(2): 237-245 (2013) - [j9]Prateek Pandey, Shishir Kumar, Sandeep Shrivastava:
A Critical Evaluation of Computational Methods of Forecasting Based on Fuzzy Time Series. Int. J. Decis. Support Syst. Technol. 5(1): 24-39 (2013) - [j8]Mahesh Kumar, Shishir Kumar:
AGRIB-BHF: A sustainable and fault tolerant aggregation. J. Netw. Comput. Appl. 36(2): 881-886 (2013) - [j7]Mahesh Kumar, Shishir Kumar:
Analyzing and Improving Network Availability in Interdomain Routing. Wirel. Pers. Commun. 72(4): 2069-2080 (2013) - [c7]Kaya Can Akyel, Lorenzo Ciampolini, Olivier Thomas, Bertrand Pelloux-Prayer, Shishir Kumar, Philippe Flatresse, Christophe Lecocq, Gérard Ghibaudo:
Multiple-pulse dynamic stability and failure analysis of low-voltage 6T-SRAM bitcells in 28nm UTBB-FDSOI. ISCAS 2013: 1452-1455 - [c6]Chhaya Gangwal, Rabi Nanda Bhaumik, Shishir Kumar:
Applications of IF Rough Relational Model to Deal with Diabetic Patients. RSFDGrC 2013: 191-199 - [c5]Amit Kumar, Shishir Kumar:
Genetic Algorithm Approach for Non-self OS Process Identification. SocProS (2) 2013: 517-527 - 2012
- [j6]Ajay Kumar, Shishir Kumar, Sakshi Saxena:
An Efficient Approach for Incremental Association Rule Mining through Histogram Matching Technique. Int. J. Inf. Retr. Res. 2(2): 29-42 (2012) - [j5]Umashankar Rawat, Shishir Kumar:
ECFS: An Enterprise-Class Cryptographic File System for Linux. Int. J. Inf. Secur. Priv. 6(2): 53-63 (2012) - [j4]Rónán Daly, Shishir Kumar, Gyongyi Lukacs, Kangho Lee, Anne Weidlich, Martin Hegner, Georg S. Duesberg:
Cell Proliferation Tracking Using Graphene Sensor Arrays. J. Sensors 2012: 219485:1-219485:7 (2012) - 2011
- [j3]Satish Kumar Singh, Shishir Kumar:
Novel adaptive color space transform and application to image compression. Signal Process. Image Commun. 26(10): 662-672 (2011) - 2010
- [c4]Shishir Kumar, Satish Kumar Singh:
Study and Implementation of Entropy Encoding System for Image Compression. ICETET 2010: 186-191 - [i4]Punit Pandey, Deepshikha Pandey, Shishir Kumar:
Reinforcement Learning by Comparing Immediate Reward. CoRR abs/1009.2566 (2010)
2000 – 2009
- 2009
- [j2]Satish Kumar Singh, Shishir Kumar:
Improved Image Compression Based on Feed-Forward Adaptive Downsampling Algorithm. Int. J. Image Graph. 9(4): 575-589 (2009) - [c3]Satish Kumar Singh, Shishir Kumar:
A Framework to Design Novel SVD Based Color Image Compression. EMS 2009: 235-240 - [c2]Satish Kumar Singh, Shishir Kumar, Madhur Srivastava, A. Chandra, S. Srivastava:
Wavelet Based Robust Digital Watermarking Technique Using Reverse Additive Algorithm (RAA). EMS 2009: 241-244 - [i3]Shishir Kumar, Umashankar Rawat, Sameer Kumar Jasra, Akshay Kumar Jain:
Efficient methodology for implementation of Encrypted File System in User Space. CoRR abs/0908.0551 (2009) - [i2]Shishir Kumar, Durgesh Pant:
Detection and Prevention of New and Unknown Malware using Honeypots. CoRR abs/0912.2293 (2009) - [i1]Shishir Kumar, Mahesh Kumar:
Towards Expeditious and Unswerving Routing to Corroborate Nascent Internet. CoRR abs/0912.3966 (2009) - 2007
- [c1]Satish Kumar Singh, Shishir Kumar, G. S. Tomar, Ravi Kumar, Gaurav Kumar Santhalia:
A Modified Framework of a Clustering Algorithm for Image Processing Applications. Asia International Conference on Modelling and Simulation 2007: 434-437 - 2004
- [j1]Shalabh Bhatnagar, Shishir Kumar:
A simultaneous perturbation stochastic approximation-based actor-critic algorithm for Markov decision processes. IEEE Trans. Autom. Control. 49(4): 592-598 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint