


Остановите войну!
for scientists:


default search action
Anil Kumar 0009
Person information

- affiliation: DIT University, Dehradun, India
- affiliation (2014 - 2018): Mody University, Department of Computer Science and Engineering, India
- affiliation (2011 - 2014): Manipal University Jaipur, Department Computer Science and Engineering, India
- affiliation (PhD 2011): Sikkim Manipal Institute of Technology, Computer Science and Engineering Department, India
Other persons with the same name
- Anil Kumar — disambiguation page
- Anil Kumar 0001
— PDPM Indian Institute of Information Technology Design and Manufacturing, Jabalpur, India (and 1 more)
- Anil Kumar 0002
— Institute of Technology Greater Noida, India
- Anil Kumar 0003
— Indian Institute of Technology Guwahati, Department of Biosciences and Bioengineering, Assam, India (and 1 more)
- Anil Kumar 0004
— Maharshi Dayanand University, Department of Mathematics, Rohtak, India
- Anil Kumar 0005
— Amity University, Amity Institute of Technology, Noida, India (and 1 more)
- Anil Kumar 0006
— University of Alberta, Edmonton, AB, Canada (and 1 more)
- Anil Kumar 0007
— GM Cruise, LLC, San Francisco, CA, USA (and 2 more)
- Anil Kumar 0008
— London Metropolitan University, UK (and 2 more)
- Anil Kumar 0010
— University of Hyderabad, School of Computer and Information Sciences, India
- Anil Kumar 0011
— Institute of Genomics and Integrative Biology, New Delhi, India
- Anil Kumar Dahiya 0002 — National Institute of Thechnology Kururkshetra, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j20]Priyanka Paliwal, Julian L. Webber, Abolfazl Mehbodniya, Mohd Anul Haq, Anil Kumar, Prem Kumar Chaurasiya:
Correction to: Multi-agent-based approach for generation expansion planning in isolated micro-grid with renewable energy sources and battery storage. J. Supercomput. 79(1): 1156-1157 (2023) - 2022
- [j19]Akhilesh Kumar Sharma
, Shamik Tiwari
, Gaurav Aggarwal, Nitika Goenka
, Anil Kumar
, Prasun Chakrabarti
, Tulika Chakrabarti, Radomír Gono
, Zbigniew Leonowicz
, Michal Jasiñski
:
Dermatologist-Level Classification of Skin Cancer Using Cascaded Ensembling of Convolutional Neural Network and Handcrafted Features Based Deep Neural Network. IEEE Access 10: 17920-17932 (2022) - [j18]Nishant Raj Kapoor
, Ashok Kumar
, Anuj Kumar
, Anil Kumar
, Krishna Kumar:
Transmission Probability of SARS-CoV-2 in Office Environment Using Artificial Neural Network. IEEE Access 10: 121204-121229 (2022) - [j17]Sourabh Singh Verma, Ajay Prasad, Anil Kumar
:
CovXmlc: High performance COVID-19 detection on X-ray images using Multi-Model classification. Biomed. Signal Process. Control. 71(Part): 103272 (2022) - [j16]Karan Gupta
, Deepak Kumar Sharma
, Koyel Datta Gupta, Anil Kumar
:
A tree classifier based network intrusion detection model for Internet of Medical Things. Comput. Electr. Eng. 102: 108158 (2022) - [j15]Narendra Kumar
, Anil Kumar
, Krishna Kumar:
Color Image Contrast Enhancement Using Modified Firefly Algorithm. Int. J. Inf. Retr. Res. 12(2): 1-18 (2022) - [j14]Sarvesh Tanwar
, Anil Kumar
:
Secure key issuing scheme in ID-based cryptography with revocable ID. Inf. Secur. J. A Glob. Perspect. 31(6): 676-685 (2022) - [j13]E. Balamurugan, Abolfazl Mehbodniya, Elham Kariri, Kusum Yadav, Anil Kumar
, Mohd Anul Haq:
Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN). Pattern Recognit. Lett. 156: 142-151 (2022) - [j12]G. Revathy, K. Bhavana Raj, Anil Kumar
, Spurthi Adibatti, Priyanka Dahiya, T. M. Latha:
Investigation of E-voting system using face recognition using convolutional neural network (CNN). Theor. Comput. Sci. 925: 61-67 (2022) - [j11]Mohd Abdul Rahim Khan, Shavkatov Navruzbek Shavkatovich, Bharti Nagpal, Anil Kumar
, Mohd Anul Haq, V. Jeevika Tharini, Sathishkumar Karupusamy, Malik Bader Alazzam
:
Optimizing hybrid metaheuristic algorithm with cluster head to improve performance metrics on the IoT. Theor. Comput. Sci. 927: 87-97 (2022) - [j10]K. R. Sekar, Naga Raju M, Mohd Anul Haq, Anil Kumar
, R. Shalini, S. Poojalaxmi:
An improved ranking methodology for malignant carcinoma in multicriterian decision making using hesitant VIKOR fuzzy. Theor. Comput. Sci. 929: 81-94 (2022) - [j9]Priyanka Paliwal, Julian L. Webber, Abolfazl Mehbodniya, Mohd Anul Haq, Anil Kumar
, Prem Kumar Chaurasiya:
Multi-agent-based approach for generation expansion planning in isolated micro-grid with renewable energy sources and battery storage. J. Supercomput. 78(17): 18497-18523 (2022) - 2021
- [j8]Ajay Prasad
, Sourabh Singh Verma
, Priyanka Dahiya
, Anil Kumar
:
A Case Study on the Monitor Mode Passive Capturing of WLAN Packets in an On-the-Move Setup. IEEE Access 9: 152408-152420 (2021)
2010 – 2019
- 2017
- [j7]Mamta Jain
, Anil Kumar
, Rishabh Choudhary
:
Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem. Brain Informatics 4(2): 95-106 (2017) - [j6]Sarvesh Tanwar
, Anil Kumar
:
A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority. Int. J. Inf. Secur. Priv. 11(3): 1-14 (2017) - [j5]Mamta Jain
, Anil Kumar
:
RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem. Int. J. Mach. Learn. Cybern. 8(5): 1695-1705 (2017) - 2016
- [j4]Pushpendra Singh Sisodia, Vivekananda Tiwari, Anil Kumar Dahiya
:
Urban Sprawl Monitoring using Remote Sensing and GIS Techniques of the City Jaipur, India. Int. J. Appl. Geospat. Res. 7(3): 93-104 (2016) - [j3]Alka Chauhary, V. N. Tiwari, Anil Kumar:
A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs. Int. J. Netw. Secur. 18(3): 514-522 (2016) - 2015
- [j2]Pushpendra Singh Sisodia, Vivekanand Tiwari, Anil Kumar Dahiya
:
Measuring and Monitoring Urban Sprawl of Jaipur City using Remote Sensing and GIS. Int. J. Inf. Syst. Soc. Chang. 6(2): 46-65 (2015) - 2014
- [c5]Pushpendra Singh Sisodia, Vivekanand Tiwari, Anil Kumar
:
A comparative analysis of remote sensing image classification techniques. ICACCI 2014: 1418-1421 - 2013
- [c4]Dhiraj Pandey
, Anil Kumar
, Yudhvir Singh
:
Feature and Future of Visual Cryptography Based Schemes. QSHINE 2013: 816-830 - 2010
- [c3]Anil Kumar
, Mrinal Kanti Ghose:
Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map and 3D Cat Map. BAIP 2010: 34-38 - [c2]Anil Kumar
, Mrinal Kanti Ghose
:
Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map. ICISTM 2010: 333-338
2000 – 2009
- 2009
- [j1]Anil Kumar
, Mrinal Kanti Ghose
:
Overview of Information Security Using Genetic Algorithm and Chaos. Inf. Secur. J. A Glob. Perspect. 18(6): 306-315 (2009) - [c1]Anil Kumar
, Sucheta Sushan Ghose, Mrinal Kanti Ghose
:
An Improved Secure Data Communication Using Blind Source Separation and Chaos. ISM 2009: 358-362
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2023-01-22 02:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint