关注
Hari Om Ph.D. JNU
Hari Om Ph.D. JNU
Computer Science & Engineering, IIT(ISM), Dhanbad
在 ismdhanbad.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
A hybrid system for reducing the false alarm rate of anomaly intrusion detection system
H Om, A Kundu
2012 1st international conference on recent advances in information …, 2012
1632012
An improved image denoising method based on wavelet thresholding
H Om, M Biswas
Scientific Research Publishing, 2012
1432012
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
S Kumari, H Om
Computer Networks 104, 137-154, 2016
1062016
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC
P Chandrakar, H Om
Computer Communications 110, 26-34, 2017
912017
Distributed fuzzy approach to unequal clustering and routing algorithm for wireless sensor networks
N Mazumdar, H Om
International journal of Communication systems 31 (12), e3709, 2018
852018
MCRMR: Maximum coverage and relevancy with minimal redundancy based multi-document summarization
P Verma, H Om
Expert Systems with Applications 120, 43-56, 2019
752019
Computational neural network regression model for Host based Intrusion Detection System
SK Gautam, H Om
Perspectives in Science 8, 93-95, 2016
682016
A comparative analysis on Hindi and English extractive text summarization
P Verma, S Pal, H Om
ACM Transactions on Asian and Low-Resource Language Information Processing …, 2019
592019
Cloud computing and internet of things integration: Architecture, applications, issues, and challenges
A Malik, H Om
Sustainable cloud and energy services: Principles and practice, 1-24, 2018
572018
Newborn face recognition using deep convolutional neural network
R Singh, H Om
Multimedia Tools and Applications 76 (18), 19005-19015, 2017
522017
Efficient quantum secret sharing without a trusted player
K Sutradhar, H Om
Quantum Information Processing 19 (2), 73, 2020
512020
Data mining models for predicting oral cancer survivability
N Sharma, H Om
Network Modeling Analysis in Health Informatics and Bioinformatics 2, 285-295, 2013
482013
A generalized quantum protocol for secure multiparty summation
K Sutradhar, H Om
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (12), 2978-2982, 2020
442020
DUCR: Distributed unequal cluster‐based routing algorithm for heterogeneous wireless sensor networks
N Mazumdar, H Om
International Journal of Communication Systems 30 (18), e3374, 2017
442017
A secure authentication scheme for RFID systems
P Dass, H Om
Procedia Computer Science 78, 100-106, 2016
442016
Detection of copy-move forgery using AKAZE and SIFT keypoint extraction
CS Prakash, PP Panzade, H Om, S Maheshkar
Multimedia Tools and Applications 78, 23535-23558, 2019
432019
Usage of probabilistic and general regression neural network for early detection and prevention of oral cancer
N Sharma, H Om
The Scientific World Journal 2015 (1), 234191, 2015
422015
Performance of deer hunting optimization based deep learning algorithm for speech emotion recognition
G Agarwal, H Om
Multimedia Tools and Applications 80 (7), 9961-9992, 2021
412021
Distributed fuzzy logic based energy‐aware and coverage preserving unequal clustering algorithm for wireless sensor networks
N Mazumdar, H Om
International Journal of Communication Systems 30 (13), e3283, 2017
402017
A Generalized Image Denoising Method Using Neighbouring Wavelet Coefficients
HOM Biswas
Signal Image and Video Processing 7 (2), 2013
40*2013
系统目前无法执行此操作,请稍后再试。
文章 1–20