default search action
Deepak Kumar Sharma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j65]Adarsh Kumar, Deepak Kumar Sharma:
An Efficient Data Sharing Scheme Using MultiTransaction Mode Consortium Blockchain for Smart Healthcare. Int. J. Syst. Syst. Eng. 15(5) (2025) - 2024
- [j64]Ritu Nigam, Deepak Kumar Sharma, Satbir Jain, Kartik Krishna Bhardwaj, Siddhant Banyal:
AI-enabled trust-based routing protocol for social opportunistic IoT networks. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j63]Abhay Krishna Yadav, Sudhanshu Verma, Deepak Sigroha, Gourab Das, Deepak Kumar Sharma, Anand Sharma:
Decoupling analysis for different exciting modes in MIMO DRA using absorbing surface walls. Int. J. Commun. Syst. 37(14) (2024) - [j62]Bhavya Dhingra, Vidhi Jain, Deepak Kumar Sharma, Koyel Datta Gupta, Deepika Kukreja:
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment. Int. J. Inf. Sec. 23(1): 315-330 (2024) - [j61]Ayushi Jain, Shivam Barke, Mehak Garg, Anvita Gupta, Bhawna Narwal, Amar Kumar Mohapatra, Deepak Kumar Sharma, Gautam Srivastava:
A Walkthrough of Blockchain-Based Internet of Drones Architectures. IEEE Internet Things J. 11(21): 34924-34940 (2024) - [j60]Pooja Gambhir, Amita Dev, Poonam Bansal, Deepak Kumar Sharma, Deepak Gupta:
Residual networks for text-independent speaker identification: Unleashing the power of residual learning. J. Inf. Secur. Appl. 80: 103665 (2024) - [j59]S. P. Ajith Kumar, Hardeo Kumar Thakur, Koyel Datta Gupta, Deepak Kumar Sharma:
SMART: Secured and Mobility Aware Routing Technique for Opportunistic IoT Network in Smart Cities. J. Mobile Multimedia 20(2): 335-358 (2024) - [j58]Pooja Gambhir, Amita Dev, Poonam Bansal, Deepak Kumar Sharma:
End-to-end Multi-modal Low-resourced Speech Keywords Recognition Using Sequential Conv2D Nets. ACM Trans. Asian Low Resour. Lang. Inf. Process. 23(1): 7:1-7:21 (2024) - 2023
- [j57]Koyel Datta Gupta, Kartik Singhal, Deepak Kumar Sharma, Nonita Sharma, Sharaf J. Malebary:
Fuzzy Controller-empowered Autoencoder Framework for anomaly detection in Cyber Physical Systems. Comput. Electr. Eng. 108: 108685 (2023) - [j56]Deepak Kumar Sharma, Vidhi Jain, Bhavya Dhingra, Koyel Datta Gupta, Uttam Ghosh, Waleed S. Alnumay:
A novel Hypertuned Prophet based power saving approach for IoT enabled smart homes. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j55]Salman Azeez Syed, Deepak Kumar Sharma, Gautam Srivastava:
Modeling Distributed and Configurable Hierarchical Blockchain over SDN and Fog-Based Networks for Large-Scale Internet of Things. J. Grid Comput. 21(4): 64 (2023) - [j54]Deepika Kukreja, Deepak Kumar Sharma:
ACCO: adaptive congestion control protocol for opportunistic networks. Int. J. Wirel. Mob. Comput. 25(3): 258-271 (2023) - [j53]Shrid Pant, Mehul Sharma, Deepak Kumar Sharma, Deepak Gupta, Joel J. P. C. Rodrigues:
Enforcing Intelligent Learning-Based Security in Internet of Everything. IEEE Internet Things J. 10(4): 3071-3078 (2023) - [j52]Gaurav Sharma, Deepak Kumar Sharma, Adarsh Kumar:
Role of cybersecurity and Blockchain in battlefield of things. Internet Technol. Lett. 6(3) (2023) - [j51]Koyel Datta Gupta, Deepak Kumar Sharma, Rinky Dwivedi, Gautam Srivastava:
AHDNN: Attention-Enabled Hierarchical Deep Neural Network Framework for Enhancing Security of Connected and Autonomous Vehicles. J. Circuits Syst. Comput. 32(4): 2350058:1-2350058:19 (2023) - [j50]Parul Lakhotia, Rinky Dwivedi, Deepak Kumar Sharma, Nonita Sharma:
Intrusion Detection System for IoE-Based Medical Networks. J. Database Manag. 34(2): 1-18 (2023) - [j49]Mehul Sharma, Shrid Pant, Priety Yadav, Deepak Kumar Sharma, Nitin Gupta, Gautam Srivastava:
Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks. Mob. Networks Appl. 28(2): 782-794 (2023) - [j48]Ritu Nigam, Satbir Jain, Deepak Kumar Sharma:
RF-BBFT: a random forest based multimedia big data routing technique for social opportunistic IoT networks. Multim. Tools Appl. 82(25): 39815-39839 (2023) - [j47]Koyel Datta Gupta, Deepak Kumar Sharma, Shakib Ahmed, Harsh Gupta, Deepak Gupta, Ching-Hsien Hsu:
A Novel Lightweight Deep Learning-Based Histopathological Image Classification Model for IoMT. Neural Process. Lett. 55(1): 205-228 (2023) - [j46]Abhishek Chopra, Deepak Kumar Sharma, Aashna Jha, Uttam Ghosh:
A Framework for Online Hate Speech Detection on Code-mixed Hindi-English Text and Hindi Text in Devanagari. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(5): 134:1-134:21 (2023) - [j45]Anshuman Chhabra, Kartik Patwari, Chandana Kuntala, Sristi, Deepak Kumar Sharma, Prasant Mohapatra:
Towards Fair Video Summarization. Trans. Mach. Learn. Res. 2023 (2023) - [j44]Siddhant Bagga, Deepak Kumar Sharma, Krishna Kant Singh, Akansha Singh:
Clustering Based Routing Protocol for Wireless Sensor Networks Using the Concept of Zonal Division of Network Field. J. Signal Process. Syst. 95(2-3): 115-127 (2023) - [j43]Deepak Kumar Sharma, Jahanavi Mishra, Aeshit Singh, Raghav Govil, Krishna Kant Singh, Akansha Singh:
Optimized Resource Allocation in IoT Using Fuzzy Logic and Bio-Inspired Algorithms. Wirel. Pers. Commun. 131(2): 1393-1413 (2023) - [c22]Aarti Goel, Devender Kumar, Deepak Kumar Sharma:
Cryptanalysis of an Authentication Scheme for WSN within an IoT Environment. IC3 2023: 587-590 - [c21]Anish Goyal, Archit Bhatia, Arjun Yadav, Deepak Kumar Sharma:
Misbehavior Detection in Cooperative Intelligent Transportation Systems using Temporal Fusion Transformer. ICDCN 2023: 431-437 - [c20]Deepak Kumar Sharma, Adarsh Kumar:
Blockchain for Patient Data Integrity: Decentralised Storage and Retrieval in Modern Healthcare Systems. RTIP2R (2) 2023: 355-368 - 2022
- [j42]Deepak Kumar Sharma, Shikha Brahmachari, Kartik Singhal, Deepak Gupta:
Data driven predictive maintenance applications for industrial systems with temporal convolutional networks. Comput. Ind. Eng. 169: 108213 (2022) - [j41]Karan Gupta, Deepak Kumar Sharma, Koyel Datta Gupta, Anil Kumar:
A tree classifier based network intrusion detection model for Internet of Medical Things. Comput. Electr. Eng. 102: 108158 (2022) - [j40]Deepak Kumar Sharma, Jahanavi Mishra, Aeshit Singh, Raghav Govil, Gautam Srivastava, Jerry Chun-Wei Lin:
Explainable Artificial Intelligence for Cybersecurity. Comput. Electr. Eng. 103: 108356 (2022) - [j39]Koyel Datta Gupta, Rinky Dwivedi, Deepak Kumar Sharma:
Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model. Open Comput. Sci. 12(1): 27-36 (2022) - [j38]Renu Dalal, Manju Khari, Aakash Kumar, Deepak Kumar Sharma:
Evaluation of Assocation Rule-based Routing Protocol for OppNet. Mechatron. Syst. Control. 50(2) (2022) - [j37]Deepak Kumar Sharma, Sanjay K. Dhurandher, Shubham Kumaram, Koyel Datta Gupta, Pradip Kumar Sharma:
Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems. Comput. Commun. 189: 182-192 (2022) - [j36]Deepak Kumar Sharma, Parul Lakhotia, Paras Sain, Shikha Brahmachari:
Early prediction and monitoring of sepsis using sequential long short term memory model. Expert Syst. J. Knowl. Eng. 39(3) (2022) - [j35]Aarti Goel, Deepak Kumar Sharma, Koyel Datta Gupta:
LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks. Expert Syst. J. Knowl. Eng. 39(5) (2022) - [j34]Rinki Singh, Deepika Kukreja, Deepak Kumar Sharma:
Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review. Frontiers Big Data 5 (2022) - [j33]Deepak Kumar Sharma, Kartik Krishna Bhardwaj, Siddhant Banyal, Riyanshi Gupta, Nitin Gupta, Lewis Nkenyereye:
An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security. IEEE Internet Things J. 9(4): 2505-2512 (2022) - [j32]S. P. Ajith Kumar, Siddhant Banyal, Kartik Krishna Bhardwaj, Hardeo Kumar Thakur, Deepak Kumar Sharma:
Distributed probability density based multi-objective routing for Opp-IoT networks enabled by machine learning. J. Intell. Fuzzy Syst. 42(2): 1199-1211 (2022) - [j31]Ritu Nigam, Deepak Kumar Sharma, Satbir Jain, Gautam Srivastava:
A Local Betweenness Centrality Based Forwarding Technique for Social Opportunistic IoT Networks. Mob. Networks Appl. 27(2): 547-562 (2022) - [j30]Nikola Pavlovic, Marko Sarac, Sasa Z. Adamovic, Muzafer Saracevic, Khaleel Ahmad, Nemanja Macek, Deepak Kumar Sharma:
An approach to adding simple interface as security gateway architecture for IoT device. Multim. Tools Appl. 81(26): 36931-36946 (2022) - [j29]Deepak Kumar Sharma, Utsha Sinha, Aditi Gupta, Manju Khari:
Modified minimum spanning tree based vertical fragmentation, allocation and replication approach in distributed multimedia databases. Multim. Tools Appl. 81(26): 37101-37118 (2022) - [j28]Deepak Kumar Sharma, Anurag Singh, Sudhir Kumar Sharma, Gautam Srivastava, Jerry Chun-Wei Lin:
Task-specific image summaries using semantic information and self-supervision. Soft Comput. 26(16): 7581-7594 (2022) - [j27]Koyel Datta Gupta, Ritu Nigam, Deepak Kumar Sharma, Sanjay K. Dhurandher:
LSTM-Based Energy-Efficient Wireless Communication With Reconfigurable Intelligent Surfaces. IEEE Trans. Green Commun. Netw. 6(2): 704-712 (2022) - [j26]Ansh Riyal, Geetansh Kumar, Deepak Kumar Sharma, Koyel Datta Gupta, Gautam Srivastava:
Blockchain Tree Powered Green Communication for Efficient and Sustainable Connected Autonomous Vehicles. IEEE Trans. Green Commun. Netw. 6(3): 1428-1437 (2022) - [j25]Kartik Saxena, Nitin Gupta, Jahnvi Gupta, Deepak Kumar Sharma, Kapal Dev:
Trajectory optimization for the UAV assisted data collection in wireless sensor networks. Wirel. Networks 28(4): 1785-1796 (2022) - [i7]Gaurav Sharma, Deepak Kumar Sharma, Adarsh Kumar:
Role of Cybersecurity and Blockchain in Battlefield of Things. CoRR abs/2212.11562 (2022) - 2021
- [j24]Deepak Kumar Sharma, Tarun Dhankhar, Gaurav Agrawal, Satish Kumar Singh, Deepak Gupta, Jamel Nebhen, Imran Razzak:
Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks. Ad Hoc Networks 121: 102603 (2021) - [j23]Avinash Swaminathan, Mridul Chaba, Deepak Kumar Sharma, Uttam Ghosh:
GraphNET: Graph Neural Networks for routing optimization in Software Defined Networks. Comput. Commun. 178: 169-182 (2021) - [j22]Mehul Sharma, Shrid Pant, Deepak Kumar Sharma, Koyel Datta Gupta, Vidushi Vashishth, Anshuman Chhabra:
Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions. Trans. Emerg. Telecommun. Technol. 32(7) (2021) - [j21]Adarsh Kumar, Deepak Kumar Sharma:
A multidimensional-multilayered anomaly detection in RFID-sensor integrated internet of things network. Int. J. Cloud Comput. 10(5/6): 613-632 (2021) - [j20]Varan Singh Rohila, Nitin Gupta, Amit Kaul, Deepak Kumar Sharma:
Deep learning assisted COVID-19 detection using full CT-scans. Internet Things 14: 100377 (2021) - [j19]Siddhant Banyal, Siddharth Banyal, Deepak Kumar Sharma:
Computational Intelligence and IoT-Enabled COVID-19 Response: Technology Landscape. IEEE Internet Things Mag. 4(3): 42-47 (2021) - [j18]Deepak Kumar Sharma, Manish Devgan, Gaurav Malik, Prashant Dutt, Aarti Goel, Deepak Gupta, Fadi M. Al-Turjman:
DDoS prevention architecture using anomaly detection in fog-empowered networks. J. Ambient Intell. Smart Environ. 13(3): 201-217 (2021) - [j17]Siddhant Banyal, Kartik Krishna Bharadwaj, Deepak Kumar Sharma, Ashish Khanna, Joel J. P. C. Rodrigues:
HiLSeR: Hierarchical learning-based sectionalised routing paradigm for pervasive communication and Resource efficiency in opportunistic IoT network. Sustain. Comput. Informatics Syst. 30: 100508 (2021) - 2020
- [j16]Deepak Kumar Sharma, Sarthak Gupta, Shubham Malik, Rohit Kumar:
Latency-aware reinforced routing for opportunistic networks. IET Commun. 14(17): 2981-2989 (2020) - [j15]Shubham Kumaram, Shefali Srivastava, Deepak Kumar Sharma:
Neural network-based routing protocol for opportunistic networks with intelligent water drop optimization. Int. J. Commun. Syst. 33(8) (2020) - [j14]Adarsh Kumar, Deepak Kumar Sharma, Anand Nayyar, Saurabh Singh, Byungun Yoon:
Lightweight Proof of Game (LPoG): A Proof of Work (PoW)'s Extended Lightweight Consensus Algorithm for Wearable Kidneys. Sensors 20(10): 2868 (2020) - [j13]Deepak Kumar Sharma, Joel J. P. C. Rodrigues, Vidushi Vashishth, Anirudh Khanna, Anshuman Chhabra:
RLProph: a dynamic programming based reinforcement learning approach for optimal routing in opportunistic IoT networks. Wirel. Networks 26(6): 4319-4338 (2020) - [c19]Vaishali Soni, Deepika Kukreja, Deepak Kumar Sharma:
Security vs. Flexibility: Striking a Balance in the Pandemic Era. IEEE ANTS 2020: 1-5
2010 – 2019
- 2019
- [j12]Vidushi Vashishth, Anshuman Chhabra, Deepak Kumar Sharma:
GMMR: A Gaussian mixture model based unsupervised machine learning approach for optimal routing in opportunistic IoT networks. Comput. Commun. 134: 138-148 (2019) - [j11]Deepika Kukreja, Deepak Kumar Sharma, Sanjay K. Dhurandher, B. V. Ramana Reddy:
GASER: genetic algorithm-based secure and energy aware routing protocol for sparse mobile ad hoc networks. Int. J. Adv. Intell. Paradigms 13(1/2): 230-259 (2019) - [j10]Deepak Kumar Sharma, Sanjay Kumar Dhurandher, Divyansh Agarwal, Kunal Arora:
kROp: k-Means clustering based routing protocol for opportunistic networks. J. Ambient Intell. Humaniz. Comput. 10(4): 1289-1306 (2019) - [j9]Deepak Kumar Sharma, Deepika Kukreja, Samarth Chugh, Shubham Kumaram:
Supernode routing: a grid-based message passing scheme for sparse opportunistic networks. J. Ambient Intell. Humaniz. Comput. 10(4): 1307-1324 (2019) - [j8]Ritu Nigam, Deepak Kumar Sharma, Satbir Jain, Sarthak Gupta, Shilpa Ghosh:
Bonding Based Technique for message forwarding in Social Opportunistic Network. Scalable Comput. Pract. Exp. 20(1): 1-15 (2019) - [j7]Deepak Kumar Sharma, Deepika Kukreja:
Establishing Reliability for Efficient Routing in Opportunistic Networks. Scalable Comput. Pract. Exp. 20(1): 27-40 (2019) - [c18]Siddhant Bagga, Anish Goyal, Geetanshu Gupta, Deepak Kumar Sharma:
FLBCR: Fuzzy Logic Based Clustering Routing Protocol. ICCCNT 2019: 1-7 - [c17]Vidushi Vashishth, Anshuman Chhabra, Deepak Kumar Sharma:
A Machine Learning Approach Using Classifier Cascades for Optimal Routing in Opportunistic Internet of Things Networks. SECON 2019: 1-9 - 2018
- [j6]Anshuman Chhabra, Vidushi Vashishth, Deepak Kumar Sharma:
A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks. Int. J. Commun. Syst. 31(4) (2018) - [j5]Deepak Kumar Sharma, Deepika Kukreja, Pranav Aggarwal, Manpreet Kaur, Ayushee Sachan:
Poisson's probability-based Q-Routing techniques for message forwarding in opportunistic networks. Int. J. Commun. Syst. 31(11) (2018) - [c16]Deepak Kumar Sharma, Sumit Vohra, Tarun Gupta, Vipul Goyal:
Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted Trees. IC3 2018: 1-6 - [c15]Deepak Kumar Sharma, Gurmehr Sohi, Hitesh Dhankhar, Mayank Yadav:
Direct Perceptive Routing Protocol for Opportunistic Networks. IC3 2018: 1-6 - [i6]Anshuman Chhabra, Vidushi Vashishth, Anirudh Khanna, Deepak Kumar Sharma, Jyotsna Singh:
An Energy Efficient Routing Protocol for Wireless Internet-of-Things Sensor Networks. CoRR abs/1808.01039 (2018) - 2017
- [j4]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Aakanksha Saini:
An energy-efficient history-based routing scheme for opportunistic networks. Int. J. Commun. Syst. 30(7) (2017) - [c14]Anshuman Chhabra, Vidushi Vashishth, Deepak Kumar Sharma:
SEIR: A Stackelberg game based approach for energy-aware and incentivized routing in selfish Opportunistic Networks. CISS 2017: 1-6 - [c13]Anshuman Chhabra, Vidushi Vashishth, Deepak Kumar Sharma:
A game theory based secure model against Black hole attacks in Opportunistic Networks. CISS 2017: 1-6 - [c12]Deepak Kumar Sharma, Aayush, Abhishek Sharma, Jaideep Kumar:
KNNR: K-nearest neighbour classification based routing protocol for opportunistic networks. IC3 2017: 1-6 - [c11]Deepak Kumar Sharma, Anurag Singh, Anshul Khanna, Anubhav Jain:
Evaluation of parameters and techniques for genetic algorithm based channel allocation in Cognitive Radio Networks. IC3 2017: 1-6 - [c10]Deepak Kumar Sharma, Sanjay Kumar Dhurandher, Isaac Woungang, Aman Bansal, Apoorv Gupta:
GD-CAR: A Genetic Algorithm Based Dynamic Context Aware Routing Protocol for Opportunistic Networks. NBiS 2017: 611-622 - 2016
- [c9]Sanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Deepak Kumar Sharma, Kunal Arora, Divyansh Agarwal:
EDR: An Encounter and Distance Based Routing Protocol for Opportunistic Networks. AINA 2016: 297-302 - [c8]Deepak Kumar Sharma, Sanjay K. Dhurandher, Mohammad S. Obaidat, Sahil Pruthi, Balqies Sadoun:
A priority based message forwarding scheme for Opportunistic Networks. CITS 2016: 1-5 - 2015
- [j3]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Aakanksha Saini:
Efficient routing based on past information to predict the future location for message passing in infrastructure-less opportunistic networks. J. Supercomput. 71(5): 1694-1711 (2015) - 2014
- [j2]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Rohan Gupta, Sanjay Garg:
GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks. J. Supercomput. 69(3): 1183-1214 (2014) - [c7]Deepak Kumar Sharma, Naveen Prakash, Himani Sharma, Dheerendra Singh:
Automatic construction of process template from business rule. IC3 2014: 419-424 - [c6]Naveen Prakash, Deepak Kumar Sharma, Dheerendra Singh:
Business Rules for Business Governance. ICEIS (3) 2014: 360-367 - 2013
- [j1]Sanjay Kumar Dhurandher, Deepak Kumar Sharma, Isaac Woungang:
Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks. J. Internet Serv. Inf. Secur. 3(1/2): 37-48 (2013) - [c5]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Shruti Bhati:
HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks. AINA 2013: 931-936 - [c4]Naveen Prakash, Deepak Kumar Sharma, Deepika Prakash, Dheerendra Singh:
A Framework for Business Rules. ER Workshops 2013: 68-73 - [c3]Sanjay K. Dhurandher, Deepak Kumar Sharma, Isaac Woungang:
Mobility Models-Based Performance Evaluation of the History Based Prediction for Routing Protocol for Infrastructure-Less Opportunistic Networks. MobiQuitous 2013: 757-767 - 2012
- [c2]Rashmi Rohankar, Rinkoo Bhatia, Vineet Shrivastava, Deepak Kumar Sharma:
Performance analysis of various routing protocols (proactive and reactive) for random mobility models of Adhoc networks. RAIT 2012: 331-335 - [i5]Sachin Lakra, T. V. Prasad, Shree Harsh Atrey, Deepak Kumar Sharma:
A Metric for the Activeness of a Distributed Object Oriented Component Library. CoRR abs/1209.4453 (2012) - [i4]Sachin Lakra, T. V. Prasad, Deepak Kumar Sharma, Shree Harsh Atrey, Anubhav Kumar Sharma:
Application of Fuzzy Mathematics to Speech-to-Text Conversion by Elimination of Paralinguistic Content. CoRR abs/1209.4535 (2012) - [i3]Sachin Lakra, Deepak Kumar Sharma, Jugnesh Kumar, Ramesh Chandra Verma, T. V. Prasad:
A Metric for the Activeness of a Class. CoRR abs/1209.4634 (2012) - [i2]Sachin Lakra, Deepak Kumar Sharma:
DolNet: A Division Of Labour Based Distributed Object Oriented Software Process Model. CoRR abs/1209.4635 (2012) - [i1]Sachin Lakra, T. V. Prasad, Deepak Kumar Sharma, Shree Harsh Atrey, Anubhav Kumar Sharma:
A Neuro-Fuzzy Technique for Implementing the Half-Adder Circuit Using the CANFIS Model. CoRR abs/1209.4895 (2012) - 2011
- [c1]Sanjay Kumar Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Han-Chieh Chao:
Performance evaluation of various routing protocols in Opportunistic Networks. GLOBECOM Workshops 2011: 1067-1071
Coauthor Index
aka: Sanjay Kumar Dhurandher
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint