Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Practical Challenges in Implementation of Information and Communication Technology

    The Information and Communication Technology (ICT) based math’s education is having several technological, infrastructure-based, teacher and student-related challenges. The United States of America is the lead...

    Balbir Singh Dhol, Surjeet Singh Chauhan Gonder in Communication, Networks and Computing (2023)

  2. No Access

    Chapter and Conference Paper

    GA-ProM: A Genetic Algorithm for Discovery of Complete Process Models from Unbalanced Logs

    Process mining is the practise of distilling a structured process description from a series of real executions. In past decades, different process discovery algorithms have been used to generate process models...

    Sonia Deshmukh, Shikha Gupta, Naveen Kumar in Big-Data-Analytics in Astronomy, Science, … (2022)

  3. No Access

    Chapter and Conference Paper

    Improving Heart Disease Prediction Using Feature Selection Through Genetic Algorithm

    Heart disease is one of the leading causes of fatality. A reliable and robust prediction system is needed for people to take preventive measures and medication beforehand and develop a proactive lifestyle acco...

    Abdul Aleem, Gautam Prateek, Naveen Kumar in Advanced Network Technologies and Intellig… (2022)

  4. No Access

    Chapter and Conference Paper

    Detection of DDoS Attack in IoT Using Machine Learning

    Distributed Denial-of-Service (DDoS) attacks have recently increased exponentially in numbers. With the advent of the Internet-of-things (IoT), it becomes easy for attackers to perform a DDoS attack. IoT devic...

    Naveen Kumar, Abdul Aleem, Sachin Kumar in Advanced Network Technologies and Intellig… (2022)

  5. No Access

    Chapter and Conference Paper

    A Comparative Study of Prototy** Methods for HCI Design Using Cognitive Load-Based Measures

    Increased information complexity in HCI designs causes cognitive load on users. HCI design prototypes have been used in various stages of design process to assess the design quality and enable course correctio...

    Naveen Kumar, Jyotish Kumar, Jyoti Kumar in HCI International 2022 - Late Breaking Pap… (2022)

  6. No Access

    Chapter and Conference Paper

    e-Examinations: The Impact of Technology Problems on Student Experience

    This study investigated the impact of technology problems on students’ perceptions of computerised examination technology and procedures. Measures included the suitability of the assessment task to computeris...

    Mathew Hillier, Naveen Kumar in Empowering Teaching for Digital Equity and… (2020)

  7. No Access

    Chapter and Conference Paper

    Integration of Antennas for Communication System on Complex Platforms

    This paper provides an overview of the antenna integration problem with an illustration of antenna integration for the next generation railway communication systems. The influence of integration on the basic a...

    Naveen Kumar, Ozuem Chukwuka in Communication Technologies for Vehicles (2020)

  8. No Access

    Chapter and Conference Paper

    Super Resolution Land Cover Map** Using Deep Multi Scale Residual Dense Network

    Super Resolution Map** (SRM) is a land cover map** method that generates land surface cover maps at fine spatial resolution from a coarse spatial resolution Remote Sensing (RS) image. Recently deep network...

    D. Synthiya Vinothini, B. Sathya Bama in Computer Vision, Pattern Recognition, Imag… (2020)

  9. No Access

    Chapter and Conference Paper

    Distributed and Lazy Auditing of Outsourced Data

    Data outsourcing is useful for ICT organizations who need cost-effective management of resources. Auditing of outsourced data is an essential requirement for the data owner who outsources it to the untrusted t...

    Amit Kumar Dwivedi, Naveen Kumar in Distributed Computing and Internet Technol… (2020)

  10. No Access

    Chapter and Conference Paper

    A New Hybrid Backstep** Approach for the Position/Force Control of Mobile Manipulators

    Based on the conventional backstep** control scheme, a novel hybrid control law is presented which merges the advantages of the model-dependent and the intelligent-technique based model-free schemes. Further...

    Manju Rani, Dinanath, Naveen Kumar in Next Generation Computing Technologies on … (2019)

  11. No Access

    Chapter

    Opinion Mining from Social Travel Networks

    Opinions have always been an important part of daily lives as it has been a human behaviour to gather information about what other people think about the things we want to buy or the hotel we want to stay at o...

    Charu Puri, Akhil Yadav, Gaurav Jangra in Hybrid Intelligence for Social Networks (2017)

  12. No Access

    Chapter

    Security and Privacy Issues in Outsourced Personal Health Record

    E-health effectively uses information and communications technology to support health-related services for its users.

    Naveen Kumar, Anish Mathuria in Research Advances in Cloud Computing (2017)

  13. No Access

    Chapter and Conference Paper

    Comparing the Efficiency of Key Management Hierarchies for Access Control in Cloud

    This paper analyses the efficiency of user and resource-based hierarchies for read access control in cloud. It is shown that resource-based hierarchies are more efficient than user-based hierarchies in terms o...

    Naveen Kumar, Anish Mathuria, Manik Lal Das in Security in Computing and Communications (2015)

  14. No Access

    Chapter

    Diffusive Processes and Modelling: An Introduction

    Diffusion is a common natural process occurring everywhere in physical, chemical, biological, geological systems. Considering the centrality of diffusive process, understanding the effects of diffusion on diff...

    Naveen Kumar, S. K. Basu in Modelling and Simulation of Diffusive Processes (2014)

  15. No Access

    Chapter and Conference Paper

    Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme

    We propose a simple and efficient hash-based time-bound hierarchical key assignment scheme that requires a single key per user per subscription. It is more efficient than existing schemes in terms of public st...

    Naveen Kumar, Anish Mathuria, Manik Lal Das in Information Systems Security (2013)

  16. No Access

    Chapter

    Consumer Cloud: Concepts, Vendor Solutions, Industry Applications and Way Forward

    Over the years, consumers have been accessing the World Wide Web to perform one or more of the personal functions such as accessing email via messenger/phone communication; managing social and professional ide...

    Naveen Kumar, Sudhanshu Hate in Cloud Computing (2013)

  17. No Access

    Chapter and Conference Paper

    Time Based Feedback and Query Expansion for Twitter Search

    Twitter is an accepted platform among users for expressing views in a short text called a “Tweet” Application of search models to platforms like Twitter is still an open-ended question, though the creation of ...

    Naveen Kumar, Benjamin Carterette in Advances in Information Retrieval (2013)

  18. No Access

    Chapter and Conference Paper

    Design and Simulation of a 3D Actuation System for Magnetic Nano-Particles Delivery System

    In this paper, a new electromagnetic actuation system is presented for magnetic nano-particles based targeted drug delivery. The system is composed of three sets of coils; each set contains two parallel coils,...

    Mohammad Dadkhah, Naveen Kumar, Jungwon Yoon in Intelligent Robotics and Applications (2013)

  19. No Access

    Chapter and Conference Paper

    Lattice Based Associative Classifier

    Associative classification aims to discover a set of constrained association rules, called Class Association Rules (CARs). The consequent of a CAR is a singleton and is restricted to be a class label. Traditio...

    Naveen Kumar, Anamika Gupta in Intelligent Information and Database Syste… (2012)

  20. No Access

    Chapter and Conference Paper

    Mining of Multiobjective Non-redundant Association Rules in Data Streams

    Non-redundant association rule mining requires generation of both closed itemsets and their minimal generators. However, only a few researchers have addressed both the issues for data streams. Further, associa...

    Anamika Gupta, Naveen Kumar in Artificial Intelligence and Soft Computing (2012)

previous disabled Page of 2