Follow
Hari Om Ph.D. JNU
Hari Om Ph.D. JNU
Computer Science & Engineering, IIT(ISM), Dhanbad
Verified email at ismdhanbad.ac.in
Title
Cited by
Cited by
Year
A hybrid system for reducing the false alarm rate of anomaly intrusion detection system
H Om, A Kundu
2012 1st international conference on recent advances in information …, 2012
1612012
An improved image denoising method based on wavelet thresholding
H Om, M Biswas
Scientific Research Publishing, 2012
1422012
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
S Kumari, H Om
Computer Networks 104, 137-154, 2016
1042016
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC
P Chandrakar, H Om
Computer Communications 110, 26-34, 2017
912017
Distributed fuzzy approach to unequal clustering and routing algorithm for wireless sensor networks
N Mazumdar, H Om
International journal of Communication systems 31 (12), e3709, 2018
802018
MCRMR: Maximum coverage and relevancy with minimal redundancy based multi-document summarization
P Verma, H Om
Expert Systems with Applications 120, 43-56, 2019
712019
Computational neural network regression model for Host based Intrusion Detection System
SK Gautam, H Om
Perspectives in Science 8, 93-95, 2016
662016
A comparative analysis on Hindi and English extractive text summarization
P Verma, S Pal, H Om
ACM Transactions on Asian and Low-Resource Language Information Processing …, 2019
572019
Cloud computing and internet of things integration: Architecture, applications, issues, and challenges
A Malik, H Om
Sustainable cloud and energy services: Principles and practice, 1-24, 2018
562018
Newborn face recognition using deep convolutional neural network
R Singh, H Om
Multimedia Tools and Applications 76 (18), 19005-19015, 2017
522017
Data mining models for predicting oral cancer survivability
N Sharma, H Om
Network Modeling Analysis in Health Informatics and Bioinformatics 2, 285-295, 2013
472013
Efficient quantum secret sharing without a trusted player
K Sutradhar, H Om
Quantum Information Processing 19 (2), 73, 2020
462020
DUCR: Distributed unequal cluster‐based routing algorithm for heterogeneous wireless sensor networks
N Mazumdar, H Om
International Journal of Communication Systems 30 (18), e3374, 2017
442017
Detection of copy-move forgery using AKAZE and SIFT keypoint extraction
CS Prakash, PP Panzade, H Om, S Maheshkar
Multimedia Tools and Applications 78, 23535-23558, 2019
422019
A secure authentication scheme for RFID systems
P Dass, H Om
Procedia Computer Science 78, 100-106, 2016
422016
A Generalized Image Denoising Method Using Neighbouring Wavelet Coefficients
HOM Biswas
Signal Image and Video Processing 7 (2), 2013
40*2013
Distributed fuzzy logic based energy‐aware and coverage preserving unequal clustering algorithm for wireless sensor networks
N Mazumdar, H Om
International Journal of Communication Systems 30 (13), e3283, 2017
392017
Usage of probabilistic and general regression neural network for early detection and prevention of oral cancer
N Sharma, H Om
The Scientific World Journal 2015, 2015
392015
Performance of deer hunting optimization based deep learning algorithm for speech emotion recognition
G Agarwal, H Om
Multimedia Tools and Applications 80 (7), 9961-9992, 2021
382021
A generalized quantum protocol for secure multiparty summation
K Sutradhar, H Om
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (12), 2978-2982, 2020
382020
The system can't perform the operation now. Try again later.
Articles 1–20