Devanagari handwritten text segmentation for overlapping and conjunct characters-A proficient technique B Thakral, M Kumar Proceedings of 3rd International Conference on Reliability, Infocom …, 2014 | 33 | 2014 |
Contrast enhancement using improved adaptive gamma correction with weighting distribution technique S Rani, M Kumar International Journal of Computer Applications 101 (11), 2014 | 24 | 2014 |
Ensuring privacy in opportunistic network M Goyal, M Chaudhary International Journal of Computer Applications 76 (4), 2013 | 14 | 2013 |
Study of various copy move forgery attack detection techniques in digital images G Kaur, M Kumar International Journal of Research in Computer Applications and Robotics 3 (9 …, 2015 | 11 | 2015 |
A Review on Detection of Session Hijacking and Ip Spoofing AK Bharti, M Goyal, M Chaudhary International Journal of Advanced Research in Computer Science 4 (9), 2013 | 9 | 2013 |
Dynamic and Static Energy Efficient Scheduling of Task Graphs on Multiprocessors: A Heuristic M Kumar, L Kaur, J Singh IEEE Access 8, 176351-176362, 2020 | 7 | 2020 |
Prevention of Session Hijacking and Ipspoofing with Sensor Nodes and Cryptographic Approach AK Bharti, M Chaudhary International Journal of Computer Applications 76 (9), 2013 | 7 | 2013 |
An Efficient Resource Block Allocation in LTE System R Kaur, M Kumar International Journal of Advanced Research in Computer Science and Software …, 2013 | 6 | 2013 |
A Review on Text Line Segmentation Problems and Techniques of Gurumukhi Handwritten Scripts E Snehdeep, EM Chaudhary International Journal of Computer Science, Engineering and Information …, 2014 | 4* | 2014 |
A survey on web page change detection system using different approaches MC Shobhna International Journal of Computer Science and Mobile Computing 2 (6), 294-299, 2013 | 4 | 2013 |
Thermal aware learning based CPU governor M Kumar, SS Sran, L Kaur, J Singh Concurrency and Computation: Practice and Experience 34 (11), e6862, 2022 | 3 | 2022 |
Segmentation of Connected Components and Overlapping Lines in Gurumukhi Handwritten Documents M Kumar International Journal of Computer Applications 102 (13), 2014 | 3 | 2014 |
A Survey of Routing Protocols forOpportunistic Mobile Adhoc Networks M Goyal, MCA Bharti International Journal of Advanced Research in Computer Science 4 (9), 2013 | 2 | 2013 |
A Review of Image Contrast Enhancement Techniques S Rani, M Kumar | 1 | 2013 |
A REVIEW ON EFFICIENT RESOURCE BLOCK ALLOCATION IN LTE SYSTEM R Kaur, M Kumar | 1 | 2013 |
Intrusion Response System in AODV for MANET M Kumar, A Girdhar International Journal of Computer Applications 975, 8887, 2010 | 1 | 2010 |
An Inside Attack Assessment Model For Infrastructure As A Service In Cloud Trust SSS Jasdeep Singh, Manoj Kumar International Journal of Science and Technology Research 8 (01), 1156-1161, 2020 | | 2020 |
Review Paper on LEACH and Its Descendant Protocols in Wireless Sensor Networks E Kiranjot, M Kumar International Journal of Latest Technology in Engineering, Management …, 2017 | | 2017 |
STUDY OF EXEMPLAR BASED IMAGE INPAINTING TECHNIQUES A Kaur, M Kumar | | 2015 |
A Review on Delay Optimization in Vehicular Ad Hoc Networks Using Ant Colony Optimization and WIMAX S Rani, M Chaudhary | | 2013 |