default search action
Geeta Sikka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Samarth Godara, Geeta Sikka, Rajender Parsad, Sudeep Marwaha, Mukhtar Ahmad Faiz, Ram Swaroop Bana:
Pony: Leveraging m-Graphs and Pruned-BFS Algorithm to Elevate AI-Powered Low-Cost Self-Driving Robotics. IEEE Access 12: 134185-134197 (2024) - [j42]Suchi Jain, Geeta Sikka, Renu Dhir:
A systematic literature review on pancreas segmentation from traditional to non-supervised techniques in abdominal medical images. Artif. Intell. Rev. 57(12): 317 (2024) - [j41]Suchi Jain, Renu Dhir, Geeta Sikka:
View adaptive unified self-supervised technique for abdominal organ segmentation. Comput. Biol. Medicine 177: 108659 (2024) - [j40]Raj Mohan Singh, Geeta Sikka, Lalit Kumar Awasthi:
Energy Conscious Squirrel Search based Task Scheduling Mechanism in Fog Environment. Trans. Emerg. Telecommun. Technol. 35(10) (2024) - [j39]Samayveer Singh, Aridaman Singh Nandan, Geeta Sikka, Aruna Malik, Neeraj Kumar:
A Genetic-Algorithm-Based Dynamic Transmission of Data for Communicable Disease in IoMT Environment. IEEE Internet Things J. 11(1): 1427-1438 (2024) - [j38]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
Integrating semantic similarity with Dirichlet multinomial mixture model for enhanced web service clustering. Knowl. Inf. Syst. 66(4): 2327-2353 (2024) - [j37]Priyavrat Chauhan, Nonita Sharma, Geeta Sikka:
On the importance of pre-processing in small-scale analyses of twitter: a case study of the 2019 Indian general election. Multim. Tools Appl. 83(7): 19219-19258 (2024) - [j36]Raj Mohan Singh, Geeta Sikka, Lalit Kumar Awasthi:
LBATSM: Load Balancing Aware Task Selection and Migration Approach in Fog Computing Environment. IEEE Syst. J. 18(2): 796-804 (2024) - [j35]Karan Verma, Geeta Sikka, Aman Swaraj, Sudesh Kumar, Ashok Kumar:
Classification of COVID-19 on Chest X-Ray Images Using Deep Learning Model with Histogram Equalization and Lung Segmentation. SN Comput. Sci. 5(4): 379 (2024) - [j34]Urvashi Bansal, Geeta Sikka, Lalit Kumar Awasthi, Bharat K. Bhargava:
Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis. IEEE Trans. Dependable Secur. Comput. 21(1): 298-308 (2024) - 2023
- [j33]Pushpendra Kumar Rajput, Geeta Sikka:
Multi-agent architecture approach for self-healing systems: Run-time recovery with case-based reasoning. Concurr. Comput. Pract. Exp. 35(1) (2023) - [j32]Raj Mohan Singh, Lalit Kumar Awasthi, Geeta Sikka:
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review. ACM Comput. Surv. 55(3): 50:1-50:43 (2023) - [j31]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
WGSDMM+GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding. Future Gener. Comput. Syst. 145: 254-266 (2023) - [j30]Suchi Jain, Geeta Sikka, Renu Dhir:
An automatic cascaded approach for pancreas segmentation via an unsupervised localization using 3D CT volumes. Multim. Syst. 29(4): 2337-2349 (2023) - [j29]Priyavrat Chauhan, Nonita Sharma, Geeta Sikka:
Application of Twitter sentiment analysis in election prediction: a case study of 2019 Indian general election. Soc. Netw. Anal. Min. 13(1): 88 (2023) - [j28]Priyavrat Chauhan, Nonita Sharma, Geeta Sikka:
Correction to: Application of Twitter sentiment analysis in election prediction: a case study of 2019 Indian general election. Soc. Netw. Anal. Min. 13(1): 93 (2023) - [c4]Devesh Kumar, Geeta Sikka, Samayveer Singh:
Robust Semi-supervised Medical Image Classification: Leveraging Reliable Pseudo-labels. CVIP (3) 2023: 27-38 - 2022
- [j27]Samayveer Singh, Aridaman Singh Nandan, Geeta Sikka, Aruna Malik, Ankit Vidyarthi:
A secure energy-efficient routing protocol for disease data transmission using IoMT. Comput. Electr. Eng. 101: 108113 (2022) - [j26]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation. Comput. Sci. Rev. 45: 100498 (2022) - [j25]Harleen Kaur, Geeta Sikka:
Enriching module dependency graphs for improved software clustering. Int. J. Syst. Syst. Eng. 12(1) (2022) - [j24]Geeta Sikka, Harleen Kaur:
Enriching Module Dependency Graphs for Improved Software Clustering. Int. J. Syst. Syst. Eng. 12(1) (2022) - 2021
- [j23]Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi:
An ensemble approach for optimization of penetration layout in wide area networks. Comput. Commun. 174: 61-74 (2021) - [j22]Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi:
Empirical risk assessment of attack graphs using time to compromise framework. Int. J. Inf. Comput. Secur. 16(1/2): 33-50 (2021) - [j21]Priyavrat Chauhan, Nonita Sharma, Geeta Sikka:
The emergence of social media data and sentiment analysis in election prediction. J. Ambient Intell. Humaniz. Comput. 12(2): 2601-2627 (2021) - [j20]Pushpendra Kumar Rajput, Geeta Sikka:
Multi-agent architecture for fault recovery in self-healing systems. J. Ambient Intell. Humaniz. Comput. 12(2): 2849-2866 (2021) - [c3]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
Comparative Study of Topic Modeling and Word Embedding Approaches for Web Service Clustering. IC3 2021: 309-313 - 2020
- [j19]Utsav Upadhyay, Geeta Sikka:
STDADS: An Efficient Slow Task Detection Algorithm for Deadline Schedulers. Big Data 8(1): 62-69 (2020) - [j18]Utsav Upadhyay, Geeta Sikka:
MRS-DP: Improving Performance and Resource Utilization of Big Data Applications with Deadlines and Priorities. Big Data 8(4): 323-331 (2020) - [j17]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
Enhancing web service clustering using Length Feature Weight Method for service description document vector space representation. Expert Syst. Appl. 161: 113682 (2020) - [j16]Manoj Kumar, Harsh Kumar Verma, Geeta Sikka:
A secure data transmission protocol for cloud-assisted edge-Internet of Things environment. Trans. Emerg. Telecommun. Technol. 31(6) (2020) - [j15]Aarti, Geeta Sikka, Renu Dhir:
Grey relational classification algorithm for software fault proneness with SOM clustering. Int. J. Data Min. Model. Manag. 12(1): 28-64 (2020) - [j14]Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi:
Evaluation of web service clustering using Dirichlet Multinomial Mixture model based approach for Dimensionality Reduction in service representation. Inf. Process. Manag. 57(4): 102238 (2020) - [j13]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
A Reversible Data Hiding Scheme for Interpolated Images Based on Pixel Intensity Range. Multim. Tools Appl. 79(25-26): 18005-18031 (2020)
2010 – 2019
- 2019
- [j12]Manoj Kumar, Harsh Kumar Verma, Geeta Sikka:
A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments. Trans. Emerg. Telecommun. Technol. 30(4) (2019) - [j11]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
A high capacity data hiding scheme using modified AMBTC compression technique. Int. Arab J. Inf. Technol. 16(1): 148-155 (2019) - [j10]Pushpendra Kumar Rajput, Geeta Sikka:
Exploration in adaptiveness to achieve automated fault recovery in self-healing software systems: A review. Intell. Decis. Technol. 13(3): 329-341 (2019) - [j9]Aarti, Geeta Sikka, Renu Dhir:
Threshold-based empirical validation of object-oriented metrics on different severity levels. Int. J. Intell. Eng. Informatics 7(2/3): 231-262 (2019) - 2018
- [j8]Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi:
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities. Comput. Secur. 77: 349-359 (2018) - [j7]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidimens. Syst. Signal Process. 29(4): 1801-1818 (2018) - [c2]Utsav Upadhyay, Geeta Sikka:
Reducing Stage Weight Estimation Error of Slow Task Detection in MapReduce Scheduling. AMLTA 2018: 284-291 - 2017
- [j6]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multim. Tools Appl. 76(11): 13025-13046 (2017) - [j5]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
A high payload data hiding scheme based on modified AMBTC technique. Multim. Tools Appl. 76(12): 14151-14167 (2017) - [j4]Aruna Malik, Geeta Sikka, Harsh Kumar Verma:
Image interpolation based high capacity reversible data hiding scheme. Multim. Tools Appl. 76(22): 24107-24123 (2017) - [j3]Aarti, Geeta Sikka, Renu Dhir:
An investigation on the effect of cross project data for prediction accuracy. Int. J. Syst. Assur. Eng. Manag. 8(2): 352-377 (2017) - 2015
- [c1]Shallu Sarvari, Paramvir Singh, Geeta Sikka:
Efficient and Scalable Collection of Dynamic Metrics Using MapReduce. APSEC 2015: 127-134 - 2014
- [j2]Surabhi Midha, Ajay K. Sharma, Geeta Sikka:
A survey on wireless sensor network clustering protocols optimized via game theory. SIGBED Rev. 11(3): 8-18 (2014) - 2011
- [j1]Syona Gupta, Geeta Sikka, Harsh Kumar Verma:
Recent methods for software effort estimation by analogy. ACM SIGSOFT Softw. Eng. Notes 36(4): 1-5 (2011) - 2010
- [i1]Amanpreet Kaur, Renu Dhir, Geeta Sikka:
A New Image Steganography Based On First Component Alteration Technique. CoRR abs/1001.1972 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint