default search action
Kamred Udham Singh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Rajesh Kedarnath Navandar, Syed Hamid Hasan, Netaji Jadhav, Kamred Udham Singh, R. Monisha, N. Venkatram:
Modernizing sports an intelligent strategy for entertainment through internet of things in sports. Entertain. Comput. 52: 100804 (2025) - 2024
- [j22]Lipismita Panigrahi, Tej Bahadur Chandra, Atul Kumar Srivastava, Neeraj Varshney, Kamred Udham Singh, Shambhu Mahato:
mBCCf: Multilevel Breast Cancer Classification Framework Using Radiomic Features. Int. J. Intell. Syst. 2024: 1-24 (2024) - [j21]Anurag Sinha, Turki Aljrees, Saroj Kumar Pandey, Ankit Kumar, Pallab Banerjee, Biresh Kumar, Kamred Udham Singh, Teekam Singh, Pooja Jha:
Semi-Supervised Clustering-Based DANA Algorithm for Data Gathering and Disease Detection in Healthcare Wireless Sensor Networks (WSN). Sensors 24(1): 18 (2024) - 2023
- [j20]Ankit Kumar, Neeraj Varshney, Surbhi Bhatiya, Kamred Udham Singh:
Replication-Based Query Management for Resource Allocation Using Hadoop and MapReduce over Big Data. Big Data Min. Anal. 6(4): 465-477 (2023) - [j19]Ankit Kumar, Kamred Udham Singh, Manish Kumar:
A Clinical Data Analysis Based Diagnostic Systems for Heart Disease Prediction Using Ensemble Method. Big Data Min. Anal. 6(4): 513-525 (2023) - [j18]Ankit Kumar, Surbhi Bhatia, Rajat Bhardwaj, Kamred Udham Singh, Neeraj Varshney, Linesh Raja:
A hybrid approach for medical images classification and segmentation to reduce complexity. Innov. Syst. Softw. Eng. 19(1): 33-46 (2023) - [j17]Shakila Basheer, Kamred Udham Singh, Vandana Sharma, Surbhi Bhatia, Nilesh Pande, Ankit Kumar:
A robust NIfTI image authentication framework to ensure reliable and safe diagnosis. PeerJ Comput. Sci. 9: e1323 (2023) - [j16]Turki Aljrees, Ankit Kumar, Kamred Udham Singh, Teekam Singh:
Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm. Sensors 23(19): 8090 (2023) - [j15]Shivam, Turki Aljrees, Teekam Singh, Neeraj Varshney, Mukesh Kumar, Kamred Udham Singh, Vrince Vimal:
Influence of Spatial Dispersal among Species in a Prey-Predator Model with Miniature Predator Groups. Symmetry 15(5): 986 (2023) - 2022
- [j14]Sanjay Chakraborty, Hrithik Paul, Sayani Ghatak, Saroj Kumar Pandey, Ankit Kumar, Kamred Udham Singh, Mohd Asif Shah:
An AI-Based Medical Chatbot Model for Infectious Disease Prediction. IEEE Access 10: 128469-128483 (2022) - [j13]Kamred Udham Singh, Lalan Kumar, Surbhi Bhatia, Ankit Kumar, Alhanof Khalid Almutairi, Mohd Asif Shah:
ROI-Fuzzy Based Medical Data Authentication Scheme for Smart Healthcare System. IEEE Access 10: 132121-132131 (2022) - [j12]Kamred Udham Singh, Surbhi Bhatia, Ankit Kumar, Sandeep Kautish, Adarsh Kumar, Shakila Basheer, Alaa Ali Hameed:
A Robust NIfTI Image Authentication Framework Based on DST and Multi-Scale Otsu Thresholding. IEEE Access 10: 132608-132620 (2022) - [j11]Indrajeet Kumar, Abhishek Kumar, Visvam Devadoss Ambeth Kumar, Ramani Kannan, Vrince Vimal, Kamred Udham Singh, Mufti Mahmud:
Dense Tissue Pattern Characterization Using Deep Neural Network. Cogn. Comput. 14(5): 1728-1751 (2022) - [j10]Abhishek Kumar, Jyoti Rawat, Indrajeet Kumar, Mamoon Rashid, Kamred Udham Singh, Yasser D. Al-Otaibi, Usman Tariq:
Computer-aided deep learning model for identification of lymphoblast cell using microscopic leukocyte images. Expert Syst. J. Knowl. Eng. 39(4) (2022) - [j9]Indrajeet Kumar, Chandradeep Bhatt, Kamred Udham Singh:
Entropy based automatic unsupervised brain intracranial hemorrhage segmentation using CT images. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 2589-2600 (2022) - [j8]Abhishek Kumar, Ankit Kumar, Linesh Raja, Kamred Udham Singh:
Rediscovering the Traditional UNESCO World Heritage Hawamahal through 3D Animation and Immersive Technology. ACM Journal on Computing and Cultural Heritage 15(4): 1-34 (2022) - [j7]Lalan Kumar, Kamred Udham Singh:
Color Ultrasound Image Watermarking Scheme Using FRT and Hessenberg Decomposition for Telemedicine Applications. J. Univers. Comput. Sci. 28(9): 882-897 (2022) - [j6]Vijay Krishna Pallaw, Kamred Udham Singh:
X-Ray Image Authentication Scheme Using SLT and Contourlet Transform for Modern Healthcare System. J. Univers. Comput. Sci. 28(9): 916-929 (2022) - [j5]Kamred Udham Singh, Akshay Kumar, Teekam Singh, Mangey Ram:
Image-based decision making for reliable and proper diagnosing in NIFTI format using watermarking. Multim. Tools Appl. 81(27): 39577-39603 (2022) - 2021
- [j4]Vrince Vimal, Teekam Singh, Shamimul Qamar, Bhaskar Nautiyal, Kamred Udham Singh, Abhishek Kumar:
Artificial intelligence-based novel scheme for location area planning in cellular networks. Comput. Intell. 37(3): 1338-1354 (2021) - [j3]Chandradeep Bhatt, Indrajeet Kumar, V. Vijayakumar, Kamred Udham Singh, Abhishek Kumar:
The state of the art of deep learning models in medical science and their challenges. Multim. Syst. 27(4): 599-613 (2021) - [j2]Vrince Vimal, Kamred Udham Singh, Abhishek Kumar, Sachin Kumar Gupta, Mamoon Rashid, R. K. Saket, Sanjeevikumar Padmanaban:
Clustering Isolated Nodes to Enhance Network's Life Time of WSNs for IoT Applications. IEEE Syst. J. 15(4): 5654-5663 (2021) - [j1]Ankit Kumar, Kamred Udham Singh, Linesh Raja, Teekam Singh, Chetan Swarup, Abhishek Kumar:
Design a Framework for Content Based Image Retrieval Using Hybrid Features Analysis. Traitement du Signal 38(5): 1449-1459 (2021) - [c1]Ankit Kumar, Kamred Udham Singh, Sun-Yuan Hsieh, Visvam Devadoss Ambeth Kumar, Abhishek Kumar:
Distribution Key Scheme for Secure Group Management in VANET Using Polynomial Interpolation. SocialSec 2021: 3-14
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 01:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint