default search action
Nasib Singh Gill
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Deepak, Preeti Gulia, Nasib Singh Gill, Mohammad A. Yahya, Punit Gupta, Prashant Kumar Shukla, Piyush Kumar Shukla:
Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review. IEEE Access 12: 31197-31227 (2024) - [j31]Deepak, Preeti Gulia, Nasib Singh Gill, Mohammad A. Yahya, Punit Gupta, Prashant Kumar Shukla, Piyush Kumar Shukla:
Corrections to "Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review". IEEE Access 12: 112354 (2024) - [j30]Sangeeta Duhan, Preeti Gulia, Nasib Singh Gill, Mohammad A. Yahya, Sangeeta Yadav, Mohamed M. Hassan, Hassan Alsberi, Piyush Kumar Shukla:
An analysis to investigate plant disease identification based on machine learning techniques. Expert Syst. J. Knowl. Eng. 41(8) (2024) - [j29]Ayushi Chahal, Preeti Gulia, Nasib Singh Gill, Nishat Sultana:
Aquila Optimizer-Based Hybrid Predictive Model for Traffic Congestion in an IoT-Enabled Smart City. Int. J. Intell. Syst. 2024: 1-20 (2024) - [j28]Aarti Punia, Preeti Gulia, Nasib Singh Gill, Ebuka Ibeke, Celestine Iwendi, Piyush Kumar Shukla:
A systematic review on blockchain-based access control systems in cloud environment. J. Cloud Comput. 13(1): 146 (2024) - [j27]Deepti Rani, Nasib Singh Gill, Preeti Gulia:
A forensic framework to improve digital image evidence administration in IIoT✰. J. Ind. Inf. Integr. 38: 100568 (2024) - [j26]Chhaya Gupta, Nasib Singh Gill, Preeti Gulia, Sangeeta Yadav, Jyotir Moy Chatterjee:
A novel finetuned YOLOv8 model for real-time underwater trash detection. J. Real Time Image Process. 21(2): 48 (2024) - [j25]Ashish Saini, Nasib Singh Gill, Preeti Gulia:
Gray scale image denoising technique using regression based residual learning. Multim. Tools Appl. 83(2): 3547-3566 (2024) - [j24]Chhaya Gupta, Nasib Singh Gill, Preeti Gulia, Sangeeta Yadav, Giovanni Pau, Mohammad Alibakhshikenari, Xiangjie Kong:
A Real-Time 3-Dimensional Object Detection Based Human Action Recognition Model. IEEE Open J. Comput. Soc. 5: 14-26 (2024) - [j23]Sangeeta Yadav, Preeti Gulia, Nasib Singh Gill, Ishaani Priyadarshini, Rohit Sharma, Kusum Yadav, Ahmed Alkhayyat:
Video Object Detection From Compressed Formats for Modern Lightweight Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 4507-4514 (2024) - [j22]Sangeeta Yadav, Preeti Gulia, Nasib Singh Gill, Mohammad A. Yahya, Piyush Kumar Shukla, Piyush Kumar Pareek, Prashant Kumar Shukla:
A video compression-cum-classification network for classification from compressed video streams. Vis. Comput. 40(11): 7539-7558 (2024) - 2023
- [j21]Deepti Rani, Nasib Singh Gill, Preeti Gulia, Fabio Arena, Giovanni Pau:
Design of an Intrusion Detection Model for IoT-Enabled Smart Home. IEEE Access 11: 52509-52526 (2023) - [j20]Ayushi Chahal, Preeti Gulia, Nasib Singh Gill, Ishaani Priyadarshini:
A Hybrid Univariate Traffic Congestion Prediction Model for IoT-Enabled Smart City. Inf. 14(5): 268 (2023) - [j19]Chhaya Gupta, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee:
A novel finetuned YOLOv6 transfer learning model for real-time object detection. J. Real Time Image Process. 20(3): 42 (2023) - [j18]Chhaya Gupta, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee:
Correction to: A novel finetuned YOLOv6 transfer learning model for real‑time object detection. J. Real Time Image Process. 20(3): 54 (2023) - [c3]Nasib Singh Gill, Preeti Gulia, Amit Sagu, Bharti Goyal:
Preserving Users' Sensitive Data in Physical and Virtual World Using Machine Learning: A Strategy. ICISDM 2023: 18-23 - 2022
- [j17]Ayushi Chahal, Preeti Gulia, Nasib Singh Gill, Jyotir Moy Chatterjee:
Performance Analysis of an Optimized ANN Model to Predict the Stability of Smart Grid. Complex. 2022: 7319010:1-7319010:13 (2022) - [j16]Amit Sagu, Nasib Singh Gill, Preeti Gulia, Jyotir Moy Chatterjee, Ishaani Priyadarshini:
A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment. Future Internet 14(10): 301 (2022) - [j15]Sangeeta Yadav, Preeti Gulia, Nasib Singh Gill:
Flow-MotionNet: A neural network based video compression architecture. Multim. Tools Appl. 81(29): 42783-42804 (2022) - 2020
- [j14]Pooja Singh, Nasib Singh Gill:
Self-observation and recommendation based trust model with defense scheme for wireless ad hoc network. J. High Speed Networks 26(1): 41-54 (2020)
2010 – 2019
- 2012
- [j13]Meenakshi Sharma, Nasib Singh Gill, Sunil Sikka:
Survey of object-oriented metrics: focusing on validation and formal specification. ACM SIGSOFT Softw. Eng. Notes 37(6): 1-5 (2012) - 2011
- [j12]Nasib Singh Gill, Pradeep Tomar:
New and innovative process to construct testable component with systematic approach. ACM SIGSOFT Softw. Eng. Notes 36(1): 1-4 (2011) - 2010
- [j11]Nasib Singh Gill, Pradeep Tomar:
Modified development process of component-based software engineering. ACM SIGSOFT Softw. Eng. Notes 35(2): 1-6 (2010) - [j10]Nasib Singh Gill, Sunil Sikka:
New complexity model for classes in object oriented system. ACM SIGSOFT Softw. Eng. Notes 35(5): 1-7 (2010)
2000 – 2009
- 2009
- [j9]Nasib Singh Gill, Balkishan:
Component adaptation process and adaptability viewpoints. ACM SIGSOFT Softw. Eng. Notes 34(6): 1-3 (2009) - 2008
- [j8]Nasib Singh Gill, Balkishan:
Dependency and interaction oriented complexity metrics of component-based systems. ACM SIGSOFT Softw. Eng. Notes 33(2) (2008) - [c2]Nasib Singh Gill:
Need of Appropriate Component Reusability Metrics and Standards for Component-Based Systems. SETP 2008: 92-94 - 2007
- [j7]Nasib Singh Gill, Pradeep Tomar:
CBS testing requirements and test case process documentation revisited. ACM SIGSOFT Softw. Eng. Notes 32(2): 1-4 (2007) - 2006
- [j6]Nasib Singh Gill:
Importance of software component characterization for better software reusability. ACM SIGSOFT Softw. Eng. Notes 31(1): 1-3 (2006) - 2005
- [j5]Nasib Singh Gill:
Factors affecting effective software quality management revisited. ACM SIGSOFT Softw. Eng. Notes 30(2): 1-4 (2005) - 2004
- [j4]Nasib Singh Gill, P. S. Grover:
Few important considerations for deriving interface complexity metric for component-based systems. ACM SIGSOFT Softw. Eng. Notes 29(2): 4 (2004) - [j3]Nasib Singh Gill, P. S. Grover:
Software size prediction before coding. ACM SIGSOFT Softw. Eng. Notes 29(5): 1-4 (2004) - 2003
- [j2]Nasib Singh Gill:
Reusability issues in component-based development. ACM SIGSOFT Softw. Eng. Notes 28(4): 4 (2003) - [j1]Nasib Singh Gill, P. S. Grover:
Component-based measurement: few useful guidelines. ACM SIGSOFT Softw. Eng. Notes 28(6): 4 (2003)
1990 – 1999
- 1994
- [c1]P. S. Grover, Nasib Singh Gill:
Composite Complexity Measures (CCM). Software Quality and Productivity 1994: 279-283
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint