Find Research Outputs

Search concepts
Selected filters
2010
1 Citation (Scopus)

A generalized closed form relation for BER of QPSK/M-QAM over fading channel

Singh, S., Kumar, M. S. & Mruthyunjaya, H. S., 2010, 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010. p. 161-165 5 p. 5578716

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quadrature phase shift keying
Quadrature amplitude modulation
Fading channels
Curve fitting
Modulation
2012
1 Citation (Scopus)

Differentiated QoS with Modified C/I based scheduling algorithm

Divya, A. & Singh, S., 01-12-2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 835-840 6 p. 6409191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling algorithms
Quality of service
Scheduling
Mobile telecommunication systems
Internet telephony
2011
1 Citation (Scopus)

Physical layer authentication in wired and wireless communication systems

Mouli, C. & Singh, S., 26-10-2011, Advances in Digital Image Processing and Information Technology - First International Conference on Digital Image Processing and Pattern Recognition, DPPR 2011, Proceedings. p. 291-304 14 p. (Communications in Computer and Information Science; vol. 205 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless Communication
Authentication
Communication Systems
Communication systems
Receiver
2013
7 Citations (Scopus)

Optimal neural network architecture for stock market forecasting

Khirbat, G., Gupta, R. & Singh, S., 05-08-2013, p. 557-561. 5 p.

Research output: Contribution to conferencePaper

Network architecture
Neural networks
Time series
Backpropagation
Financial markets
1 Citation (Scopus)

Detection of user cluster with suspicious activity in online social networking sites

Sharath, K. A. & Singh, S., 01-01-2013, Proceedings - 2nd International Conference on Advanced Computing, Networking and Security, ADCONS 2013. IEEE Computer Society, p. 220-225 6 p. 6714167

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Terrorism
Law enforcement
Planning
Communication
2012

Modeling two way concurrent buffer system using timed automata in UPPAAL

Mishra, R., Zeeshaan, M. & Singh, S., 01-12-2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 846-851 6 p. 6409193

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Model checking
Electronic data interchange
Real time systems
Synchronization

Enhanced mining association rule algorithm with reduced time & space complexity

Mundra, P., Maurya, A. K. & Singh, S., 01-12-2012, 2012 Annual IEEE India Conference, INDICON 2012. p. 1105-1110 6 p. 6420782

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Association rules
Data mining
Association rule mining
2 Citations (Scopus)

Web opinion mining for social networking sites

Kaur, B., Saxena, A. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 598-605 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Clustering algorithms
Visualization
Topology
Internet
2013
4 Citations (Scopus)

Stock market prediction accuracy analysis using kappa measure

Gupta, R., Garg, N. & Singh, S., 05-08-2013, p. 635-639. 5 p.

Research output: Contribution to conferencePaper

Websites
Profitability
Sales
Financial markets
Industry
2012
5 Citations (Scopus)

Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication

Hanumanthappa, P. & Singh, S., 13-07-2012, 2012 International Conference on Innovations in Information Technology, IIT 2012. p. 107-112 6 p. 6207712

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ubiquitous computing
Authentication
2013
1 Citation (Scopus)

Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS)

Jnanamurthy, H. K., Warty, C. & Singh, S., 01-12-2013, 2013 Annual IEEE India Conference, INDICON 2013. 6726055

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Online systems
Feedback
2015
1 Citation (Scopus)

Is stack overflow overflowing with questions and tags

Ranjitha, R. K. & Singh, S., 10-08-2015, Proceeding of the 3rd International Symposium on Women in Computing and Informatics, WCI 2015. Association for Computing Machinery (ACM), Vol. 10-13-August-2015. p. 278-283 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
2010
1 Citation (Scopus)

Model checking message exchange in location based services

Moily, A., Prasanna, G., Shetty, K. S. & Singh, S., 30-12-2010, 2010 International Conference on Computer and Communication Technology, ICCCT-2010. p. 164-167 4 p. 5640417

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Location based services
Model checking
Mobile devices
Specifications
service provider
2017
1 Citation (Scopus)

Neural network approach for vision-based track navigation using low-powered computers on MAVs

Brahmbhatt, K., Pai, A. R. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 578-583 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Micro air vehicle (MAV)
Navigation
Neural networks
Computer vision
Facings

Fitness function to find Game Equilibria using Genetic Algorithms

Gunturu, M., Shakarad, G. N. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1531-1534 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Game theory
Multiobjective optimization
Evolutionary algorithms
Genetic algorithms
Polynomials
2016
1 Citation (Scopus)

Unemployment rates forecasting using supervised neural networks

Sharma, S. & Singh, S., 08-07-2016, Proceedings of the 2016 6th International Conference - Cloud System and Big Data Engineering, Confluence 2016. Institute of Electrical and Electronics Engineers Inc., p. 28-33 6 p. 7508042

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unemployment
Learning Vector Quantization
Forecasting
Radial Basis Function Neural Network
Neural Networks
2015
2 Citations (Scopus)

Is that twitter hashtag worth reading

Anusha, A. & Singh, S., 10-08-2015, Proceeding of the 3rd International Symposium on Women in Computing and Informatics, WCI 2015. Association for Computing Machinery (ACM), Vol. 10-13-August-2015. p. 272-277 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Explosions
2016

Natural language image descriptor

Kishore, A. & Singh, S., 09-06-2016, 2015 IEEE Recent Advances in Intelligent Computational Systems, RAICS 2015. Institute of Electrical and Electronics Engineers Inc., p. 110-115 6 p. 7488398

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer vision
Artificial intelligence
2017

Multi-modality face recognition: An information theoretic approach

Supriy, M. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1080-1084 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
Lighting
Crime
Law enforcement
2013
1 Citation (Scopus)

Ownership authentication transfer protocol for ubiquitous computing devices

Pradeep, B. H. & Singh, S., 12-03-2013, 2013 International Conference on Computer Communication and Informatics, ICCCI 2013. 6466133

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ubiquitous computing
Authentication
Network protocols
Sales
Internet
2018

IoT based driving risk assessment and warning system

Aithal, A. & Singh, S., 01-12-2018, Proceedings of the International Conference on Smart Systems and Inventive Technology, ICSSIT 2018. Institute of Electrical and Electronics Engineers Inc., p. 282-286 5 p. 8748704. (Proceedings of the International Conference on Smart Systems and Inventive Technology, ICSSIT 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Alarm systems
Risk assessment
Accidents
Sensors
Highway accidents
2012

Design and development of a desktop monitoring system

Santhalia, V. K. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 620-625 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Monitoring
Personnel
Data privacy
Electronic mail
2018
1 Citation (Scopus)

Face Detection and Tagging Using Deep Learning

Mehta, J., Ramnani, E. & Singh, S., 30-08-2018, 2nd International Conference on Computer, Communication, and Signal Processing: Special Focus on Technology and Innovation for Smart Environment, ICCCSP 2018. Institute of Electrical and Electronics Engineers Inc., 8452853. (2nd International Conference on Computer, Communication, and Signal Processing: Special Focus on Technology and Innovation for Smart Environment, ICCCSP 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
learning
marking
Neural networks
boom
2014
15 Citations (Scopus)

Differential private random forest

Patil, A. & Singh, S., 01-01-2014, Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Institute of Electrical and Electronics Engineers Inc., p. 2623-2630 8 p. 6968348

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Mathematical operators
Classifiers
2019
1 Citation (Scopus)

Performance Analysis of Out-Band OpenFlow Switch Architecture: The Single Node Case

Kamath, S., Singh, S. & Kumar, M. S., 08-05-2019, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2018. IEEE Computer Society, 8710089. (International Symposium on Advanced Networks and Telecommunication Systems, ANTS; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Switches
networking
performance
Network architecture
Software defined networking
2016
13 Citations (Scopus)

Image sentiment analysis using deep convolutional neural networks with domain specific fine tuning

Jindal, S. & Singh, S., 10-06-2016, Proceedings - IEEE International Conference on Information Processing, ICIP 2015. Institute of Electrical and Electronics Engineers Inc., p. 447-451 5 p. 7489424

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image analysis
Tuning
Neural networks
Object recognition
Experiments
2017

Extracting quality relations from categorical data using modified Qube algorithm

Nanda, S., Gopakumar, R. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 651-655 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Derivatives
2016

Path independent real time points of interest detection in road networks

Rohella, A. & Singh, S., 01-01-2016, Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016. Institute of Electrical and Electronics Engineers Inc., p. 633-638 6 p. 7918040

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Road network
Experiments
Factors
Experiment
Direction compound

Identification of causal relationships among clinical variables for cancer diagnosis using multi-tenancy

Krishna, M. K. S. G. & Singh, S., 02-11-2016, 2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016. Institute of Electrical and Electronics Engineers Inc., p. 1511-1516 6 p. 7732262

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Classifiers
2014
1 Citation (Scopus)

Towards a generic framework for short term firm-specific stock forecasting

Ahmed, M., Sriram, A. & Singh, S., 01-01-2014, Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Institute of Electrical and Electronics Engineers Inc., p. 2681-2688 8 p. 6968411

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clustering algorithms
Stretching
Industry
Engines
Financial markets
2017

Word based thematic game on Indian mythology

Padiyar, S. S. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1619-1623 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Artificial intelligence
2016
3 Citations (Scopus)

Intelligence analysis of Tay Twitter bot

Mathur, V., Stavrakas, Y. & Singh, S., 01-01-2016, Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016. Institute of Electrical and Electronics Engineers Inc., p. 231-236 6 p. 7917966

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligence
Processing
Natural Language Processing
Vocabulary
Twitter
2013
4 Citations (Scopus)

Detection and filtering of collaborative malicious users in reputation system using quality repository approach

Jnanamurthy, H. K. & Singh, S., 01-12-2013, Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013. p. 466-471 6 p. 6637216

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Online systems
2017

Safe buzz: Adaptive security for multi-agents through situational awareness

Hegde, M. S. & Singh, S., 01-01-2017, In : International Journal of Autonomous and Adaptive Communications Systems. 10, 2, p. 192-212 21 p.

Research output: Contribution to journalArticle

Multi agent systems
Risk assessment
Communication
Risk management
Monitoring
2013
2 Citations (Scopus)

Aware-BDI: An extension of the BDI model incorporating situational awareness

Hegde, M. S. & Singh, S., 05-08-2013, p. 100-104. 5 p.

Research output: Contribution to conferencePaper

Communication
2011
1 Citation (Scopus)

Logical modeling and verification of a strength based multi-agent argumentation scheme using NuSMV

Shetty, S., Shashi Kiran, H. S., Namala, M. B. & Singh, S., 01-12-2011, Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings. PART 1 ed. p. 378-387 10 p. (Communications in Computer and Information Science; vol. 131 CCIS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Argumentation
Artificial intelligence
Initiators (chemical)
Scheduling
Modeling

Modeling and verification of Inter Realm Authentication in Kerberos using symbolic model verifier

Mundra, P., Sharma, M., Shukla, S. & Singh, S., 28-10-2011, Trends in Computer Science, Engineering and Information Technology - First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, Proceedings. p. 496-506 11 p. (Communications in Computer and Information Science; vol. 204 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Server
Modeling
User Authentication

Modeling and verification of server aided verification protocol using NuSMV

Saralaya, V., Kishore, J. K., Reddy, S. & Singh, S., 28-10-2011, Trends in Computer Science, Engineering and Information Technology - First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, Proceedings. p. 486-495 10 p. (Communications in Computer and Information Science; vol. 204 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Protocol Verification
Servers
Server
Network protocols
Computer simulation
2010
2 Citations (Scopus)

Modelingfreshness concept to overcome replay attackin Kerberos protocol using NuSMV

Adyanthaya, S., Rukmangada, S., Tiwari, A. & Singh, S., 30-12-2010, 2010 International Conference on Computer and Communication Technology, ICCCT-2010. p. 125-129 5 p. 5640425

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
networking
Model checking
Computer networks
Authentication
3 Citations (Scopus)

Securing location privacy in augmented reality

Aryan, A. & Singh, S., 02-11-2010, 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010. p. 172-176 5 p. 5578714

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Augmented reality
Location based services
Servers
Privacy
Anonymization
2012
2 Citations (Scopus)

Decoding robustness performance comparison for QR and data matrix code

Kulshreshtha, R., Kamboj, A. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 722-731 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decoding
Cameras
Visual communication
Data transfer
Metadata
2 Citations (Scopus)

Modeling and verification of Fiat-Shamir zero knowledge authentication protocol

Maurya, A. K., Choudhary, M. S., Ajeyaraj, P. & Singh, S., 01-12-2012, Advances in Computer Science and Information Technology: Computer Science and Engineering - Second International Conference, CCSIT 2012, Proceedings. PART 2 ed. p. 61-70 10 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 85, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Model checking
Finite automata
Computer hardware
2010

Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking

Lele, A., Kumar, A., Rohith, H. M. & Singh, S., 02-11-2010, 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010. p. 281-285 5 p. 5578694

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Model checking
Scheduling
Scheduling algorithms
Embedded systems
Factors
2012

Formal verification of the extensible authentication protocol using SPIN

Jnanamurthy, H. K., S.hegde, M. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 365-371 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Finite automata
Interoperability
Formal verification
2 Citations (Scopus)

Symbolic verification of web crawler functionality and its properties

Shetty, K. S., Bhat, S. & Singh, S., 27-03-2012, 2012 International Conference on Computer Communication and Informatics, ICCCI 2012. 6158649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Search engines
Websites
Specifications
Web crawler

Erroneous state detection in piecewise FIFO system

Sharath, K. A., Vishesh, H. V. & Singh, S., 01-12-2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 841-845 5 p. 6409192

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Model checking
Network protocols
2018

Chroot Hardening Through System Calls Modification

Haque, A., Ayyar, A. & Singh, S., 20-08-2018, Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering, Confluence 2018. Institute of Electrical and Electronics Engineers Inc., p. 491-496 6 p. 8442709. (Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering, Confluence 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Directories
Hardening
Vulnerability
Computer operating systems
Mountings
2019

Symmetric key-based authenticated encryption protocol

Bhuva, M. J. & Singh, S., 04-03-2019, In : Information Security Journal. 28, 1-2, p. 35-45 11 p.

Research output: Contribution to journalArticle

Authentication
Cryptography
Encryption
Authenticity
Confidentiality

A meta data mining framework for botnet analysis

Haque, A., Ayyar, A. V. & Singh, S., 03-09-2019, In : International Journal of Computers and Applications. 41, 5, p. 392-399 8 p.

Research output: Contribution to journalArticle

Metadata
Data mining
Botnet

Meta-learner with sparsified backpropagation

Paithankar, R., Verma, A., Agnihotri, M. & Singh, S., 01-01-2019, Proceedings of the 9th International Conference On Cloud Computing, Data Science and Engineering, Confluence 2019. Institute of Electrical and Electronics Engineers Inc., p. 315-319 5 p. 8776608. (Proceedings of the 9th International Conference On Cloud Computing, Data Science and Engineering, Confluence 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Backpropagation
Speech recognition
Computer vision
Tuning
Scheduling