default search action
Hemraj Saini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Geetanjali Rathee, Hemraj Saini, Shishir K. Shandilya, S. Rajasoundaran:
A trusted and adaptive security mechanism for wearable e-healthcare systems. Int. J. Ad Hoc Ubiquitous Comput. 45(1): 3-10 (2024) - [j39]Rakesh Kumar Saini, Hemraj Saini, Harikesh Singh:
Enhanced Kidney Stone Detections Using Digital Image Processing Techniques. SN Comput. Sci. 5(6): 790 (2024) - 2023
- [j38]Ashok Kumar Tripathi, P. K. Gupta, Hemraj Saini, Geetanjali Rathee:
MVI and Forecast Precision Upgrade of Time Series Precipitation Information for Ubiquitous Computing. Informatica (Slovenia) 47(5) (2023) - [j37]Anju Devi, Amit Kumar, Geetanjali Rathee, Hemraj Saini:
User authentication of industrial internet of things (IIoT) through Blockchain. Multim. Tools Appl. 82(12): 19021-19039 (2023) - [c9]Hemraj Saini:
Office of the Dean Faculty Affairs. ISED 2023: 1 - [c8]Pratibha Sharma, Hemraj Saini, Arvind Kalia:
Dual-Constraint Based Task Scheduling and Secure Offloading in Triune Layered Fog Assisted IoT Environment. ISED 2023: 1-8 - 2022
- [j36]Dinesh Kumar Saini, Hemraj Saini, Punit Gupta, Anouar Ben Mabrouk:
Prediction of malicious objects using prey-predator model in Internet of Things (IoT) for smart cities. Comput. Ind. Eng. 168: 108061 (2022) - [j35]Hemraj Saini, Satyabrata Dash, Subhendu Pani, Maria José Sousa, Álvaro Rocha:
Blockchain-based raw material shipping with PoC in Hyperledger Composer. Comput. Sci. Inf. Syst. 19(3): 1075-1092 (2022) - [j34]Anju Devi, Geetanjali Rathee, Hemraj Saini:
Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using DPSO and M-ITA Algorithms. J. Inf. Secur. Appl. 64: 103094 (2022) - [c7]Adarsh Thapa, Chiraag Singh Dhapola, Hemraj Saini:
Security Analysis of User Authentication and Methods. IC3 2022: 564-572 - 2021
- [j33]Satyabrata Dash, Hemraj Saini, Sujata Chakravarty:
COVID-19 outbreak in Orissa: MLR and H-SVR-based modelling and forecasting. Int. J. Comput. Appl. Technol. 66(3/4): 401-414 (2021) - [j32]Hemraj Saini, Madan Mohan Agarwal, Mahesh Chandra Govil, Madhavi Sinha:
Design of fuzzy controlled routing protocol to save energy in ad hoc networks. Int. J. Serv. Technol. Manag. 27(1/2): 51-71 (2021) - [c6]Satvik Garg, Pradyumn Pundir, Himanshu Jindal, Hemraj Saini, Somya Garg:
Towards a Multimodal System for Precision Agriculture using IoT and Machine Learning. ICCCNT 2021: 1-7 - [i1]Satvik Garg, Pradyumn Pundir, Himanshu Jindal, Hemraj Saini, Somya Garg:
Towards a Multimodal System for Precision Agriculture using IoT and Machine Learning. CoRR abs/2107.04895 (2021) - 2020
- [j31]Shivi Sharma, Hemraj Saini:
Fog assisted task allocation and secure deduplication using 2FBO2 and MoWo in cluster-based industrial IoT (IIoT). Comput. Commun. 152: 187-199 (2020) - [j30]M. Sivaram, Geetanjali Rathee, Ravi Rastogi, Mohammad Tabrez Quasim, Hemraj Saini:
A resilient and secure two-stage ITA and blockchain mechanism in mobile crowd sourcing. J. Ambient Intell. Humaniz. Comput. 11(11): 5003-5016 (2020) - [j29]Geetanjali Rathee, Ashutosh Sharma, Hemraj Saini, Rajiv Kumar, Razi Iqbal:
A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology. Multim. Tools Appl. 79(15-16): 9711-9733 (2020) - [j28]Geetanjali Rathee, Rajinder Sandhu, Hemraj Saini, M. Sivaram, Dhasarathan Vigneswaran:
A trust computed framework for IoT devices and fog computing environment. Wirel. Networks 26(4): 2339-2351 (2020)
2010 – 2019
- 2019
- [j27]Shivi Sharma, Hemraj Saini:
Efficient Solution for Load Balancing in Fog Computing Utilizing Artificial Bee Colony. Int. J. Ambient Comput. Intell. 10(4): 60-77 (2019) - [j26]Geetanjali Rathee, Hemraj Saini:
Secure handoff technique with reduced authentication delay in wireless mesh network. Int. J. Adv. Intell. Paradigms 13(1/2): 130-154 (2019) - [j25]Oshin Sharma, Hemraj Saini:
Energy and SLA Efficient Virtual Machine Placement in Cloud Environment Using Non-Dominated Sorting Genetic Algorithm. Int. J. Inf. Secur. Priv. 13(1): 1-16 (2019) - [j24]Yerra Shankar Rao, Prasant Kumar Nayak, Hemraj Saini, Tarini Charana Panda:
Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence. Int. J. Inf. Secur. Priv. 13(1): 17-29 (2019) - [j23]Pratiksha Gautam, Hemraj Saini:
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques. Int. J. Inf. Secur. Priv. 13(1): 30-45 (2019) - [j22]Ashutosh Sharma, Geetanjali Rathee, Rajiv Kumar, Hemraj Saini, Vijayakumar Varadarajan, Yunyoung Nam, Naveen K. Chilamkurti:
A Secure, Energy- and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System. Sensors 19(9): 2119 (2019) - [j21]Shivi Sharma, Hemraj Saini:
A novel four-tier architecture for delay aware scheduling and load balancing in fog environment. Sustain. Comput. Informatics Syst. 24 (2019) - [j20]Geetanjali Rathee, Naveen Jaglan, Hemraj Saini, Samir Dev Gupta, Binod Kumar Kanaujia:
Probabilistic Verification Scenarios with Reduced Authentication Delay for Handoff Clients in Mesh Networks. Wirel. Pers. Commun. 104(4): 1553-1571 (2019) - [c5]Yerra Shankar Rao, Hemraj Saini, Geetanjali Rathee, Tarini Charan Panda:
Effect of Vaccination in the Computer Network for Distributed Attacks - A Dynamic Model. ICACDS (2) 2019: 175-184 - 2018
- [j19]Oshin Sharma, Hemraj Saini:
Energy efficient virtual machine consolidation for cloud data centres using analytic hierarchy process. Int. J. Adv. Intell. Paradigms 10(4): 401-422 (2018) - [j18]Gautam Kumar, Hemraj Saini:
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification. Int. J. Inf. Secur. Priv. 12(1): 13-28 (2018) - [j17]Geetanjali Rathee, Hemraj Saini:
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN. Int. J. Inf. Secur. Priv. 12(1): 42-52 (2018) - [j16]Geetanjali Rathee, Hemraj Saini:
Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN. Int. J. Inf. Secur. Priv. 12(2): 26-37 (2018) - [j15]Geetanjali Rathee, Hemraj Saini:
Security Against Network Layer Attacks for Hierarchal Mesh Environments. Int. J. Inf. Technol. Web Eng. 13(2): 48-55 (2018) - [j14]Pratiksha Gautam, Hemraj Saini:
Correlation and Performance Estimation of Clone Detection Tools. Int. J. Open Source Softw. Process. 9(2): 55-71 (2018) - [j13]Geetanjali Rathee, Hemraj Saini, Ghanshyam Singh:
Aspects of Trusted Routing Communication in Smart Networks. Wirel. Pers. Commun. 98(2): 2367-2387 (2018) - [c4]Gautam Kumar, Hemraj Saini, U. M. Fernandes Dimlo:
Deployment Consideration on Secure Computation for Radix-16 Scalar Multiplication. ICACDS (2) 2018: 205-216 - 2017
- [j12]Geetanjali Rathee, Hemraj Saini:
Secure Buffer-Based Routing Protocol for WMN. Int. J. Bus. Data Commun. Netw. 13(1): 28-44 (2017) - [j11]Oshin Sharma, Hemraj Saini:
Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment. Int. J. Bus. Data Commun. Netw. 13(1): 45-57 (2017) - [j10]Yerra Shankar Rao, Aswin Kumar Rauta, Hemraj Saini, Tarini Charana Panda:
Mathematical Model for Cyber Attack in Computer Network. Int. J. Bus. Data Commun. Netw. 13(1): 58-65 (2017) - [j9]Geetanjali Rathee, Hemraj Saini:
Weight Trusted Routing Mechanism for Hierarchical Mesh Environments. Int. J. Distributed Syst. Technol. 8(3): 25-42 (2017) - [j8]Oshin Sharma, Hemraj Saini:
SLA and Performance Efficient Heuristics for Virtual Machines Placement in Cloud Data Centers. Int. J. Grid High Perform. Comput. 9(3): 17-33 (2017) - [j7]Geetanjali Rathee, Hemraj Saini:
Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol. Int. J. Mob. Comput. Multim. Commun. 8(1): 1-18 (2017) - [j6]Pratiksha Gautam, Hemraj Saini:
A Novel Software Protection Approach for Code Obfuscation to Enhance Software Security. Int. J. Mob. Comput. Multim. Commun. 8(1): 34-47 (2017) - [j5]Pratiksha Gautam, Hemraj Saini:
Non-Trivial Software Clone Detection Using Program Dependency Graph. Int. J. Open Source Softw. Process. 8(2): 1-24 (2017) - [j4]Gautam Kumar, Hemraj Saini:
Novel Noncommutative Cryptography Scheme Using Extra Special Group. Secur. Commun. Networks 2017: 9036382:1-9036382:21 (2017) - 2016
- [c3]Gautam Kumar, Hemraj Saini:
Secure and Efficient ECC: Radix-16 Scalar Multiplication without Pre-Computation. BDAW 2016: 20:1-20:10 - 2012
- [j3]Hemraj Saini, L. K. Sharma, Tarini Charana Panda, H. N. Pratihari:
Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm. Int. J. Wirel. Networks Broadband Technol. 2(2): 36-46 (2012) - 2011
- [j2]Hemraj Saini, Bimal Kumar Mishra, Tarini Charana Panda:
Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network. Int. J. Web Portals 3(2): 14-22 (2011) - 2010
- [c2]Dinesh Kumar Saini, Osama A. Rahmeh, Hemraj Saini:
Extended Secure Architecture of HIS: HL7. BIOCOMP 2010: 617-623 - [c1]Dinesh Kumar Saini, Wail M. Omar, Hemraj Saini:
Cyber Defense Architecture for Campus Intranet. Security and Management 2010: 87-93
2000 – 2009
- 2008
- [j1]Nirmal Gupta, Dinesh Kumar Saini, Hemraj Saini:
Class Level Test Case Generation in Object Oriented Software Testing. Int. J. Inf. Technol. Web Eng. 3(2): 18-26 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint