Cost effective genetic algorithm for workflow scheduling in cloud under deadline constraint J Meena, M Kumar, M Vardhan IEEE Access 4, 5065-5082, 2016 | 138 | 2016 |
Cross-site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defense BB Gupta, S Gupta, S Gangwar, M Kumar, PK Meena Journal of Information Privacy and Security 11 (2), 118-136, 2015 | 97 | 2015 |
A feature-based approach to automated design of multi-piece sacrificial molds S Dhaliwal, SK Gupta, J Huang, M Kumar J. Comput. Inf. Sci. Eng. 1 (3), 225-234, 2001 | 38 | 2001 |
Handwritten character recognition using different kernel based svm classifier and mlp neural network (a comparison) P Kumar, N Sharma, A Rana International Journal of Computer Applications 53 (11), 2012 | 30 | 2012 |
Automated design of multi-stage molds for manufacturing multi-material objects M Kumar, SK Gupta J. Mech. Des. 124 (3), 399-407, 2002 | 29 | 2002 |
Data outsourcing: A threat to confidentiality, integrity, and availability M Kumar, J Meena, R Singh, M Vardhan 2015 International Conference on Green Computing and Internet of Things …, 2015 | 26 | 2015 |
Ensemble feature extraction modules for improved Hindi speech recognition system M Kumar, RK Aggarwal, G Leekha, Y Kumar International Journal of Computer Science Issues (IJCSI) 9 (3), 175, 2012 | 18 | 2012 |
Privacy preserving, verifiable and efficient outsourcing algorithm for matrix multiplication to a malicious cloud server M Kumar, J Meena, M Vardhan Cogent Engineering 4 (1), 1295783, 2017 | 17 | 2017 |
A geometric algorithm for automated design of multi-stage molds for manufacturing multi-material objects M Kumar, SK Gupta Proceedings of the sixth ACM symposium on Solid modeling and applications …, 2001 | 13 | 2001 |
Efficient utilization of commodity computers in academic institutes: a cloud computing approach J Meena, M Kumar, M Vardhan World Acad. Sci. Eng. Technol. Int. J. Comput. Inf. Eng 9 (2), 2015 | 11 | 2015 |
SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks A Shukla, D Singh, M Sajwan, M Kumar, D Kumari, A Kumar, M Panthi Multimedia Tools and Applications 81 (8), 11145-11185, 2022 | 9 | 2022 |
Southern blight disease of tomato control by 1-aminocyclopropane-1-carboxylate (ACC) deaminase producing Paenibacillus lentimorbus B-30488. Plant Signal Behav 11: e1113363 R Dixit, L Agrawal, S Gupta, M Kumar, S Yadav, PS Chauhan, ... | 9 | 2016 |
Antidepressant activity of ethanolic extract of plant Kalanchoe pinnata (lam) pers in mice S Matthew, AK Jain, C Matthew, M Kumar, D Bhowmik Indian Journal of Research in Pharmacy and Biotechnology 1 (2), 153, 2013 | 9 | 2013 |
Privacy preserving, verifiable and efficient outsourcing algorithm for regression analysis to a malicious cloud M Kumar, J Meena, S Tiwari, M Vardhan Journal of Intelligent & Fuzzy Systems 32 (5), 3413-3427, 2017 | 8 | 2017 |
A comparative analysis of symmetric key encryption algorithm M Kumar, EG Dharma IJARCET 3 (2), 2014 | 8 | 2014 |
α-Glucosidase inhibitor constituents from Bombax ceiba MF Khan, M Kumar, N Jaiswal, AK Srivastava, R Maurya Trends Carbohydr. Res 2, 29-34, 2010 | 8 | 2010 |
Capsicum production in naturally ventilated polyhouses in mid hills of Himachal Pradesh M Kumar, UK Kohli Int. Conference on Plasticulture and Precision Farming, 88, 2005 | 8 | 2005 |
A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication M Kumar, V Mishra, A Shukla, M Singh, M Vardhan Journal of Intelligent & Fuzzy Systems 38 (5), 6445-6455, 2020 | 7 | 2020 |
A step towards automated design of sacrificial multi-piece molds S Dhaliwal, SK Gupta, J Huang, M Kumar ASME International Congress and Exposition, New York, 2001 | 7 | 2001 |
Does augmentation of intramedullary nails by a buttress plate effectively restore lateral wall integrity in intertrochanteric fractures S Jain, H Dawar, H Khare, M Kumar, A Ajmera International Orthopaedics 46 (10), 2365-2371, 2022 | 6 | 2022 |