A systematic review on metaheuristic optimization techniques for feature selections in disease diagnosis: open issues and challenges S Kaur, Y Kumar, A Koul, S Kumar Kamboj Archives of Computational Methods in Engineering 30 (3), 1863-1895, 2023 | 112 | 2023 |
Detection of multiple malicious nodes using entropy for mitigating the effect of denial of service attack in VANETs S Kumar, KS Mann 2018 4th International conference on computing sciences (ICCS), 72-79, 2018 | 31 | 2018 |
Scientific landscape and the road ahead for deep learning: apple leaves disease detection A Bonkra, PK Bhatt, A Kaur, S Kamboj 2023 international conference on artificial intelligence and smart …, 2023 | 14 | 2023 |
Hybrid approach for virtual machine optimization using BAT algorithm in cloud A Kaur, S Kamboj, B Kaur, PN Hrisheekesha 2021 2nd International Conference on Computational Methods in Science …, 2021 | 5 | 2021 |
Soft computing techniques for energy consumption and resource aware allocation on cloud: a progress and systematic review S Kaur, Y Kumar, S Kumar Advanced Soft Computing Techniques in Data Science, IoT and Cloud Computing …, 2021 | 5 | 2021 |
Prediction of smart building and smart city resources using AI-techniques JS Saini, S Arora, S Kamboj 2023 2nd International Conference for Innovation in Technology (INOCON), 1-5, 2023 | 2 | 2023 |
IoT Based Sewage System Blockage and Water Accumulation Prevention System A Kaur, H Wadhwa, S Kamboj 2023 International Conference on Artificial Intelligence and Smart …, 2023 | 2 | 2023 |
Descriptive Analysis of the Cloud Computing Services and Deployment Models T Kaur, S Kamboj 2023 International Conference for Advancement in Technology (ICONAT), 1-6, 2023 | 2 | 2023 |
Computational Methods in Science and Technology: Proceedings of the 4th International Conference on Computational Methods in Science & Technology (ICCMST 2024), 2–3 May 2024 … S Kaur, S Kamboj, M Kumar, A Dagur, DK Shukla CRC Press, 2024 | 1 | 2024 |
An Optimized Multiple Malicious Node Detection method for detection of security attacks in VANETs S Kamboj, KS Mann, S Kaur 2021 2nd International Conference on Computational Methods in Science …, 2021 | 1 | 2021 |
A REVIEW ON BALANCING THE LOAD ON CLOUD USING ACCLB HYBRID LOAD BALANCING TECHNIQUE G Kaur, ES Kamboj International Journal of Technology and Computing (IJTC) 2 (7), 2016 | 1 | 2016 |
Aggressive Migration: An Effective Scheduling Policy M Kaur, S Kamboj International Journal of Science and Research, 146-148, 2014 | 1 | 2014 |
Lung Disease Diagnosis Using Machine Learning from a Bibliometric Perspective A Bonkra, P Dhiman, S Kamboj, S Kaur Convergence of Blockchain and Internet of Things in Healthcare, 1-24, 2024 | | 2024 |
From Frisee to Belgian Endive: A Deep Learning and Ensemble Approach to Classifying Endive Varieties in India S Singh, S Kamboj, S Lamba 2024 11th International Conference on Reliability, Infocom Technologies and …, 2024 | | 2024 |
A REVIEW ON MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET G Singh, ES Kamboj traffic 2 (6), 2016 | | 2016 |
SELF-OFFLOADING OF ANDRIOD APPLICATIONS EXPLOITING THE RESOURCES OF CLOUD R Kumar, S Kamboj, S Kaur | | |
ICCS 2021 GS Aujla, A Jindal, S Egerton, M Balas, R Ward, V Balas, R Prodan, ... | | |
2021 2nd International Conference on Computational Methods in Science & Technology (ICCMST)| 978-1-6654-5866-5/21/$31.00© 2021 IEEE| DOI: 10.1109/ICCMST54943. 2021.00067 MT Addis, A Aditya, S Agarwal, N Aggarwal, S Aggarwal, TA Aldhaheri, ... | | |
An Efficient Channel Assignment Scheme for Vehicular Ad Hoc Networks RS Batth, P Mohali, S Kamboj | | |
A SYSTEMATIC WAY FOR MULTIPLE MALICIOUS AND IRRELEVANT PACKET DETECTION IN VANET G Singh, ES Kamboj | | |