# | Title | Journal | Year | Citations |
---|
|
1 | Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory | IEEE Systems Journal | 2016 | 110 |
2 | Simulation and Pricing Mechanism Analysis of a Solar-Powered Electrical Microgrid | IEEE Systems Journal | 2010 | 105 |
3 | 3HAN: A Deep Neural Network for Fake News Detection | Lecture Notes in Computer Science | 2017 | 89 |
4 | A Novel Broadband Dual Circularly Polarized Microstrip-Fed Monopole Antenna | IEEE Transactions on Antennas and Propagation | 2017 | 84 |
5 | Agent-Based Modeling of Emergency Evacuations Considering Human Panic Behavior | IEEE Transactions on Computational Social Systems | 2018 | 69 |
6 | Performance evaluation of end-to-end delay by hybrid scheduling algorithm for QoS in IEEE 802.16 network | | 2006 | 60 |
7 | Energy-Aware Scheduling of Distributed Systems | IEEE Transactions on Automation Science and Engineering | 2014 | 54 |
8 | Agency in Assistive Technology Adoption | | 2017 | 49 |
9 | rsHRF: A toolbox for resting-state HRF estimation and deconvolution | NeuroImage | 2021 | 48 |
10 | Inferring Concept Prerequisite Relations from Online Educational Resources | Proceedings of the AAAI Conference on Artificial Intelligence | 2019 | 39 |
11 | Digital Controller for DVS-Enabled DC–DC Converter | IEEE Transactions on Power Electronics | 2010 | 38 |
12 | Datafying anti-poverty programmes: implications for data justice | Information, Communication and Society | 2019 | 38 |
13 | MHCAttnNet: predicting MHC-peptide bindings for MHC alleles classes I and II using an attention-based deep neural model | Bioinformatics | 2020 | 37 |
14 | Privacy, Patriarchy, and Participation on Social Media | | 2019 | 36 |
15 | Distributed Systems: An Algorithmic Approach | IEEE Distributed Systems Online | 2008 | 34 |
16 | Authentication Protocols for Implantable Medical Devices: Taxonomy, Analysis and Future Directions | IEEE Consumer Electronics Magazine | 2018 | 34 |
17 | The Nature of Activated Non‐classical Hydrogen Bonds: A Case Study on Acetylcholinesterase–Ligand Complexes | Chemistry - A European Journal | 2016 | 33 |
18 | The Aadhaar scheme: a cornerstone of a new citizenship regime in India? | Contemporary South Asia | 2018 | 32 |
19 | Towards efficient unconstrained handwriting recognition using Dilated Temporal Convolution Network | Expert Systems With Applications | 2021 | 32 |
20 | Modeling bipedal locomotion trajectories using hybrid automata | | 2016 | 28 |
21 | Predicting Engagement Intensity in the Wild Using Temporal Convolutional Network | | 2018 | 28 |
22 | The computer software industry as a vehicle of late industrialization: lessons from the Indian case | Journal of the Asia Pacific Economy | 2010 | 26 |
23 | An adaptive bandwidth request mechanism for QoS enhancement in WiMax real time communication | | 2006 | 25 |
24 | Low-Complexity ZF/MMSE MIMO-OTFS Receivers for High-Speed Vehicular Communication | IEEE Open Journal of the Communications Society | 2022 | 25 |
25 | Deadlock-Detection in Java-Library Using Static-Analysis | | 2008 | 23 |
26 | Discovery of technical expertise from open source code repositories | | 2013 | 23 |
27 | System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments | IEEE Systems Journal | 2015 | 23 |
28 | Monocular reconstruction of vehicles: Combining SLAM with shape priors | | 2016 | 23 |
29 | Paradoxes of Intermediation in Aadhaar: Human Making of a Digital Infrastructure | South Asia: Journal of South Asia Studies | 2019 | 23 |
30 | Air Cargo Demand Modeling and Prediction | IEEE Systems Journal | 2014 | 22 |
31 | Performance Evaluation and Optimization of Traffic-Aware Cellular Multiuser Two-Way Relay Networks Over Nakagami-<italic>m</italic> Fading | IEEE Systems Journal | 2018 | 22 |
32 | Mitigating man in the middle attack over secure sockets layer | | 2009 | 21 |
33 | Deep Convolutional Neural Network for musical genre classification via new Self Adaptive Sea Lion Optimization | Applied Soft Computing Journal | 2021 | 21 |
34 | Ensemble Learning for Large-Scale Workload Prediction | IEEE Transactions on Emerging Topics in Computing | 2014 | 20 |
35 | Power-Aware Cloud Metering | IEEE Transactions on Services Computing | 2014 | 20 |
36 | Influence of water on the CH3O˙ + O2 → CH2O + HO2˙ reaction | Physical Chemistry Chemical Physics | 2019 | 20 |
37 | Understanding Technology as Situated Practice: Everyday use of Voice User Interfaces Among Diverse Groups of Users in Urban India | Information Systems Frontiers | 2020 | 20 |
38 | Sleep EEG analysis utilizing inter-channel covariance matrices | Biocybernetics and Biomedical Engineering | 2020 | 20 |
39 | Novel Approximate Multiplier Designs for Edge Detection Application | | 2021 | 20 |
40 | AIoT: AI meets IoT and Web in Smart Healthcare | | 2021 | 20 |
41 | Clustering of lung cancer data using Foggy K-means | | 2013 | 19 |
42 | Optimally Resilient Asynchronous MPC with Linear Communication Complexity | | 2015 | 19 |
43 | Interaction of rare gas dimers in the confines of a carbon nanotube | Chemical Physics Letters | 2015 | 19 |
44 | Understanding the Psycho-Sociological Facets of Homophily in Social Network Communities | IEEE Computational Intelligence Magazine | 2019 | 19 |
45 | Detecting Code Smells using Deep Learning | | 2019 | 19 |
46 | Distant, opaque and seamful: seeing the state through the workings of Aadhaar in India | Information Technology for Development | 2021 | 19 |
47 | A Survey on Perfectly Secure Verifiable Secret-sharing | ACM Computing Surveys | 2022 | 19 |
48 | Adaptive Power Saving Algorithm for Mobile Subscriber Station in 802.16e | | 2007 | 18 |
49 | A new iris liveness detection method against contact lens spoofing | | 2011 | 18 |
50 | C–H···π Interactions and the Nature of the Donor Carbon Atom | Journal of Organic Chemistry | 2014 | 18 |