The following pages link to Neeraj Kumar (Q418347):
Displayed 37 items.
- A novel minimum delay maximum flow multicast algorithm to construct a multicast tree in wireless mesh networks (Q418350) (← links)
- A deterministic two warehouse inventory model for deteriorating items with stock-dependent demand and shortages under the conditions of permissible delay (Q425574) (← links)
- An inventory model for deteriorating items with shortages and stock-dependent demand under inflation for two-shops under one management (Q535618) (← links)
- Two-warehouse fuzzy inventory model under the conditions of permissible delay in payments (Q650245) (← links)
- Privacy-preserving certificateless provable data possession scheme for big data storage on cloud (Q1740079) (← links)
- Optimisation of fuzzy inventory model for differential items (Q1758838) (← links)
- An inventory model with time-dependent demand and limited storage facility under inflation (Q1953221) (← links)
- An intelligent phishing detection scheme using machine learning (Q2050766) (← links)
- Phase transitions in \(D\)-dimensional Gauss-Bonnet-Born-Infeld \textit{AdS} black holes (Q2060497) (← links)
- The maximum exposure problem (Q2123293) (← links)
- Phase transitions in Born-Infeld AdS black holes in \(D\)-dimensions (Q2179661) (← links)
- Shortest paths in the plane with obstacle violations (Q2182089) (← links)
- Color image steganography scheme using gray invariant in AMBTC compression domain (Q2192928) (← links)
- Improved approximation bounds for the minimum constraint removal problem (Q2206735) (← links)
- An intelligent approach for building a secure decentralized public key infrastructure in VANET (Q2346927) (← links)
- A general compiler for password-authenticated group key exchange protocol in the standard model (Q2413217) (← links)
- UBMR-CA: utility-based multicast routing and channel assignment with varying traffic demands in multi-radio multi-channel wireless mesh networks (Q2450517) (← links)
- Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing (Q2515429) (← links)
- Effect of salvage value on a two-warehouse inventory model for deteriorating items with stock-dependent demand rate and partial backlogging (Q2627495) (← links)
- A Novel Algorithm for Magic Squares (Q2820263) (← links)
- (Q3019905) (← links)
- (Q3090556) (← links)
- (Q3162318) (← links)
- (Q3166657) (← links)
- A genetic algorithm for FMS part type selection and machine loading (Q4525606) (← links)
- Comparing the effectiveness of workload balancing objectives in FMS loading (Q4674394) (← links)
- (Q5009492) (← links)
- (Q5111738) (← links)
- (Q5116468) (← links)
- (Q5172001) (← links)
- (Q5875471) (← links)
- (Q6147302) (← links)
- Prime ideals and regular sequences of symmetric polynomials (Q6244560) (← links)
- Syzygies, Betti numbers and regularity of cover ideals of certain multipartite graphs (Q6291338) (← links)
- D-Sequence Edge Binomials, and Regularity of Powers of Binomial Edge Ideals of Trees (Q6410850) (← links)
- A note on sequences and y-regularity of Rees algebra (Q6428027) (← links)
- (Almost) Complete Intersection Lov\'{a}sz-Saks-Schrijver ideals and regularity of their powers (Q6436765) (← links)