Recent techniques of clustering of time series data: a survey S Rani, G Sikka International Journal of Computer Applications 52 (15), 2012 | 336 | 2012 |
The emergence of social media data and sentiment analysis in election prediction P Chauhan, N Sharma, G Sikka Journal of Ambient Intelligence and Humanized Computing 12, 2601-2627, 2021 | 163 | 2021 |
A high capacity text steganography scheme based on LZW compression and color coding A Malik, G Sikka, HK Verma Engineering Science and Technology, an International Journal 20 (1), 72-79, 2017 | 94 | 2017 |
Opinion mining of news headlines using SentiWordNet A Agarwal, V Sharma, G Sikka, R Dhir 2016 Symposium on Colossal Data Analysis and Networking (CDAN), 1-5, 2016 | 90* | 2016 |
A new image steganography based on first component alteration technique A Kaur, R Dhir, G Sikka arXiv preprint arXiv:1001.1972, 2010 | 60 | 2010 |
Sentiment Analysis Approach Based on N-gram and KNN Classifier S Kaur, G Sikka, LK Awasthi 2018 First International Conference on Secure Cyber Computing and …, 2018 | 47 | 2018 |
An image interpolation based reversible data hiding scheme using pixel value adjusting feature A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 13025-13046, 2017 | 46 | 2017 |
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review RM Singh, LK Awasthi, G Sikka ACM Computing Surveys (CSUR) 55 (3), 1-43, 2022 | 45 | 2022 |
A reversible data hiding scheme for interpolated images based on pixel intensity range A Malik, G Sikka, HK Verma Multimedia Tools and Applications 79, 18005-18031, 2020 | 45 | 2020 |
An AMBTC compression based data hiding scheme using pixel value adjusting strategy A Malik, G Sikka, HK Verma Multidimensional Systems and Signal Processing 29, 1801-1818, 2018 | 43 | 2018 |
Image interpolation based high capacity reversible data hiding scheme A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 24107-24123, 2017 | 43 | 2017 |
Association rules extraction using multi-objective feature of genetic algorithm MK Gupta, G Sikka Proceedings of the World Congress on Engineering and Computer Science 2, 2013 | 38 | 2013 |
A high payload data hiding scheme based on modified AMBTC technique A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 14151-14167, 2017 | 36 | 2017 |
Enhancing Web Service Clustering using Length Feature Weight Method for Service Description Document Vector Space Representation N Agarwal, G Sikka, LK Awasthi Expert Systems with Applications, 2020 | 29 | 2020 |
Evaluation of web service clustering using Dirichlet Multinomial Mixture model based approach for Dimensionality Reduction in service representation N Agarwal, G Sikka, LK Awasthi Information Processing & Management 57 (4), 102238, 2020 | 27 | 2020 |
Estimating function points: Using machine learning and regression models G Sikka, A Kaur, M Uddin 2010 2nd International Conference on Education Technology and Computer 3, V3 …, 2010 | 26 | 2010 |
Multi-agent architecture for fault recovery in self-healing systems PK Rajput, G Sikka Journal of Ambient Intelligence and Humanized Computing 12, 2849-2866, 2021 | 23 | 2021 |
Tolhit–A Scheduling Algorithm for Hadoop Cluster M Brahmwar, M Kumar, G Sikka Procedia Computer Science 89, 203-208, 2016 | 23 | 2016 |
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities U Garg, G Sikka, LK Awasthi Computers & Security 77, 349-359, 2018 | 22 | 2018 |
Grey Relational Effort Analysis Technique Using Regression Methods for Software Estimation G Nagpal, M Uddin, A Kaur The International Arab Journal of Information Technology 11 (5), 437-446, 2014 | 22 | 2014 |