Detection and classification of emergent behaviors using multi-agent simulation framework (WIP) S Singh, S Lu, MM Kokar, PA Kogut, L Martin Proceedings of the Symposium on Modeling and Simulation of Complexity in …, 2017 | 28 | 2017 |
Comparative diagnosis of falciparum malaria infections by microscopy, two RDTs, and nested PCR in the three states of North-western Nigeria R Singh, K Abdullahi, MDA Bunza, S Singh, K Kaitholia J Biol Agric Healthc 3 (5), 31-39, 2013 | 10 | 2013 |
A fuzzy impulse noise filter based on boundary discriminative noise detection OP Verma, S Singh Journal of Information Processing Systems 9 (1), 89-102, 2013 | 10 | 2013 |
Simulation of scale-free correlation in swarms of UAVs S Singh, MM Kokar Unifying Themes in Complex Systems IX: Proceedings of the Ninth …, 2018 | 3 | 2018 |
Detection of Emergent Behaviors in Systems of Dynamical Systems Using Similitude Theory S Singh Winter Simulation Conference, 2017, 2017 | 2 | 2017 |
Developing an Ontology for Emergence Using Formal Concept Analysis S Singh, MM Kokar, D Suresh International Conference on Complex Systems, 109-122, 2020 | 1 | 2020 |
Detecting undesirable emergent behavior in teams of autonomous uass P Kogut, M Kokar, S Singh, S Lu Safe and Secure Systems and Software Symposium (S5), 2016 | 1 | 2016 |
Drainage Network Analysis of River Basin Using Remote Sensing and GIS S Singh, K Chaubey, P Singh, OP Kumar, A Karmakar, T Subramani, ... Modern River Science for Watershed Management: GIS and Hydrogeological …, 2024 | | 2024 |
Dynamic Deployment of Communication Applications to Different Hardware Platforms using Ontological Representations Y Chen, M Gungor, S Singh, A Tazin, MM Kokar, M Leeser 2018 IEEE High Performance extreme Computing Conference (HPEC), 1-6, 2018 | | 2018 |
Detection and Learning of Unexpected Behaviors of Systems of Dynamical Systems by Using the Q2 Abstractions S Lu, M Kokar, S Singh, Northeastern University Boston United States | | 2017 |
Modeling and Analyzing Wavelet based Watermarking System using Game Theoretic Optimization Technique M Shweta, MA Tayal, MA Lathey IJCSI, 408, 2011 | | 2011 |
Decryption of MD5 encrypted key Password using Cloud Computing No Image SS N. S. Raghava, Shweta, Amit Gupta, Gaurav Abrol, Sohil Gupta CCV'10, 29-41, 2010 | | 2010 |