


default search action
Vijay Kumar Jha
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j20]Shishir Singh Chauhan
, Vijay Kumar Jha
, Gauri Shanker Gupta
:
A Four-Phase Spatio-Temporal and Quantum-Enhanced Framework for Traffic Speed Forecasting With Calibrated Uncertainty. IEEE Access 14: 28994-29017 (2026)
[j19]Chinmayee Chaini
, Vijay Kumar Jha
, Kumar Rajnish
:
A comparison of single-stage and two-stage based crater detectors on the lunar surface. Earth Sci. Informatics 19(2): 20 (2026)- 2025
[j18]Chinmayee Chaini
, Vijay Kumar Jha
, Kumar Rajnish
:
Multi-scale feature pyramid-based crater detection on lunar surface. Earth Sci. Informatics 18(3): 305 (2025)
[j17]Chandra Shekhar Tiwari, Vijay Kumar Jha:
OSI network layers based secured data sharins in cloud computing using STXORSK-QC and dhdecct-MAC. Discov. Comput. 28(1): 23 (2025)
[j16]Sandip Kumar Singh Modak
, Vijay Kumar Jha:
Machine and deep learning techniques for the prediction of diabetics: a review. Multim. Tools Appl. 84(18): 19425-19549 (2025)- 2024
[j15]Chinmayee Chaini
, Vijay Kumar Jha
:
A review on deep learning-based automated lunar crater detection. Earth Sci. Informatics 17(5): 3863-3898 (2024)
[j14]Sandip Kumar Singh Modak
, Vijay Kumar Jha:
Diabetes prediction model using machine learning techniques. Multim. Tools Appl. 83(13): 38523-38549 (2024)
[j13]Vanita Verma, Vijay Kumar Jha:
Secure and Energy-Aware Data Transmission for IoT-WSNs with the Help of Cluster-Based Secure Optimal Routing. Wirel. Pers. Commun. 134(3): 1665-1686 (2024)- 2023
[j12]Kishan Kumar Singh
, Vijay Kumar Jha
:
An optimized novel public cloud system to secure the medical record from third parties. Concurr. Comput. Pract. Exp. 35(19) (2023)
[j11]Kishan Kumar Singh
, Vijay Kumar Jha
:
Security enhancement of the cloud paradigm using a novel optimized crypto mechanism. Multim. Tools Appl. 82(11): 15983-16007 (2023)
[j10]Sandip Kumar Singh Modak
, Vijay Kumar Jha
:
A Novel Multimodal Biometric Authentication Framework Using Rule-Based ANFIS Based on Hybrid Level Fusion. Wirel. Pers. Commun. 128(1): 187-207 (2023)- 2022
[j9]Deepak Kumar
, Vijay Kumar Jha
:
A Review on Recent Trends in Query Processing and Optimization in Big Data. Wirel. Pers. Commun. 124(1): 633-654 (2022)- 2021
[j8]Deepak Kumar
, Vijay Kumar Jha
:
An improved query optimization process in big data using ACO-GA algorithm and HDFS map reduce technique. Distributed Parallel Databases 39(1): 79-96 (2021)
[j7]Deepak Kumar
, Vijay Kumar Jha
:
An efficient query optimization technique in big data using σ-ANFIS load balancer and CaM-BW optimizer. J. Supercomput. 77(11): 13018-13045 (2021)
[j6]Vanita Verma, Vijay Kumar Jha
:
An Efficient Wormhole Detection and Optimal Path Selection for Secure Data Transmission in WSN Environment. Wirel. Pers. Commun. 121(4): 2927-2945 (2021)
2010 – 2019
- 2019
[j5]Archana Chougule, Vijay Kumar Jha
, Debajyoti Mukhopadhyay
:
Decision support for nutrition management of grapes using ontology based on decision trees. Int. J. Inf. Decis. Sci. 11(3): 234-255 (2019)
[j4]Archana Chougule, Vijay Kumar Jha
, Debajyoti Mukhopadhyay
:
Decision support for grape crop protection using ontology. Int. J. Reason. based Intell. Syst. 11(1): 24-37 (2019)
[j3]Sandip Kumar Singh Modak
, Vijay Kumar Jha
:
Multibiometric fusion strategy and its applications: A review. Inf. Fusion 49: 174-204 (2019)- 2018
[j2]Shree Ranjan, Vijay Kumar Jha, Pralay Pal:
Critical success factors in ERP implementation in Indian manufacturing enterprises: an exploratory analysis. Int. J. Bus. Inf. Syst. 28(4): 404-424 (2018)- 2016
[j1]Shree Ranjan, Vijay Kumar Jha
, Pralay Pal
:
Literature review on ERP implementation challenges. Int. J. Bus. Inf. Syst. 21(3): 388-402 (2016)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-06 21:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







