A poly_hop message routing approach through node and data classification for optimizing energy consumption and enhanced reliability in WBAN S Saha, D Anvekar IEEE xplore, 788-792, 2017 | 8 | 2017 |
State of The Art in WBAN Security & Open Research Issues MS Saha, DK Anvekar International Journal on Recent and Innovation Trends in Computing and …, 2014 | 5 | 2014 |
ZigBee OPNET modeler: An efficient performance analyzer for wireless sensor networks S Saha International Journal of Engineering Sciences & Research Technology 2 (8), 2013 | 4 | 2013 |
Use of Central Mediator System and Cluster Head in Maintaining Fault Tolerance and Balancing the Load of Multithreaded Wireless Body Area Network (MWBAN) Data S Saha, DK Anvekar Indian Journal of Science and Technology, 2016 | 3 | 2016 |
Protocol Design Issues in Implementing Security for Wireless Body Area Network MS Saha, DDK Anvekar International Journal of Engineering and Technical Research 2 (12), 243-246, 2014 | 3 | 2014 |
Cluster-based Protocol for Prioritized Message Communication in VANET S Saha, VV Kumar, VR Niveditha, AK Velmurugan, K Gunasekaran, ... IEEE Access, 2023 | 2 | 2023 |
Trust Based Distributed Group Key Management Technique for Securing Multithreaded WBAN DDKA Ms. Sanchari Saha International Journal of Recent Technology and Engineering (IJRTE), (Scopus …, 2019 | 2* | 2019 |
A Survey on Resource Management in Cloud Computing S Saha, KV Abhilash The International Journal of Computer Science and Information Technologies …, 2014 | 2 | 2014 |
A Survey on Protecting Information Brokerage System against Intruders S Saha IJEIT, ISSN No: 2277-3754 2 (4), 2013 | 2 | 2013 |
From Data to Insights: A Review of Cloud-Based Big Data Tools and Technologies PSH Darius, K Sowjanya, VN Manju, S Saha, P Mitra, P Majumder, ... Big Data Computing, 86-110, 2024 | 1 | 2024 |
Crash Recovery and Accident Prediction Using a IoT Based Blackbox System S Saha 2022 IEEE North Karnataka Subsection Flagship International Conference …, 2022 | 1 | 2022 |
BPM supported model generation by contemplating key elements of information security M Mythily, S Saha, S Selvam, ITJ Swamidason Automated Software Engineering 29 (1), 23, 2022 | 1 | 2022 |
Touch-Free Finger Sensing using Laser Light for Keys and Keyboards P Ravi, FR Ali PSYCHOLOGY AND EDUCATION 58 (1), 3404-3409, 2021 | 1 | 2021 |
An energy efficient cluster-head formation and medium access technique in multi-hop wban S Saha, DK Anvekar ICTACT Journal on Communication Technology 9 (3), 18291837, 2018 | 1 | 2018 |
Contextual Information Based Scheduling for Service Migration in Mobile Edge Computing S Saha, I Perumal, VR Niveditha, M Abbas, I Manimozhi, CR Bhat INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL 19 (3), 2024 | | 2024 |
Multi-criteria Rank Based Geo-distributed Load Balancing for Cloud Computing PSH Darius, P Majumder, VN Manju, S Saha, J Suneetha, P Mitra 2024 Second International Conference on Emerging Trends in Information …, 2024 | | 2024 |
Application of Factor Graph Model in Stress Detection Using Social Network Messages S Saha, S Vaishnavi, BN Tejaswi Roles and Challenges of Semantic Intelligence in Healthcare Cognitive …, 2024 | | 2024 |
Energy Conservation in Wireless Body Area Network Using Optimal Route Selection and Node Configuration S Saha, CN Prabhavathi, N Kumar, DK Anvekar 2023 International Conference on Data Science and Network Security (ICDSNS), 1-6, 2023 | | 2023 |
Comparative Analysis of Cognitive Services in Popular Cloud Platforms PSH Darius, K Krishna Sowjanya, VN Manju, S Saha, P Mitra, S Aswathi, ... International Conference on Computational Intelligence, 271-283, 2022 | | 2022 |
Classifiers Based on Machine Learning for Detection of Myocardial Infarction S Saha 2022 International Interdisciplinary Humanitarian Conference for …, 2022 | | 2022 |