An efficient identity based multi-receiver signcryption scheme using ECC S Khullar, V Richhariya, V Richhariya International Journal of Advancements in Research & Technology 2 (4), 189-193, 2013 | 17 | 2013 |
A Deep-Learning Approach to Multimodal Sentiment Analysis V Shrivastava, V Richhariya, V Richhariya 2018 International Conference on Advanced Computation and Telecommunication …, 2018 | 8 | 2018 |
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying Queue Length and Dynamic TTL Value in MANET S yadav, V Richhariya IOSR Journal of Computer Engineering (IOSR-JCE) 14 (3), 13-19, 2013 | 7 | 2013 |
Real Time Text Mining on Twitter Data VR Shilpy Gandharv, V Richhariya International Journal of Computer Applications (IJCA) 6 (5), 24-28, 2017 | 5* | 2017 |
A Survey on Network Attacks in Mobile Ad Hoc Network V Richhariya, P Kaushik An International journal of Advanced Research in Computer Science and …, 2014 | 4 | 2014 |
Performance of AODV Against Malicious Node in Mobile Ad Hoc Network V Richhariya, JP Maurya "INTERNATIONAL JOURNAL OF ENGINEERNG RESEARCH IN CURRENT TRENDS" 2 (3), 102-105, 2020 | 2 | 2020 |
A Reputation-based Incentive Framework for Mobile Ad Hoc Networks V Richhariya, P Kaushik International Journal of Computer Applications 120 (12), 6-11, 2015 | 2 | 2015 |
A survey of Identity Based Multireceiver Signcryption scheme S Khullar, V Richhariya, V Richhariya International Journal of Scientific & Engineering Research 4 (4), 744-746, 2013 | 2 | 2013 |
Converging Deep Learning Neural Network Architecture for Predicting NSE-50 B Gour, JP Maurya, V Richhariya 2021 6th International Conference for Convergence in Technology (I2CT), 1-4, 2021 | 1 | 2021 |
Implementation of Weight Adjusting GNN With Differentiable Pooling for User Preference-aware Fake News Detection JP Maurya, V Richhariya, B Gour, V Kumar | | 2024 |
Corporate Sector Fraud: Challenges and Safety JP Maurya, D Rathore, S Joshi, M Manoria, V Richhariya Machine Learning Applications for Accounting Disclosure and Fraud Detection …, 2021 | | 2021 |
Improving Privacy Preservation by Anonymization Hierarchical Clustering And Des JP Maurya, V Richhariya, V Richhariya "INTERNATIONAL JOURNAL OF ENGINEERNG RESEARCH IN CURRENT TRENDS" 2 (3), 98-101, 2020 | | 2020 |
Performance Evaluation of Malicious Node in Mobile Ad Hoc Network using Aodv Protocol V Richhariya "INTERNATIONAL JOURNAL OF ENGINEERNG RESEARCH IN CURRENT TRENDS" 2 (3), 106 -109, 2020 | | 2020 |
An Approach to Reputation-based Incentive for Mobile Ad Hoc Networks V Richhariya, P Kaushik International Journal of Computer Science Trends and Technology (IJCST) 3 (3 …, 2015 | | 2015 |
Detection And Prevention Routing Misbehaviour in OLSR Routing A Namdev, V Richhariya, V Richhariya Journal of Global Research in Computer Science 4 (2), 25-30, 2013 | | 2013 |
An Analytical study of Space Time Block coding techniques for Wireless Networks P Kaithal, V Richhariya, V Richhariya International Journal of Scientific & Engineering Research 4 (5), 1627-1629, 2013 | | 2013 |
Efficient DoS Attacks Detection Technique in Mobile Ad-hoc Network A Namdev, V Richharia, V Richharia International Journal of Computer Applications 67 (5), 2013 | | 2013 |
Design And Development Of Efficient Algorithmin Web Usage Mining For Web Personalization MB Lodhi, V Richariya, V Richariya international journal of Computer Science & Information Technology 2 (10), 844, 2012 | | 2012 |
A Novel technique of soft handover in cellular network for smooth transition V Richhariya International journal of Advanced Engineering and Applications 1, 2011 | | 2011 |
A Sun JAVAFX Based Data Analysis Tool for Real-time Web Usage Mining V Richhariya An International journal of Advanced Engineering and Applications, 2011 | | 2011 |