Comparative study of routing protocols for mobile ad-hoc networks P Suman, D Bisen, P Tomar, V Sejwar, R Shukla International Journal of Information Technology & Knowledge Management 4 (1 …, 2009 | 23 | 2009 |
Impementation of QR code based secure system for information sharing using Matlab S Sharma, V Sejwar 2016 8th International Conference on Computational Intelligence and …, 2016 | 17 | 2016 |
Sybil attack detection and analysis of energy consumption in cluster based sensor networks S Saxena, V Sejwar International Journal of Grid and Distributed Computing 7 (5), 15-30, 2014 | 10 | 2014 |
Crime identification using FP-growth and multi objective particle swarm optimization S Agrawal, V Sejwar 2017 International Conference on Trends in Electronics and Informatics (ICEI …, 2017 | 7 | 2017 |
Optimized noisy image segmentation using genetic algorithm S Pathak, V Sejwar 2017 International Conference on Intelligent Computing and Control Systems …, 2017 | 6 | 2017 |
Frequent pattern model for crime recognition S Agrawal, V Sejwar Int. J. Comput. Intell. Res 13 (6), 1405-1417, 2017 | 6 | 2017 |
QR code steganography for multiple image and text hiding using improved RSA-3DWT algorithm S Sharma, V Sejwar International Journal of Security and Its Applications 10 (7), 393-406, 2016 | 6 | 2016 |
Improved Trust Based Routing Mechanism in DSR Routing Protocol in MANETs A Sahu, V Sejwar International Journal of Future Generation Communication and Networking 8 (1 …, 2015 | 4 | 2015 |
Implementation of Dempster-Shafer theory for trust based communication in MANET G Batham, V Sejwar International Journal of Computer Applications 150 (11), 2016 | 3 | 2016 |
Avoidance of Hidden Terminal and Exposed terminal problem Using Directional MAC Protocol K Agarwal, V Sejwar Int. J. Futur. Gener. Commun. Netw 8 (4), 231-238, 2015 | 3 | 2015 |
Effect on throughput due to changes in transmission power of nodes in MANETs K Agarwal, V Sejwar International Journal of Future Generation Communication and Networking 8 (3 …, 2015 | 3 | 2015 |
Sybil attack detection through TDOA-based localization method in wireless sensor network S Saxena, V Sejwar Int. J. Emerg. Technol. Comput. Appl. Sci 9, 110-114, 2014 | 3 | 2014 |
A Survey on E-Payment using Quantum and Visual Cryptography. A Arele, V Sejwar International Journal of Advanced Research in Computer Science 8 (5), 2017 | 2 | 2017 |
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net M Kumar, VK Katiyar | 1 | 2013 |
A Novel Deep Learning Design of Plant Disease Recognition and Detection using VGG19, ResNet50, and DenseNet169. V Sejwar Grenze International Journal of Engineering & Technology (GIJET) 10 (1), 2024 | | 2024 |
Facial Expression Recognition with Combination of Geometric and Textural Domain Features Extractor using CNN and Machine Learning V Gupta, V Sejwar 2022 International Conference on Augmented Intelligence and Sustainable …, 2022 | | 2022 |
A Survey On Security Using Encryption Techniques In Cloud PG Scholar | | 2017 |
Year of Publication: 2016 G Batham, V Sejwar | | 2016 |
Detection and Prevention Techniques of Wormhole Attack-A Survey DS Kachhwaha Recent Trends in Parallel Computing 2 (2), 1-8, 2015 | | 2015 |
Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography A Arele, V Sejwar | | |