Follow
Vikas Sejwar
Vikas Sejwar
MITS Gwalior
No verified email
Title
Cited by
Cited by
Year
Comparative study of routing protocols for mobile ad-hoc networks
P Suman, D Bisen, P Tomar, V Sejwar, R Shukla
International Journal of Information Technology & Knowledge Management 4 (1 …, 2009
232009
Impementation of QR code based secure system for information sharing using Matlab
S Sharma, V Sejwar
2016 8th International Conference on Computational Intelligence and …, 2016
172016
Sybil attack detection and analysis of energy consumption in cluster based sensor networks
S Saxena, V Sejwar
International Journal of Grid and Distributed Computing 7 (5), 15-30, 2014
102014
Crime identification using FP-growth and multi objective particle swarm optimization
S Agrawal, V Sejwar
2017 International Conference on Trends in Electronics and Informatics (ICEI …, 2017
72017
Optimized noisy image segmentation using genetic algorithm
S Pathak, V Sejwar
2017 International Conference on Intelligent Computing and Control Systems …, 2017
62017
Frequent pattern model for crime recognition
S Agrawal, V Sejwar
Int. J. Comput. Intell. Res 13 (6), 1405-1417, 2017
62017
QR code steganography for multiple image and text hiding using improved RSA-3DWT algorithm
S Sharma, V Sejwar
International Journal of Security and Its Applications 10 (7), 393-406, 2016
62016
Improved Trust Based Routing Mechanism in DSR Routing Protocol in MANETs
A Sahu, V Sejwar
International Journal of Future Generation Communication and Networking 8 (1 …, 2015
42015
Implementation of Dempster-Shafer theory for trust based communication in MANET
G Batham, V Sejwar
International Journal of Computer Applications 150 (11), 2016
32016
Avoidance of Hidden Terminal and Exposed terminal problem Using Directional MAC Protocol
K Agarwal, V Sejwar
Int. J. Futur. Gener. Commun. Netw 8 (4), 231-238, 2015
32015
Effect on throughput due to changes in transmission power of nodes in MANETs
K Agarwal, V Sejwar
International Journal of Future Generation Communication and Networking 8 (3 …, 2015
32015
Sybil attack detection through TDOA-based localization method in wireless sensor network
S Saxena, V Sejwar
Int. J. Emerg. Technol. Comput. Appl. Sci 9, 110-114, 2014
32014
A Survey on E-Payment using Quantum and Visual Cryptography.
A Arele, V Sejwar
International Journal of Advanced Research in Computer Science 8 (5), 2017
22017
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www. iasir. net
M Kumar, VK Katiyar
12013
A Novel Deep Learning Design of Plant Disease Recognition and Detection using VGG19, ResNet50, and DenseNet169.
V Sejwar
Grenze International Journal of Engineering & Technology (GIJET) 10 (1), 2024
2024
Facial Expression Recognition with Combination of Geometric and Textural Domain Features Extractor using CNN and Machine Learning
V Gupta, V Sejwar
2022 International Conference on Augmented Intelligence and Sustainable …, 2022
2022
A Survey On Security Using Encryption Techniques In Cloud
PG Scholar
2017
Year of Publication: 2016
G Batham, V Sejwar
2016
Detection and Prevention Techniques of Wormhole Attack-A Survey
DS Kachhwaha
Recent Trends in Parallel Computing 2 (2), 1-8, 2015
2015
Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography
A Arele, V Sejwar
The system can't perform the operation now. Try again later.
Articles 1–20