Comparative study of routing protocols for mobile ad-hoc networks P Suman, D Bisen, P Tomar, V Sejwar, R Shukla International Journal of Information Technology & Knowledge Management 4 (1 …, 2009 | 24 | 2009 |
Impementation of QR code based secure system for information sharing using Matlab S Sharma, V Sejwar 2016 8th International Conference on Computational Intelligence and …, 2016 | 17 | 2016 |
Sybil attack detection and analysis of energy consumption in cluster based sensor networks S Saxena, V Sejwar International Journal of Grid and Distributed Computing 7 (5), 15-30, 2014 | 10 | 2014 |
Optimized noisy image segmentation using genetic algorithm S Pathak, V Sejwar 2017 International Conference on Intelligent Computing and Control Systems …, 2017 | 8 | 2017 |
Crime identification using FP-growth and multi objective particle swarm optimization S Agrawal, V Sejwar 2017 International Conference on Trends in Electronics and Informatics (ICEI …, 2017 | 7 | 2017 |
Frequent pattern model for crime recognition S Agrawal, V Sejwar Int. J. Comput. Intell. Res 13 (6), 1405-1417, 2017 | 6 | 2017 |
QR code steganography for multiple image and text hiding using improved RSA-3DWT algorithm S Sharma, V Sejwar International Journal of Security and Its Applications 10 (7), 393-406, 2016 | 5 | 2016 |
Improved Trust Based Routing Mechanism in DSR Routing Protocol in MANETs A Sahu, V Sejwar International Journal of Future Generation Communication and Networking 8 (1 …, 2015 | 4 | 2015 |
Implementation of Dempster-Shafer theory for trust based communication in MANET G Batham, V Sejwar International Journal of Computer Applications 150 (11), 2016 | 3 | 2016 |
Avoidance of Hidden Terminal and Exposed terminal problem Using Directional MAC Protocol K Agarwal, V Sejwar International Journal of Future Generation Communication and Networking 8 (4 …, 2015 | 3 | 2015 |
Effect on throughput due to changes in transmission power of nodes in MANETs K Agarwal, V Sejwar International Journal of Future Generation Communication and Networking 8 (3 …, 2015 | 3 | 2015 |
Sybil attack detection through TDOA-based localization method in wireless sensor network S Saxena, V Sejwar Int. J. Emerg. Technol. Comput. Appl. Sci 9, 110-114, 2014 | 3 | 2014 |
A Survey on E-Payment using Quantum and Visual Cryptography. A Arele, V Sejwar International Journal of Advanced Research in Computer Science 8 (5), 2017 | 2 | 2017 |
Facial Expression Recognition with Combination of Geometric and Textural Domain Features Extractor using CNN and Machine Learning V Gupta, V Sejwar 2022 International Conference on Augmented Intelligence and Sustainable …, 2022 | 1 | 2022 |
A Comparative Analysis for Filter-Based Feature Selection Techniques with Tree-based Classification M Parmar, A Sonker, V Sejwar | 1 | |
Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography A Arele, V Sejwar | 1 | |
Prediction of Benign and Malignant Breast Cancer using Machine Learning Techniques: A Review and Comparative Analysis A Manjhwar, D Batham, M Parmar, V Sejwar 2024 1st International Conference on Advanced Computing and Emerging …, 2024 | | 2024 |
A Novel Deep Learning Design of Plant Disease Recognition and Detection using VGG19, ResNet50, and DenseNet169. V Sejwar Grenze International Journal of Engineering & Technology (GIJET) 10 (1), 2024 | | 2024 |
A Survey On Security Using Encryption Techniques In Cloud PG Scholar | | 2017 |
Year of Publication: 2016 G Batham, V Sejwar | | 2016 |