Mohammad Najmud Doja
Cited by
Cited by
Land records on blockchain for implementation of land titling in India
V Thakur, MN Doja, YK Dwivedi, T Ahmad, G Khadanga
International Journal of Information Management 52, 101940, 2020
Fuzzy based enhanced cluster head selection (FBECS) for WSN
PS Mehra, MN Doja, B Alam
Journal of King Saud University-Science 32 (1), 390-401, 2020
Detecting distraction of drivers using convolutional neural network
S Masood, A Rai, A Aggarwal, MN Doja, M Ahmad
Pattern Recognition Letters 139, 79-85, 2020
A new hyperchaotic system-based design for efficient bijective substitution-boxes
E Al Solami, M Ahmad, C Volos, MN Doja, MMS Beg
entropy 20 (7), 525, 2018
A New 1D Chaotic Map and -Hill Climbing for Generating Substitution-Boxes
AA Alzaidi, M Ahmad, MN Doja, E Al Solami, MMS Beg
IEEE Access 6, 55405-55418, 2018
Feature and opinion mining for customer review summarization
M Abulaish, Jahiruddin, MN Doja, T Ahmad
Pattern Recognition and Machine Intelligence: Third International Conference …, 2009
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
M Ahmad, MN Doja, MMS Beg
Journal of King Saud University-Computer and Information Sciences 33 (1), 77-85, 2021
ABC optimization based construction of strong substitution-boxes
M Ahmad, MN Doja, MMS Beg
Wireless Personal Communications 101, 1715-1729, 2018
K-means clustering using weka interface
S Jain, MA Aalam, MN Doja
Proceedings of the 4th National Conference, 25-26, 2010
Hybrid filter–wrapper feature selection method for sentiment classification
G Ansari, T Ahmad, MN Doja
Arabian Journal for Science and Engineering 44, 9191-9208, 2019
Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos
M Ahmad, E Al Solami, XY Wang, MN Doja, MMS Beg, AA Alzaidi
Symmetry 10 (7), 266, 2018
H-leach: Modified and efficient leach protocol for hybrid clustering scenario in wireless sensor networks
V Gupta, MN Doja
Next-Generation Networks: Proceedings of CSI-2015, 399-408, 2018
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
S Mehfuz, MN Doja
Journal of Artificial Evolution and Applications 2008, 2008
5-layered architecture of cloud database management system
B Alam, MN Doja, M Alam, S Mongia
AASRI Procedia 5, 194-199, 2013
Zonal based approach for clustering in heterogeneous WSN
PS Mehra, MN Doja, B Alam
International Journal of Information Technology 11 (3), 507-515, 2019
Generalization of Dijkstra's Algorithm for Extraction of Shortest Paths in Directed multigraphs.
SS Biswas, B Alam, MN Doja
J. Comput. Sci. 9 (3), 377-382, 2013
Image authentication schemes against key-logger spyware
MN Doja, N Kumar
2008 Ninth ACIS International Conference on Software Engineering, Artificial …, 2008
Swarm intelligence-based topology maintenance protocol for wireless sensor networks
MB Krishna, MN Doja
IET wireless sensor systems 1 (4), 181-190, 2011
Finding time quantum of round robin cpu scheduling algorithm using fuzzy logic
B Alam, MN Doja, R Biswas
2008 International Conference on Computer and Electrical Engineering, 795-798, 2008
Self-organized energy conscious clustering protocol for wireless sensor networks
MB Krishna, MN Doja
2012 14th International Conference on Advanced Communication Technology …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20