Anand Sharma
Anand Sharma
MUST, Lakshmangarh
Verified email at
Cited by
Cited by
Improve performance of extract, transform and load (ETL) in data warehouse
V Gour, SS Sarangdevot, GS Tanwar, A Sharma
International Journal on Computer Science and Engineering 2 (3), 786-789, 2010
XCOVNet: Chest X-ray Image Classification for COVID-19 Early Detection Using Convolutional Neural Networks
V Madaan, A Roy, C Gupta, P Agrawal, A Sharma, C Bologa, R Prodan
New Generation Computing, 1-15, 2021
Visual cryptography improvises the security of tongue as a biometric in banking system
S Suryadevara, R Naaz, S Kapoor, A Sharma
2011 2nd International Conference on Computer and Communication Technology …, 2011
Implementation of cryptography for privacy preserving data mining
A Sharma, V Ojha
International Journal of Database Management Systems 2 (3), 57-65, 2010
Quantum Cryptography for Internet of Things Security
AP Bhatt, A Sharma
Journal of Electronic Science and Technology 17 (3), 213-220, 2019
Performance analysis of face detection by using Viola-Jones algorithm
J Kaur, A Sharma
International Journal of Computational Intelligence Research 13 (5), 707-717, 2017
Hiding sensitive association rules efficiently by introducing new variable hiding counter
RC Belwal, J Varshney, SA Khan, A Sharma, M Bhattacharya
2008 IEEE International Conference on Service Operations and Logistics, and …, 2008
An automated recognition of fake or destroyed Indian currency notes in machine vision
M Sanjana, A Sharma
Int. J. Comput. Sci. Manag. Stud 12 (2), 53-60, 2012
Security of entanglement based version of BB84 protocol for Quantum Cryptography
A Sharma, V Ojha, SK Lenka
2010 3rd International Conference on Computer Science and Information …, 2010
Secure key agreement with rekeying using FLSO routing protocol in wireless sensor network
U Meena, A Sharma
Wireless Personal Communications 101 (2), 1177-1199, 2018
Malware Detection & Classification using Machine Learning
S Choudhary, A Sharma
2020 International Conference on Emerging Trends in Communication, Control …, 2020
Vehicle Detection from Satellite Images in Digital Image Processing
NK Gill, A Sharma
International Journal of Computational Intelligence Research 13 (5), 697-705, 2017
Password based authentication: Philosophical survey
A Sharma, RC Belwal, V Ojha, G Agarwal
2010 IEEE International Conference on Intelligent Computing and Intelligent …, 2010
Tongue as a biometric visualizes new prospects of cloud computing security
S Suryadevara, S Kapoor, S Dhatterwal, R Naaz, A Sharma
International Conference on Information and Network Technology, IPCSIT 4, 2011
Advantages of Classical Cryptography Over the Quantum Cryptography
V Ojha, A Sharma, SK Lenka, SR Biradar
World Appl. Program 2 (5), 257-262, 2012
Security aspect of quantum key distribution
A Sharma, V Ojha, V Goar
Int. J. Computer Applications 2, 58-62, 2010
Detection of DDoS Attacks Using Machine Learning in Cloud Computing
V Sharma, V Verma, A Sharma
International Conference on Advanced Informatics for Computing Research, 260-273, 2019
Noise Models and De-noising Techniques in Digital Image Processing
NK Gill, A Sharma
International Journal of Computer & Mathematical Sciences 5 (1), 21-25, 2016
Authentication in online banking systems: quantum cryptography perspective
A Sharma, SK Lenka
Int. J. Engineering and Technology 5, 561-564, 2014
Authentication in online banking systems through quantum cryptography
A Sharma, SK Lenka
Int. J. Engineering and Technology 5, 2696-2700, 2013
The system can't perform the operation now. Try again later.
Articles 1–20