Intrusion detection and prevention using honeypot network for cloud security PS Negi, A Garg, R Lal 2020 10th International Conference on Cloud Computing, Data Science …, 2020 | 46 | 2020 |
A Hybrid approach using sobel and canny operator for digital image edge detection A Kalra, RL Chhokar 2016 International Conference on Micro-Electronics and Telecommunication …, 2016 | 44 | 2016 |
Securing the Internet of Things: A proposed framework K Jaswal, T Choudhury, RL Chhokar, SR Singh 2017 International Conference on Computing, Communication and Automation …, 2017 | 14 | 2017 |
Hybrid edge detection technique for digital images DK Chaudhary, R Lal, N Kashyap, T Choudhury 2016 International Conference on Computing, Communication and Automation …, 2016 | 12 | 2016 |
An appraisal on pharmacognosy, phytochemistry and bioactivity of Thuja occidentalis Linn.(Cupressaceae) A Dhiman, M Bhan, R Lal, B Dhimman, C Singla J Pharm Sci Innov 1 (3), 1-5, 2012 | 11 | 2012 |
Mood based classification of music by analyzing lyrical data using text mining N Kashyap, T Choudhury, DK Chaudhary, R Lal 2016 International Conference on Micro-Electronics and Telecommunication …, 2016 | 6 | 2016 |
Coccinella undecimpunctata Linn. as a predator of sorghum stem borer, Chilo zonellus (Swinhoe). MG Jotwani, M Anand, R Lal | 6 | 1972 |
Medicinal importance of allicin–a bioactive component from Allium sativum L (Garlic) R Jayaraj, R Lal Cancer Preventive and Therapeutic Compounds: Gift From Mother Nature …, 2017 | 5 | 2017 |
Physico-chemical and preliminary phytochemical investigation of Thuja occidentalis Linn. Dried leaves Int. Res M Bhan, R Lal, A Dhiman, A Nanda J. Pharm 2 (3), 213-217, 2011 | 5 | 2011 |
Vision-based real-time human–computer interaction on hand gesture recognition PS Negi, R Pawar, R Lal Micro-Electronics and Telecommunication Engineering: Proceedings of 3rd …, 2020 | 4 | 2020 |
Design and analysis of reliability for component-based software system by using soft computing approaches R Lal, N Kumar Int. J. Emerg. Technol. Adv. Eng 4 (6), 929-932, 2014 | 4 | 2014 |
An efficient scheme to secure cloud with diversified fortified mechanisms A Gupta, T Choudhury, R Lal 2017 International Conference on Big Data Analytics and Computational …, 2017 | 3 | 2017 |
Brain Tumor Detection Using Image Processing Based on Anisotropic Filtration Techniques A Garg, A Bajaj, R Lal Micro-Electronics and Telecommunication Engineering: Proceedings of 3rd …, 2020 | 2 | 2020 |
Brain Tumor Detection using PSO-FCM Based Segmentation PSN Roshan Lal, Santar Pal Singh, Aditya Garg International Journal of Engineering and Advanced Technology (IJEAT) 9 (ssue …, 2019 | 1* | 2019 |
Recommender process based on trust-distrust factor for signed social networks PSKS Roshan Lal 12th International Conference on Soft Computing for Problem Solving …, 2023 | | 2023 |
Information in a Social Network for Inferential Targeting of Advertisements using Machine Learning PSKS Roshan Lal IN Patent 202,321,037,053, 2023 | | 2023 |
Discovering of Influencers in signed social networks using nature inspired algorithm PSKS Roshan Lal IETE International Conference on Cyber Threats and Security (IETE ICCTS 2023 …, 2023 | | 2023 |
Computation of social status for node in dynamic overlapping communities for signed social networks PSKS Roshan Lal National Conference on Legacy of Information Communication Technology and …, 2023 | | 2023 |
Link prediction in signed social networks using nature inspired algorithm PSKS Roshan Lal National Conference on Legacy of Information Communication Technology and …, 2023 | | 2023 |
Challenges and Opportunities of Machine Learning and Deep Learning Techniques for the Internet of Drones NCS Roshan Lal,Sandhya Tarar "The Internet of Drones: AI Applications for Smart Solutions". 1, 657-667, 2022 | | 2022 |