Fuzzy logic based multi Document Summarization with improved sentence scoring and redundancy removal technique DB Patel, S Shah, HR Chhinkaniwala Expert Systems with Applications, Elsevier, 2019 | 77 | 2019 |
Comparison of a time efficient modified K-mean algorithm with K-mean and K-medoid algorithm S Shah, M Singh IEEE Communication Systems and Network Technologies (CSNT), 2012 …, 2012 | 62 | 2012 |
Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET H Ghayvat, S Pandya, S Shah, SC Mukhopadhyay, MH Yap, KH Wandra 2016 10th international conference on sensing technology (ICST), 1-6, 2016 | 31 | 2016 |
Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation GS Pandi, S Shah, KH Wandra Procedia Computer Science 167, 163-173, 2020 | 23 | 2020 |
Techniques for detection and analysis of tumours from brain MRI images: a review SA Shah, NC Chauhan Journal of Biomedical Engineering and Medical Imaging 3 (1), 09, 2016 | 20 | 2016 |
An automated approach for segmentation of brain MR images using Gaussian mixture model based hidden Markov random field with expectation maximization SA Shah, NC Chauhan Journal of Biomedical Engineering and Medical Imaging 2 (4), 57, 2015 | 18 | 2015 |
Classification of Brain MRI Images using Computational Intelligent Techniques SS N.C. Chauhan International Journal of Computer Applications 124 (14), 27-35, 2015 | 11 | 2015 |
Issues in Medical Diagnosis Using Computational Techniques S Shah, S Parikh IEEE Computational Intelligence and Communication Networks (CICN), 2012 …, 2012 | 8 | 2012 |
Automated Indian Vehicle Number Plate Detection S Shah, N Rathod, PK Saini, V Patel, H Rajput, P Sheth Soft Computing: Theories and Applications - Springer, 453-461, 2019 | 6 | 2019 |
Differentiated service class recommendations for LLN traffic S Shah, P Thubert Draft-svshahtsvwg-lln-diffserv-recommendations-00, 2012 | 5 | 2012 |
Evaluating performance of asymmetric homomorphic encryption algorithms for privacy preservation in location based services AD Rathod, SA Shah, VJ Jariwala Int. J. Recent Technol. Eng 8, 2191-2194, 2019 | 4 | 2019 |
Multi-objective Prediction based Task Scheduling Method in Cloud Computing SM Parikh, SA Shah, NM Patel International Journal of Recent Technology and Engineering (IJRTE) 8 (4 …, 2019 | 3 | 2019 |
Decentralized collaborative TTP free approach for privacy preservation in location based services. A Rathod, S Shah, V Jariwala International Journal of Electrical & Computer Engineering (2088-8708) 9 (6), 2019 | 2 | 2019 |
Custom Named Entity Recognition for Gujrati Text Using Spacy KB Vora, AR Vasant, S Shah Mathematical Statistician and Engineering Applications 71 (3), 1483-1495, 2022 | 1 | 2022 |
Design and Implementation of IPFS Enabled Security Framework for Multimedia Data Files V Thumar, S Shah, V Vekariya International Journal of Engineering Trends and Technology 70 (1), 355-361, 2022 | 1 | 2022 |
Technique for Optimization of Association Rule Mining by Utilizing Genetic Algorithm DH Patel, S Shah, A Vasant Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021 | 1 | 2021 |
Augmenting the Operations on Cloud Virtual Forensic Data by Employing Probabilistic Data Structures GS Pandi, S Shah, KH Wandra International Journal of Sensors Wireless Communications and Control 10 (5 …, 2020 | 1 | 2020 |
Mathematical Formulation of Prediction based Task Scheduling Method in Cloud Computing SM Parikh, SA Shah, NM Patel 2020 12th International Conference on Computational Intelligence and …, 2020 | 1 | 2020 |
Centralized processing of north-south traffic for logical network in public cloud J Yu, S Wang, A Katrekar, M Hira, S Shah US Patent 11,792,138, 2023 | | 2023 |
Text Classification of Gujrati News Headlines Using Machine Learning KB Vora, AR Vasant, S Shah NeuroQuantology 20 (10), 5085, 2022 | | 2022 |