Energy Efficient Techniques for Data aggregation and collection in WSN S Chaudhary, N Singh, A Pathak, AK Vatsa International Journal of Computer Science, Engineering and Applications …, 2012 | 81 | 2012 |
Encryption and Decryption Algorithm using ASCII values with substitution array Approach SS Vineet Sukhraliya, Sumit Chaudhary International Journal of Advanced Research in Computer and Communication …, 2013 | 20 | 2013 |
Resource allocation strategies used in cloud computing: A critical analysis NK Pandey, S Chaudhary, NK Joshi 2016 2nd International Conference on Communication Control and Intelligent …, 2016 | 19 | 2016 |
Plants diseases prediction framework: a image-based system using deep learning M Kirola, K Joshi, S Chaudhary, N Singh, H Anandaram, A Gupta 2022 IEEE World Conference on Applied Intelligence and Computing (AIC), 307-313, 2022 | 18 | 2022 |
Comparative study between cryptographic and hybrid techniques for implementation of security in cloud computing S Chaudhary, F Suthar, NK Joshi Performance Management of Integrated Systems and its Applications in …, 2020 | 15 | 2020 |
Multi-focus image fusion using discrete wavelet transform method K Joshi, M Kirola, S Chaudhary, M Diwakar, NK Joshi International conference on advances in engineering science management …, 2019 | 13 | 2019 |
Energy efficient cluster formation and secure data outsourcing using TEOSCC and ECDH-IBT technique in WBAN T Mukhtar, S Chaudhary 2016 International Conference on Wireless Communications, Signal Processing …, 2016 | 13 | 2016 |
Explicit query based detection and prevention techniques for DDoS in MANET N Singh, S Chaudhary, KK Verma, AK Vatsa International Journal of Computer Applications 53 (2), 2012 | 7 | 2012 |
Secured blended approach for cryptographic algorithm in cloud computing S Chaudhary, NK Joshi International Journal of Pure and Applied Mathematics 118 (20), 297-304, 2018 | 6 | 2018 |
Advance Handoff Requirements Schemes in Wimax and LTE Networks in Wireless Sensor Network H Kaushik, S Chaudhary, N Singh, KK Verma International Journal of Computer Applications 975, 8887, 2012 | 5 | 2012 |
Architecture based on Li-Fi to enhance the working environment BJ Varun Shah, Sumit Chaudhary International Journal of Advanced Research in Computer and Communication …, 2017 | 4* | 2017 |
Green Approach for Next Generation Computing: A Survey R Jain, S Chaudhary, R Kumar International Journal of Advanced Engineering Research and Science (IJAERS …, 2017 | 4 | 2017 |
A Novel Machine Learning Approach for Malware Detection T Kumar, S Sharma, H Goel, M Memoria International Conference on Advances in Engineering Science Management …, 2019 | 3 | 2019 |
Cryptography Using Multi-Dimensional Objects G Jindal, S Baranwal, M Memoria International Conference on Advances in Engineering Science Management …, 2019 | 3 | 2019 |
Extended Multi Queue Job Scheduling in Cloud NKJ neeraj pandey, Sumit Chaudhary International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 3* | 2017 |
Global Optimization using Distributed Optimization Clustering Technique (DOCT) in Wireless Sensor Network R Sharma, S Chaudhary International Journal of Advanced Research in Computer and Communication …, 2015 | 3 | 2015 |
Improved range localization in wireless sensor networks: a survey A Kumar, S Chaudhary International Journal 5 (5), 1199-1208, 2015 | 3 | 2015 |
Non-Linear Controller Based 3–ϕ Shunt Active Filter for Improvement of Power Quality in Non-Linear Load G Satish, K Rameshkumar, B Dhanasakkaravarthi, K Jeyalakshmi, ... 2023 IEEE International Conference on Integrated Circuits and Communication …, 2023 | 2 | 2023 |
Performance Analysis of Efficient Power Management Controls in Android Device PA Chirag Shah, Sumit Chaudhary International Journal of Advanced Research in Computer and Communication …, 2017 | 2 | 2017 |
A Novel Technique for Secure Communication in Cryptography P Bhadauriya, F Suthar, S Chaudhary International Journal of Advanced Research in Computer and Communication …, 2007 | 2 | 2007 |