Security improvisation in image steganography using DES MK Ramaiya, N Hemrajani, AK Saxena 2013 3rd IEEE International Advance Computing Conference (IACC), 1094-1099, 2013 | 77 | 2013 |
Improvisation of Security aspect in Steganography applying DES MK Ramaiya, N Hemrajani, AK Saxena 2013 International Conference on Communication Systems and Network …, 2013 | 20 | 2013 |
A comprehensive review on detection of wormhole attack in MANET SK Jangir, N Hemrajani 2016 International Conference on ICT in Business Industry & Government …, 2016 | 17 | 2016 |
Secured steganography approach using AES M Ramaiya, N Hemrajani, AK Saxena International Journal of Computer Science Engineering and Information …, 2013 | 16 | 2013 |
A reliable ATM protocol and comparative analysis on various parameters with other ATM protocols AA Duvey, D Goyal, N Hemrajani International Journal of communication and computer Technologies 1 (1), 28-33, 2012 | 16 | 2012 |
Detection and mitigation techniques of black hole attack in MANET: An Overview S Jain, N Hemrajani International Journal of Science and Research (IJSR), India Online ISSN …, 2013 | 15 | 2013 |
Analysis of robust watermarking technique using mid band DCT domain for different image formats R Chaturvedi, A Sharma, N Hemrajani, D Goyal International Journal of Scientific and Research Publications 2 (3), 1-4, 2012 | 15 | 2012 |
Defect prevention technique in test case of software process for quality improvement A Sharma, N Hemrajani, S Shiwani, R Dave International Journal of Computer Technology and Application 3 (1), 56-61, 2012 | 12 | 2012 |
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment using UBUNTU S Shiwani, GN Purohit, N Hemrajani Proc. International Conference on Computer Communication and Networks (ICCCN …, 2011 | 12 | 2011 |
Novel selective video encryption for h. 264 video D Goyal, N Hemrajani structure 1 (2), 3, 2014 | 10 | 2014 |
Evaluation of black hole, wormhole and sybil attacks in mobile ad-hoc networks SK Jangir, N Hemrajani Proceedings of the second international conference on information and …, 2016 | 9 | 2016 |
Effective Routing Protocol (DSDV) for Mobile Ad Hoc Network J Bhatt, N Hemrajani International Journal of Soft Computing and Engineering (IJSCE) 3 (5), 4-7, 2013 | 8 | 2013 |
Performance Analysis of AODV & OLSR for MANET S Midha, N Hemrajani International Journal of Engineering Research & Technology 2 (1), 1-5, 2013 | 7 | 2013 |
Data management framework for IoT edge-cloud architecture for resource-constrained IoT application G Sharma, N Hemrajani, S Sharma, A Upadhyay, Y Bhardwaj, A Kumar Journal of Discrete Mathematical Sciences and Cryptography 25 (4), 1093-1103, 2022 | 6 | 2022 |
Predicting effort of agile software projects using linear regression, ridge regression and logistic regression M Vyas, N Hemrajani Int. J. Tech. Phys. Probl. Eng 13 (2), 14-19, 2021 | 6 | 2021 |
Improvisation of Security aspect of Steganographic System by applying RSA Algorithm MK Ramaiya, D Goyal, N Hemrajani International Journal of Advanced Computer Science and Applications 7 (7), 2016 | 6 | 2016 |
Performance analysis of various video compression techniques A Gupta, D Goyal, N Hemrajani International Journal of Science and Research 2 (8), 335-338, 2013 | 6 | 2013 |
Comparative Study of AODV and DSR Routing Protocols for MANET: Performance Analysis N Goyal, N Hemrajani International Journal of communication and computer Technologies 1 (1), 67-71, 2012 | 6 | 2012 |
Attack Analysis and Designing of Quality of Service Framework for Optimized Link State Routing Protocol in MANET. H Bali, N Hemrajani International Journal of Intelligent Engineering & Systems 11 (5), 2018 | 5 | 2018 |
Optical time division multiplexing system performance and analysis using MZI switching S Kumar, S Sharma, N Hemrajani International Journal of Innovative Technology and Exploring Engineering …, 2012 | 5 | 2012 |