Investigating brain tumor segmentation and detection techniques M Lather, P Singh Procedia Computer Science 167, 121-130, 2020 | 66 | 2020 |
An effective implementation of security based algorithmic approach in mobile adhoc networks PSMD Rajinder Singh Human-centric Computing and Information Sciences 4 (7), 2014 | 57 | 2014 |
A systematic literature mapping on secure identity management using blockchain technology T Rathee, P Singh Journal of King Saud University-Computer and Information Sciences 34 (8 …, 2022 | 54 | 2022 |
Fraud detection by monitoring customer behavior and activities P Singh, M Singh International Journal of computer applications 111 (11), 2015 | 51 | 2015 |
Energy-efficient QoS-aware intelligent hybrid clustered routing protocol for wireless sensor networks P Singh, R Singh Journal of Sensors 2019, 1-12, 2019 | 32 | 2019 |
Evaluating the performance of message hidden in 1 st and 2 nd bit plane. P Singh, S Batra, HR Sharma WSEAS Transactions on Information Science and Applications 2 (8), 1220-1227, 2005 | 26 | 2005 |
A Review: QR Codes and its Image Pre-Processing Method PS Anjali Singh International Journal of Science, Engineering and Technology Research 5 (6), 2016 | 25 | 2016 |
Brain Tumor Detection through MR Images: A Review of Literature PS Ritu Rana IOSR Journal of Computer Engineering, 17 (5), 07-18, 2015 | 20 | 2015 |
Brain Tumor Detection through MR Images: A Review of Literature PS Ritu Rana IOSR Journal of Computer Engineering 17 (5), 7-18, 2015 | 20 | 2015 |
An enhanced data hiding approach using pixel mapping method with optimal substitution approach PK Panjabi, P Singh International Journal of Computer Applications 74 (10), 36-43, 2013 | 16 | 2013 |
An Enhanced Data Hiding Approach Using Pixel Mapping Methos with Optimal Substitution Approach, PS Prince Kumar International Journal of Computer Applications 74 (10), 36-43, 2013 | 16* | 2013 |
A Comprehensive Survey of Video Encryption Algorithms PS Darshana International Journal of Computer Applications 59 (1), 14-19, 2012 | 14* | 2012 |
A comprehensive survey of video encryption algorithms D Hooda, P Singh International Journal of Computer Applications 59 (1), 2012 | 14 | 2012 |
MAC Protocols in Wireless Sensor Network: A Survey. PS Anuradha Rai, Suman Deswal International Journal of New Innovation in Engineering and Technology 5 (1 …, 2016 | 12 | 2016 |
Performance Modelling of Information Retrieval Techniques Using Similarity Functions in Wide Area Networks YC Jasvinder Singh, Parvinder Singh International Journal of Advanced Research in Computer Science and Software …, 2014 | 12 | 2014 |
Reduction of noise from speech signal using HAAR and biorthogonal wavelet P Singh, D Singh, D Sethi IJECT 2 (3), 2011 | 11 | 2011 |
Uivh-algorithm for seamless mobility in heterogeneous wireless network S Sangwan, P Singh, RB Patel Proceedings of the CUBE international information technology conference, 210-215, 2012 | 10 | 2012 |
A self-sovereign identity management system using blockchain T Rathee, P Singh Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 371-379, 2022 | 9 | 2022 |
Secure data sharing using Merkle hash digest based blockchain identity management T Rathee, P Singh Peer-to-Peer Networking and Applications 14, 3851-3864, 2021 | 9 | 2021 |
Enhancing LZW Algorithm to Increase Overall Performance P Singh, M Duhan 2006 Annual IEEE India Conference, 1-4, 2006 | 9 | 2006 |