A survey on different image encryption and decryption techniques R Pakshwar, VK Trivedi, V Richhariya International journal of computer science and information technologies 4 (1 …, 2013 | 72 | 2013 |
Predicting future trends in stock market by decision tree rough-set based hybrid system with HHMM S Tiwari, R Pandit, V Richhariya International Journal of Electronics and Computer Science Engineering 1 (3 …, 2010 | 38 | 2010 |
Tag relevance for social image retrieval in accordance with neighbor voting algorithm D Mishra, UP Singh, V Richhariya IJCSNS 14 (7), 50, 2014 | 17 | 2014 |
An efficient identity based multi-receiver signcryption scheme using ECC S Khullar, V Richhariya, V Richhariya International Journal of Advancements in Research & Technology 2 (4), 189-193, 2013 | 17 | 2013 |
Survey of current network intrusion detection techniques R Srivastava, V Richhariya Journal of Information Engineering and Applications 3 (6), 27-33, 2013 | 17 | 2013 |
Double threshold based load balancing approach by using VM migration for the cloud computing environment VR Rajyashree Int J Eng Comput Sci 4 (1), 9966-9970, 2015 | 14 | 2015 |
An efficient image segmentation approach through enhanced watershed algorithm FK Siddiqui, V Richhariya Computer Engineering and Intelligent Systems 4 (6), 1-7, 2013 | 14 | 2013 |
Adaptive contrast image enhancement based on fuzzy set theory D Shrivastava, V Richhariya International Journal of Advanced Research in Computer Science and Software …, 2014 | 13 | 2014 |
Reduction of data sparsity in collaborative filtering based on fuzzy inference rules A Sachan, V Richhariya International Journal of Advanced Computer Research 3 (2), 101, 2013 | 13 | 2013 |
Global high dimension outlier algorithm for efficient clustering & outlier detection N Nigam, T Saxena, V Richhariya 2016 Symposium on Colossal Data Analysis and Networking (CDAN), 1-5, 2016 | 12 | 2016 |
Intrusion detection with KNN classification and DS-theory D Deepika, V Richhariya International Journal of Computer Science and Information Technology and …, 2012 | 11 | 2012 |
Puzzling out emotions: a deep-learning approach to multimodal sentiment analysis V Shrivastava, V Richhariya, V Richhariya 2018 International Conference on Advanced Computation and Telecommunication …, 2018 | 10 | 2018 |
Hybrid approach for load balancing in cloud computing V Richhariya, R Dubey, R Siddiqui Oriental Journal of Computer Science and Technology 8 (3), 241-246, 2015 | 9 | 2015 |
Image encryption using random scrambling and XOR operation R Pakshwar, VK Trivedi, V Richhariya Int. J. Eng. Res. Technol 2 (3), 2013 | 9 | 2013 |
Analysis and comparison of the 4-PSK and 8-PSK STTC over Rayleigh fading Channels for determining Performance P Gupta, UP Singh, V Richhariya International Journal of Advanced Computer Research 2 (3), 140, 2012 | 9 | 2012 |
A improved privacy preserving algorithm using association rule mining in centralized database A Tomar, V Richhariya, MK Mishra International Journal of Advanced Technology & Engineering Research (IJATER …, 2012 | 9 | 2012 |
Hybrid technique for load balancing in cloud computing using modified round robin algorithms V Richhariya, R Dubey, R Siddiqui J Comput Math Sci 6 (12), 688-695, 2015 | 8 | 2015 |
Block chain based robust image watermarking using edge detection and wavelet transform PK Mannepalli, V Richhariya, SK Gupta, PK Shukla, PK Dutta | 7 | 2021 |
A survey: Analysis of current approaches in anomaly detection P Chouhan, V Richhariya International Journal of Computer Applications 111 (17), 2015 | 7 | 2015 |
A Survey on Data Mining Based Intrusion Detection Systems MB Lodhi, V Richhariya, M Parmar International Journal of Computer Networks and Communications Security 2 (12 …, 2014 | 7 | 2014 |