关注
Dr. Shashi Bhushan
Dr. Shashi Bhushan
Director, Amity School of Engineering and Technology, Patna, Bihar
在 ptn.amity.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An optimized framework for energy-resource allocation in a cloud environment based on the whale optimization algorithm
S Goyal, S Bhushan, Y Kumar, AHS Rana, MR Bhutta, MF Ijaz, Y Son
Sensors 21 (5), 1583, 2021
802021
Hybrid algorithm to detect DDoS attacks in VANETs
K Adhikary, S Bhushan, S Kumar, K Dutta
Wireless Personal Communications 114 (4), 3613-3634, 2020
642020
An improved biometric fusion system of fingerprint and face using whale optimization
T Kumar, S Bhushan, S Jangra
International Journal of Advanced Computer Science and Applications 12 (1), 2021
312021
Fusion in multimodal biometric system: A review
G Kaur, S Bhushan, D Singh
Indian Journal of Science and Technology 10 (28), 1-10, 2017
242017
Content based image retrieval with enhanced privacy in cloud using apache spark
S Easwaramoorthy, U Moorthy, CA Kumar, SB Bhushan, V Sadagopan
Data Science Analytics and Applications: First International Conference …, 2018
212018
An enhanced digital image watermarking scheme for medical images using neural network, DWT and RSA
S Nagpal, S Bhushan, M Mahajan
International Journal of Modern Education and Computer Science 8 (4), 46, 2016
212016
Robust login authentication using time-based OTP through secure tunnel
N Kaur, M Devgan, S Bhushan
2016 3rd International Conference on Computing for Sustainable Global …, 2016
142016
Innovations in the industrial Internet of Things (IIoT) and smart factory
S Goundar, J Avanija, G Sunitha, KR Madhavi, SB Bhushan
IGI Global, 2021
132021
Gait Recognition of human using SVM and BPNN classifiers
A Joshi, S Bhushan, MJ Kaur
International Journal of Computer Science and Mobile Computing 3 (1), 281-290, 2014
132014
Ann trained and WOA optimized feature-level fusion of iris and fingerprint
T Kumar, S Bhushan, S Jangra
Materials Today: Proceedings 51, 1-11, 2022
112022
Evaluating the performance of various SVM kernel functions based on basic features extracted from KDDCUP'99 dataset by random forest method for detecting DDoS attacks
K Adhikary, S Bhushan, S Kumar, K Dutta
Wireless Personal Communications, 1-19, 2022
102022
Hybrid encryption algorithm to detect clone node attack in wireless sensor network
S Lalar, S Bhushan, M Surender
Proceedings of the International Conference on Innovative Computing …, 2020
102020
Recent Trends in Sustainable Big Data Predictive Analytics: Past Contributions and Future Roadmap
SM Basha, DS Rajput, SB Bhushan, RK Poluru, R Patan, R Manikandan, ...
International Journal on Emerging Technologies 10 (2), 50-59, 2019
102019
Decision tree and neural network based hybrid algorithm for detecting and preventing DDoS attacks in VANETS
K Adhikary, S Bhushan, S Kumar, K Dutta
International Journal of Innovative Technology and Exploring Engineering 5 …, 2020
92020
An efficient tree-based clone detection scheme in wireless sensor network
S Lalar, S Bhushan, Surender
Journal of Information and Optimization Sciences 40 (5), 1003-1023, 2019
92019
Improved Human Identification using Finger Vein Images
JK Sameer Sharma, Shashi Bhushan
International Journal of Computer Science and Mobile Technology (IJCSMT) 3 …, 2014
9*2014
Recent techniques used for preventing DOS attacks in VANETs
K Adhikary, S Bhushan
2017 International Conference on Computing, Communication and Automation …, 2017
82017
Effect of cervical insemination with frozen semen on fertility of Indian goat breed
R Ranjan, AK Goel, SD Kharche, R Priyadharsini, N Ramachandran, ...
Indian Journal of Animal Sciences 90 (4), 557-559, 2020
72020
A Secure Time-Stamp Based Concurrency Control Protocol for Distributed Databases
MD Shashi Bhushan, R. B. Patel
Journal of Computer Science 3 (7), 561-565, 2007
72007
Face Recognition with decision tree using SVM and SURF
T Kumar, S Jangra, S Bhushan
International Journal of control theory and applications 10 (15), 173-180, 2017
62017
系统目前无法执行此操作,请稍后再试。
文章 1–20